Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
11 pages (3047 words)
, Download 0
, Literature review
Free
Despite many terms used by scholars such as ‘text interface’ and ‘command screen,’ among other terms to describe the command-line interface (CLI), it is a user interface that involves typing of commands in a given computer operating system. It differs rather distinctively from the modern use of the mouse in performing commands.
The author of the paper evaluates the concept of assemblages’ development and application of social technology in organizations. In order to offer a practical evaluation and illustration of the concept application, the essay adopts the Cisco case study a global leader in IT products and services consultancy.
Preview sample
sponsored ads
Hire a pro to write a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
The use of the internet has increased with connections getting cheaper. The rise of internet use in daily life has led to privacy concerns (Smith, Dinev & Xu, 2011). The privacy debate that has been raised by internet users is mostly based on the two issues known as internet-specific and internet-enhanced concerns.
It is no doubt that access to information is a critical process in day-to-day activities (Greenemeier 2013, p. 84). The internet has managed to penetrate every aspect of human activities that the world would stop at a standstill if the internet disappeared at any one time. Everything has been made easier through the sharing, speed, and amount of ideas or information found on the internet.
Sometimes this has taken place gradually, but often communication has made great leaps, as when writing emerged in the Middle East more than 3000 years B.C.E. Inventions and discoveries brought about revolutions in the way society interacted or lifted the level of communication to another height to be explored.
10 pages (2692 words)
, Download 0
, Research Proposal
Free
The availability of huge information online requires special computing for quality information extraction. Accessing these network resources is quite challenging therefore the need metadata. Metadata will help to improve network efficiency by ensuring the retrieved information meets the objective of the user of the internet.
Connected machines are fast becoming the eyes and ears of the enterprise. By adding devices and networking tools to the products they sell and the apparatus they use, corporate businesses are finding new methods to get powerful visions for themselves and use new forms of data. IT management is the basic requirement of a business to keep the data safe and handy.
8 pages (2583 words)
, Download 0
, Research Proposal
Free
The use of communication technologies in paying one’s roles at the workplace is because of the knowledge economy, which makes professionals not much concerned about the place of work, but the delivery of the results. This essay seeks to explore the communication technologies and workplace intimacies assemblage.
The background information provided the nature of the risks that included loss, theft, and hacking and malware attack. Further description provided the possible solutions that GCE’s IT department needed to implement to overcome the risks. They included encryption, password authentication, antimalware installation, and remote data wiping.
Without a doubt security of OS in the future will be imperative, and even though malicious attacks will increase, business organizations will espouse advanced measures to counter such attacks. Furthermore, privacy issues will increase given that the use of the internet is expected to increase; therefore, the number of computer systems will heighten thus increasing the privacy threats.
Unreliable communication (for example, unreliable transfer, conflicts, and latency) has been identified as the first security concern. The second security issue is the unattended operation (such as exposure to physical attacks, remote management, and no central management points) and the attack on the sensor security such as the Monitor and Eavesdropping, Traffic Analysis, and camouflage.
Web-sharing platforms like blogs, social networks, photo and video sharing platforms, and so forth (Anderson, 2007). Drawing from the properties of Web 2.0 that provide blogs with their sharing platform, blogs encourage the active involvement of visitors by allowing comments on content and replies to other visitors. This paper is an in-depth analysis of blogs as Web 2.0 applications.
In the past few decades, there have emerged a wide variety of communication mechanisms that are used to communicate between various devices. These mechanisms are used for different purposes in different scenarios. In this scenario, Peer-to-Peer (P2P) is a popular communication mechanism that is widely used for sharing different kinds of files between computers.
It is usually carried out by the government due to various reasons which include moral reasons, religion, business, societal norms, intimidation, and fear of legal consequences. Censorship has always led to criticism as well as praises from different members of society. This is considering the control of some of the contents is important as it has a negative impact on society.
Cloud computing is a familiar phenomenon in the recent past as far as modern computing is concerned. The pace at which the utility is adopted especially among private enterprises is high, and this can be attributed to the intense competition in providing the best services to the consumers.
8 pages (2280 words)
, Download 2
, Research Proposal
Free
In digital economy, innovation and adaptation are the key features of competitive advantage. Digital services facilitate higher level of collaborative working and the technologies provide new opportunities to meet customer needs and all these are basis for efficacies (Pagani, 2013). The use of search engines in locating information is a fundamental aspect in digital economy.
Since the advent of Information and Communication Technology (I.C.T), various innovations have been developed with an aim of making the work of human beings become easier. Among the technological innovations that have been invented include the use of Wi-Fi, Bluetooth, Zigbee, RFID, and other wireless technological innovations.
8 pages (2408 words)
, Download 0
, Literature review
Free
Social network sites such as Facebook, Twitter, YouTube and Flickr among others are contemporary trends of communication that are shaping the face of communication in the 21st century. These emergent phenomena in communication technology have so far attracted a huge number of users globally.
9 pages (2638 words)
, Download 0
, Literature review
Free
Internet social networks and email accounts have been subjected to hacking, therefore, violating the privacy of many individuals. The speed and ease of capturing and storing information have increased dramatically; this has greatly magnified and distorted existing privacy problems. Stalking has taken a new dimension, and people have to be afraid of cyberstalkers who can be anywhere in the world.
6 pages (1852 words)
, Download 0
, Literature review
Free
Computer technology has become integral to a modern lifestyle at work, in recreation and social networking; however, this convenience can be problematic for some individuals and may lead ultimately to addiction. Therefore, personal lifestyles have undergone radical transformation under the influence of this technology but not for the better.
The benefits of computers have made many organizations and government institutions implement information technology in their processes. Many computer systems and peripheral devices have been introduced in organizations and government institutions for effective and efficient service delivery. Internet introduction has made many people own devices.
8 pages (2347 words)
, Download 0
, Literature review
Free
The idea that the internet is a platform where individuals can use as a democratic communicative space, is well known to promote a healthy public sphere especially with the introduction of social networking platforms. The popularity of social networking sites is due to advance in technology that resulted from highly developed ICT which is mediated by computers and phones.
11 pages (3611 words)
, Download 0
, Literature review
Free
For many people, risk and threat are two similar concepts and are used interchangeably. This is not a correct assumption, and in the security industry, risk and threat do not mean the same thing; so what is the difference between risk and threat? Even among professionals, the risk is mistaken for threat and vice versa. Nonetheless, these two concepts cannot be mistaken for one another.
Large companies and individual users have both suffered the negative impacts that have been created by the continued use of IT devices and methodologies. In the current society, the main challenge in cyberspace or the internet platform is that of security risks. There are limitations and drawbacks that have resulted from cyber-attacks both to individuals and also to organizations.
The paper "Introduction to Enterprise Systems" is a remarkable example of an assignment on information technology. An enterprise system is defined as large scale application software that is used by businesses to plan, run and organize operations. They mainly serve corporations and have information at a central point that is accessed and used many users simultaneously.
Decision making is one of the complex activities an individual engages in. There are several stages involved in the decision-making paradigm. Analyzing the problem is the first stage. The origin of the constraint has to be identified. The second is the consideration of various alternatives at your disposal. The final stage will be selecting the best choice from all of the available alternatives provided.
The primary function of information security is to prevent unauthorized access, disclosure, or modification of information in order to maintain reliable access and use.Development in the telecommunication sector with the rising of mobile technologies like tablets, laptops, iPads, and netbooks which have recording and internet connectivity features brings in new challenges to cyberspace security.
Communication in machine-to-machine devices or systems is broadly concerned with information and networking technologies. Machine to machine communication is an integral part of internet communication and comes about with several advantages. This nature of communication mostly used in control as well as for monitoring purposes.
In spite of the long history of discussions and researches that have characterized the field of law enforcement, a standard distinct definition for intelligence and information is yet to be arrived at. An underlying implication of this is the belief that intelligence, information, and evidence mean the same thing, and that they may be roughly described rather than adequately defined.
The global environment today where the Internet, as well as its related services, are immediate and accessible, where businesses and people can communicate between themselves instantly, and were more often than not machines are interconnected with one another. The appropriate place of technology in society is beyond an aspect of art than science (Apel, 2001).
The development of the BigTable solution by Google was so that the storage management system could be relatively simple, and provide access to large data quantities distributed between thousands of computers. BigTable is physically similar to a B+-tree index-organized table having leaf and branch nodes that are disturbed across several machines.
The overall error rate for Decision Tree was 37.10% while the error for Random Forest was 21.31% which meant that Random Forest was more accurate in predicting Rain Tomorrow. A ROC curve, which contrasts the false positive rate to the true positive rate, indicated that Random Forest had a bigger range than Decision Tree which meant more accuracy.
14 pages (3983 words)
, Download 1
, Literature review
Free
The digital evidence presented in the court of law must by no means be tailored and the persons tasked with the handling of the digital evidence must be knowledgeable and experienced. Furthermore, documentation of every procedure utilized to the presented digital evidence has to be preserved and the evidence must be available to the third party.
The information technology industry has had numerous transformations over the past years. Among the developments has been the need to transform computing and use it as a utility. This has made software an attractive service and has shaped the design and purchase of IT hardware (Armbrust et al, 2010).
The essay will briefly outline the benefits and risks posed by communication technologies on communication. In light of a working definition of what constitutes effective communication, the essay will evaluate the claim that communication technology has made people less effective communicators. Most business communication is now done via e-mails, texts, instant messaging, intranets, blogs, websites, and other technology-enabled media.
12 pages (3254 words)
, Download 1
, Literature review
Free
Cloud computing is defined as an IT service set that is offered to a customer through a network on a hired basis as well as with the capacity to scale down or up the requirements of their services. Normally cloud computing services are distributed by a third-party source that possesses the infrastructure.
The website has to be designed with the rationale of being credible so that it can attract more users. A credible website in this case gives a good first impression and is attractive, the navigation is easy and intuitive, and it has no generic photos. The website should also have press mentions and customer testimonials, must feature a constant flow of reviews by customers.
With all the kinds of online transactions, there are security issues that come along with it. The use of online transactions in the majority of people across the world is determined by the security and privacy of user’s personal data, which include credit card numbers, virus attacks, and fear of identity theft among others.
The information is also transmitted via networks to other electronic devices Personal information security is vital to ensure the privacy of secret information and document. Organizational information requires a lot of protection from competitors and hackers. This helps to avoid losses and damage to organizational reputation.
The majority of the companies that offer online related services have adapted to using more and more energy for their data centers. Cloud computing services development has speeded up the way in which computational services are sourced by organizations and corporations for better delivery of services.
Physical security is an integrated set of physical measures intended to protect people, deter unauthorized access to the property, and defend assets against theft, damage, or sabotage. Physical security systems serve to mitigate identified risks by linking layered security elements to offer countermeasure.
The process of consumption originally derived more general studies but the current framework provides a constructive way of assembling a range of perspectives and assumptions of the relationships with it. Nonetheless, the concept was initially applied in British studies to offer a framework for ICT’s thinking in the home and not the portable ones.
Switches are normally used in creating VLANs because they are able to create the same network divided into different domains but do not experience the latency issues experienced by a router used in the same capacity. VLAN is mainly implemented with consideration of traffic patterns and the need to maintain effective communication without feeling the effect of distances.
Similarly, the report looks at two user groups and their specific needs on choosing a health fund website based on health fund products from BUPA. Likewise, the report looks at the process of doing a search on Medibank, NIB members ’ joining process, and the BUPA searching process from the systems perspective.
12 pages (3734 words)
, Download 1
, Literature review
Free
Dhamdhere affirms that the memory that is nonphysical, commonly regarded as virtual memory, is in fact a hard disk’s portion that is installed to emulate the RAM of the computer. The virtual memory (VM) notion originates from a period when physical memory, was exceedingly costly. Furthermore, the hard disk portion that serves as physical memory is regarded as a page file.
There are high chances that the trend will continue to the level that ICT literacy will be a functional requirement for people’s work, personal and social lives. Globalization coupled with innovative information and communication technologies are affecting various societies in the world and are prompting organizations to re-engineer and re-think the ways they run their operations.
6 pages (1786 words)
, Download 1
, Literature review
Free
Information and Communication Technology (ICT) continually transform the ways in which knowledge is passed and the ways in which teachers and students interact in the learning process. Traditional learning methods are increasingly losing the capacity to meet the changing student needs in today’s educational systems.
9 pages (2612 words)
, Download 1
, Literature review
Free
In today's world where knowledge-intensive activities are considered to be an important element of the economy, the allocation of knowledge across societies is progressively more linked to stratification. The increased dissemination of the internet across societies has led to postulation about the potential effects of the new medium on the population at large.
9 pages (2801 words)
, Download 0
, Literature review
Free
Article 12 of the United Nations Charter defines privacy as the right of an individual to control his or her own individual information. An individual retains the right to reveal or keep such information private. Most nations recognize this as a basic human right, but the internet continues to invade our personal spaces every day.
It is easy to collect and disseminate personal information very rapidly than before. It has changed the way people think about the protection of private personal information. There are many technologies handling personal information that is the potential to have a damaging effect on one’s privacy over the internet.