StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Simulation of Address Resolution Protocol Information Technology Dissertation
28 pages (7000 words) , Download 2 , Dissertation
Anytime a host or a router has an IP datagram to send to another host or router, it has the logical address of the receiver. But the IP datagram must be encapsulated in a frame to be able to pass through the physical network. This means that the sender needs the physical address of the receiver. ARP is a mapping that maps a logical address to a physical address.
Preview sample
Open source software Information Technology Essay
3 pages (750 words) , Download 3 , Essay
As their number increases, so is the competition between them. These all vendors always think about new and innovative ideas to win the market competition. One of these way has been to offer customer an open source software so that if the customers preferences changes they can make necessary amendments
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Wireless network technology Information Technology Essay
2 pages (500 words) , Download 3 , Essay
Free
There are many types of wireless network, wireless MAN, LAN, PAN and mobile devices. Apparently, mobile devices are the most common and most widely known by each and every person. Part of huge wireless networks is cellular phones.Mobile device networks are subdivided in three.
Preview sample
QuickTest or WinRunner Information Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
Mercury Interactive (now HP Software) based in Sunnyvale, CA, with R&D in Israel (Mar, 2007, p. 2) that allow the automation of user actions on a web or client based computer application.
Preview sample
Analysis of Refactoring Information Technology Article
1 pages (250 words) , Download 2 , Article
Free
 Just like in mathematics, refactoring in software code will not change the observable behavior of the program, and is not (directly) meant to benefit end users, but only the program maintainers. The semantics of the program should not change. Most large programs will need bug fixes or additional features to meet evolving demands.
Preview sample
Reflections on Experience with Second Life Information Technology Term Paper
7 pages (2058 words) , Download 2 , Term Paper
Free
“The classroom of the future isn’t on a college campus. It’s in the virtual world of ‘Second Life’” comments Grace Wong 2006. One may not be surprised to note that even Reuters news agency has a correspondent based on this cyber community. With technological advancement, people can enter this three-dimensional virtual world.
Preview sample
Delivering Internet Success to Small Businesses Information Technology Literature review
6 pages (1857 words) , Download 2 , Literature review
Free
The writing of Charles Nault (2009) on Risk-free technology: how small to medium businesses can stem huge losses from poorly performing IT systems enlists the following basic network protection needs of organizations within the small and medium scale operations: (a) Basic Firewall;(b)basic antivirus software;
Preview sample
Grand Theft Auto's Impact toward Gamers Information Technology Essay
8 pages (2342 words) , Download 2 , Essay
Free
The perceived seriousness of an offense is, among the respondents, as expressed by the dispersion of values around the means.  The low variation perceived high seriousness of violent offenses, which indicates a crime severity is reliable in conjunction with the public’s approval or disapproval of that particular criminal offense. From there, Grand Theft Auto's has a detrimental impact on gamers because it does influence violence among teens.
Preview sample
Computer Crimes in the USA Information Technology Article
8 pages (2000 words) , Download 3 , Article
Free
The author states that with e-commerce and virtual networking being a new trend, many countries have yet not come out with appropriate deterrent mechanisms to curb cyber crimes. Especially, the developing world is more prone to becoming a hotbed of computer crimes as the law enforcement agencies there are bereft of the requisite training.
Preview sample
Outsourcing Information Technology Department Information Technology Term Paper
10 pages (2500 words) , Download 3 , Term Paper
Free
The most obvious benefit of outsourcing is the low cost. For example: compared to a U.S. call center, outsourcing can save companies up to 50% in operational expenses. But there is more to why people are shipping call centers to countries such as India besides cost. Benefits such as an educated, English-speaking labor pool, low employee turnover.
Preview sample
Google Innovation & Technology Information Technology Essay
6 pages (1500 words) , Download 4 , Essay
Free
The author states that Google doesn’t rely on big servers, in fact, they claim to have networked PCs that made their work so fast and innovative, another good thing found in Google is that it has used a “Page Rank” technology in their search engine. Through this technology, they are able to rank websites that are mostly visited by the users.
Preview sample
Optimisation of Web Protocols and Services Information Technology Research Proposal
8 pages (2000 words) , Download 2 , Research Proposal
Free
A carbon footprint can be defined as "the amount of greenhouse gases (GHG) that is released from an organization, at a particular event or from a product or an individual". There are various tests that can be used to calculate Carbon footprint of an ICT (Information and Communication Technology) comapny.
Preview sample
How Operational Routers May Retain Functionality and How Data May Be Safely Transmitted over Them Information Technology Research Paper
29 pages (8048 words) , Download 5 , Research Paper
The fact is, however, that routers are vulnerable to unauthorized infiltration and can, under these circumstances, be compromised. If routers are compromised by an attacker, the attacker/hacker is subsequently in a position to disrupt network operations, compromise data, and inflict substantial financial loss on the entity/network in question.
Preview sample
Effectiveness Of Federal Information Security Information Technology Research Paper
36 pages (9000 words) , Download 4 , Research Paper
After the computer security act of 1987, there was a strong need to formulate a standard Department of Defense (DoD) policy for security certification and accreditation federal information systems. This responsibility was taken up by the Defense Information Systems Agency (DISA) under its Center for Information Systems Security.
Preview sample
Network Load Balancing Information Technology Essay
2 pages (581 words) , Download 3 , Essay
Free
The author states that this is achieved using the network load balancing techniques that distribute traffic across various cluster hosts. Thus, more than one host provides the services. As and when the traffic increases, the number of hosts can be increased by the organization without degrading the performance levels.
Preview sample
Windows Server and Networking Services Information Technology Term Paper
4 pages (1044 words) , Download 2 , Term Paper
Free
The features of the WINS along with its configurations have helped the WINS service to attain an out and out victory margin over its competitors in the world of virtual reality and from the point of view of the real-world users. The excellent interphase of the fact that it provides the most stable and solid possible platform.
Preview sample
The Internet and Availability of Information Information Technology Research Paper
5 pages (1250 words) , Download 2 , Research Paper
Free
Information technology has changed the very face of organizations from their traditional time-consuming internal and external settings to robust applications of Information Systems. In fact, the structure of an organization is represented in any industry through its Information Systems, be it retailing companies or military establishments.
Preview sample
IT Professional Practice Information Technology Essay
4 pages (1167 words) , Download 2 , Essay
Free
The author states that these values are full of integrity and humanity, and contrast strongly with the process-based ideologies that characterized management thinking in the earlier times. All 7 habits coincide with each other for the best and most successful results. By being proactive the other six fall into place.
Preview sample
Advancement Of Structured Information Standards Information Technology Case Study
8 pages (2000 words) , Download 2 , Case Study
Free
IBM also defines SOA as “a loosely coupled architecture with a set of abstractions relating to components granular enough for consumption by clients and accessible over the network with well-defined policies as dictated by the components”. Services acts as user-interface of the larger software application.
Preview sample
Diagnosis and Simulation PDA SIM Strategies Information Technology Essay
1 pages (526 words) , Download 2 , Essay
Free
The sustenance of hardware investments tends to be tainted with uncertainty, especially in the context of most developing economies, where returns on this type of investment might not be immediately forthcoming. Therefore, I think that the procurement of equipment should be phased, and a more evolutionary and modular design should be adopted.
Preview sample
The Efficient Functioning of an Office Information Technology Essay
1 pages (474 words) , Download 2 , Essay
Free
The author states that this is especially true in the case of newly recruited HR Assistant in the college. As most of his functions include communicating the vital information to the different departments and coordinating the work of several people in the process of effective administration, he needs to have excellent electronic communication systems.
Preview sample
Technologies for Business Information Technology Term Paper
6 pages (1500 words) , Download 2 , Term Paper
Free
Start-up businesses face many difficulties in their initial phase of development as they not only face financial constraints but also have to take care of other delicacies of doing business.  With the advent of globalization, it has now become important for businesses of any size to integrate information technology into their fold in order to remain competitive.
Preview sample
Wireless ad hoc network management Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
Until the completion of implementation, the ICT director informed me that the questions I was posing were irrelevant. They were irrelevant because they were related to operational automatic network management systems, currently not in place in our organization.
Preview sample
The Conception of Digital Divide Information Technology Essay
7 pages (2128 words) , Download 4 , Essay
Free
The Latin American countries are lagging behind the world with regard to the information and knowledge availability due to widespread social and economic gaps, poverty, lack of education, high charges underlying Internet and telephone usage, and the inability of people to comprehend English language (Williams and Bertino, 2001).
Preview sample
Using the Microsoft Outlook Information Technology Essay
1 pages (302 words) , Download 4 , Essay
Free
The author states that the training section does need extra user privilege than that of the normal user. He requests to provide a user account or extend his user account for using some portion of the administrative controls which are required for the usage of internet, a configuration of IP address, connecting to the internet and access to Microsoft outlook.
Preview sample
Secure Computer Systems Information Technology Term Paper
2 pages (500 words) , Download 3 , Term Paper
Free
Data security and privacy have emerged as primary concerns in the contemporary era of digitized economies and corporate operations. This issue has grabbed the attention of governments around the world. In the last decade, even in the US, the government has imposed many security and privacy-related regulations on the corporations.  
Preview sample
The Ethical and Regulatory Issues of the Business-To-Consumer Site Information Technology Case Study
1 pages (250 words) , Download 2 , Case Study
Free
The Internet is a growing and evolving creature that will live on in perpetuity. It would be wise to ponder the e-business legal and Internet marketing ethical issues of b2b b2c. Whatever is written and published online will be there forever. Imagine the billions upon billions of text information pages that are and will be stored for a long time.
Preview sample
Spyware In The Enterprise Information Technology Report
9 pages (2646 words) , Download 2 , Report
Free
Spyware is presently one of the major security concerns facing the enterprise.  This business report is part of our company’s strategy to address the issues caused by spyware. Its purpose is to provide employees with basic information on spyware and the possible solutions to eradicate the problem.  The report reviews in detail the causes and consequences of the widespread nature of the spyware phenomena; it outlines the implications it carries on a direct and indirect outlook.
Preview sample
Aspects of Research Information Technology Essay
3 pages (750 words) , Download 2 , Essay
This is done so through number of steps which are formally called the research steps. Following these steps is vital towards accomplishment of the objectives. Research can be conducted in any field, ranging from medial to strictly science, or environmental or any other experimental grounds (Norwood, 2010).
Preview sample
Brazil's E-Procurement System Information Technology Essay
8 pages (2118 words) , Download 2 , Essay
Free
E-procurement in Brazil has also led to a partnership relationship to be developed between the public sector and the private sector thus enhancing the overall growth of the economy of the country. This has enhanced the relationship between the public and the private sectors thus ensuring accountability in the public sector.
Preview sample
The Quality of Service Provided by the Integrated Services Architecture Information Technology Assignment
28 pages (7000 words) , Download 3 , Assignment
The NAT translation method (Network Address Translation) method of routing and providing a remote access service to the internet, is ideal for a small or private network. It also says on having to deploy a proxy server. Therefore the small office in SOHO LAN of six workstations will benefit by being able to utilize this technology.
Preview sample
Cable Television: An Unnatural Monopoly Information Technology Assignment
8 pages (2000 words) , Download 2 , Assignment
Free
The paper will draw on previously published reports that address the topic. These reports and articles will help define what a monopoly is as well as determining the present status of the cable companies. The paper will define the various forms of monopoly and report on current trends and legislation that affect the cable television industry.
Preview sample
Windows File System Comparison Information Technology Assignment
3 pages (750 words) , Download 3 , Assignment
The author states that file systems may use a storage device such as a hard disk or CD-ROM and involve maintaining the physical location of the files, or they may seem virtual and exist only as an access method for virtual data or for data over a network. In this paper, only the different file systems being used by windows will be discussed.
Preview sample
The Use of Databases Information Technology Assignment
3 pages (947 words) , Download 2 , Assignment
The author of the paper states that query language is used to access the data from a database. It is like you can ask questions and it will give a quick and correct answer. As in an organization like a small real estate business, we don’t need to have an extra-large database. Microsoft Access is the best. It gives an easy layout to design a database.
Preview sample
Fargo Denver Setup Information Technology Essay
2 pages (555 words) , Download 2 , Essay
Free
The author states that the data to be transferred is 350,000 characters which amounts to almost 972.222kb. To transfer 972.222kb data in less than two minutes we can have an Internet connection that has an upload speed of 32kbps. These are standard calculations to choose an Internet connection.
Preview sample
Data Recovery Software Information Technology Term Paper
5 pages (1250 words) , Download 2 , Term Paper
Free
In contemporary business, the focus is on the implementation of technologies that offer a return on investment and address the basic IT needs such as infrastructure and support. In these fields, Computer Networking specialists are extremely needed. Now distributed applications based on Internet and Web services are popular.  
Preview sample
Advantages of open source software Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
As far as the democracy peace and economy is concerned open software provides access to better technology to even those who cannot afford them.Since,technology is crucial to the economy in terms of the cost it saves by increasing the end productivity;the better access to technology has increased the productivity and thus the GDP of the entire world.
Preview sample
Up-gradation of Our E-Mail System Information Technology Research Proposal
6 pages (1710 words) , Download 2 , Research Proposal
Free
There should be effective and constant communication among all stakeholders. Thinking should not be limited to technology available and should have an open outlook. A common aim and goal should exist between all parties concerned. Finally resources for handling integrated data if available will be very advantageous to the clients. 
Preview sample
Feasibililty analysis:computer implementation and server installation Information Technology Essay
9 pages (2250 words) , Download 2 , Essay
Free
Another large problem occurring in the warehouse itself is the sheer volume of sickness that is a result of inadequate provision of lifting equipment. This is not necessarily a catalyst for the sickness problems as every employee who takes on a position as a warehouse shipper/receiver knows they are susceptible to injury or occasional bought of missing work
Preview sample
Object Database Management System Information Technology Essay
8 pages (2000 words) , Download 3 , Essay
Free
A database is a set of records stored in a computer in an organized way, so that a computer program is able to consult it to answer questions. For better recovery and sorting, each record is generally organized as a set of data elements. The objects retrieved in reply to queries become information that can be used to make decisions. The computer program used to control and query a database is known as a database management system.
Preview sample
Large Scale Software Development Information Technology Research Paper
11 pages (2750 words) , Download 2 , Research Paper
Free
Provision of this vital resource will help her citizens acquire skills required for exploiting her vast resources amicably well. In the Kenyan nation, the system of education is 8-4-4, in this system of education the students first enroll for primary education for eight years, then the next 4 years, they enroll for secondary education.
Preview sample
Forensics Based On Evidence Gathered With Peep Attacks Information Technology Essay
15 pages (3750 words) , Download 2 , Essay
Free
Premium+
It is crucial to swiftly preserve digital evidence and conduct forensic analysis that any useful evidence is seized soon after the cybercrime has been committed. Furthermore, there are two phases of digital forensic analysis to retrieve useful evidence when facing a cybercrime attack in our scheme.
Preview sample
The Desktop Support Technician Information Technology Assignment
13 pages (3284 words) , Download 2 , Assignment
Free
The author of the paper states that it is also the employee’s responsibility to save her work in a location that is easy to remember. There are many tasks associated with the maintenance of files that don’t have much to do with the actual creation of the file. Backing-up files is one of these tasks.
Preview sample
The Infrastructure of Data Management and Data Mining Capabilities Information Technology Research Paper
37 pages (9250 words) , Download 2 , Research Paper
Idyllically, this type of data model is further derived from the more conceptual data model as needs to account for constraints like processing capacity and usage patterns. Data analysis is a common term for data modeling and this activity is actually more in common with the ideas and methods found in synthesis than it does with analysis. 
Preview sample
How the Internet Has Affected Communication Behavior Information Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
According to the report much available literature regarding use of the Internet and how it affects communications behavior has been based upon a polarized spectrum. Understanding online communications behaviors is daunting, since pre-existing psychological/sociological factors cannot really be ruled out.
Preview sample
Software Engineering Tutorial Information Technology Assignment
8 pages (2000 words) , Download 3 , Assignment
Free
For a program which deals with the machinery the author first talks of a system called Data-processing system. This system basically deals with a lot of data including numbers and characters which will only make sense, when they are well organized. Data-processing system is less applicable to the above system.
Preview sample
NYOB: A novel approach to addressing Privacy concerns in Online Social Networks Information Technology Essay
1 pages (250 words) , Download 4 , Essay
Free
Online social networking is an increasingly powerful tool of social communication and marketing that cannot be ignored by the corporate world any longer. However, this tool still continues to be marred with questionable privacy capabilities, making it difficult for corporate houses to use it to share confidential or sensitive information.
Preview sample
Internal Policies and Procedures Information Technology Report
7 pages (2033 words) , Download 2 , Report
Free
This Enterprise resource planning (ERP) system at the Ceramics manufacturing company was implemented 3 years back. The purpose of implementing ERP in the organization was to bring all the departments of the organization to the same Information systems platform, enhance the efficiency of the operations, get a proactive view of any upcoming material shortage and MIS report for any process.
Preview sample
Wireless technology and its impact on computer networking Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
Three quarters of a century later, civilization witnessed the birth of a new era, one which was largely ahead of its predecessor in terms of technological advancements. This new era as we all know it is the age of information technology.
Preview sample
Building Information Modelling Information Technology Dissertation
55 pages (13750 words) , Download 6 , Dissertation
The important operations being supported through the information technologies are the usage of software for the drafting requirements, building analysis and design, project scheduling and management activities, web-enabled services for business creation, supply chain management activities and also client management activities.
Preview sample
7351 - 7400 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us