StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
System Architectures - Cloud Software Architecture Information Technology Assignment
4 pages (1257 words) , Download 0 , Assignment
Free
The paper "System Architectures - Cloud Software Architecture" is a wonderful example of an assignment on information technology. There are various information systems that may be used by people to find their way through a certain place. However, the tricky part arises where they are required to do it using their mobile phones.
Preview sample
The Digital Divide Information Technology Essay
10 pages (2610 words) , Download 0 , Essay
Free
Several definitions have been used to explain this scenario like the following sentences highlight. Wolf & MacKinnon defines this concept as the presence of inequalities between the access to and the utilization of information and communication technology (ICT). According to them, inequalities in ICT may exist between countries and at the same time within countries. 
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Agenda Setting: Media and Power Information Technology Case Study
11 pages (3305 words) , Download 0 , Case Study
Free
Research in agenda setting has basically focused on the salient topics or issues discussed in the media, including the significant impacts that people associate such topics with. Agenda setting refers to the process through which media producers determine the issues or agenda that will be discussed in the media and which the audiences will consider as important.
Preview sample
Cyber Security and Digital Forensics Information Technology Coursework
8 pages (2358 words) , Download 1 , Coursework
Free
At present, cybersecurity is considered one of the crucial parameters for the acceptance of any internet technology. Indeed, in 2013 alone, studies have shown that dealing with malware will cost a global business up to $112 billion (Ashford). In particular, any node of attack in a wireless network provides an irregular behavior termed as malicious behavior.
Preview sample
Professional Issues in Information Technology Information Technology Assignment
12 pages (3322 words) , Download 0 , Assignment
Free
Today’s workplace is a diverse and dynamic environment far from what used to be the case a few years ago. There are more women in the labor force today. There are different people in terms of culture religion and age in the workplace today as companies hope to get the right combination to meet requirements or stay ahead of the competition.
Preview sample
Analysis of Voice over Internet Protocol - Security Issues and Solutions Information Technology Term Paper
19 pages (5203 words) , Download 0 , Term Paper
Free
The research has shown that various effective solutions can be implemented to ensure the security and privacy of communication carried out through VoIP networks however the implementation of these security solutions can require extra resources and can take additional processing time. As a result, the quality of services and data can be compromised.
Preview sample
Issues and Challenges That Information and Communications Technology Professionals Face Information Technology Coursework
10 pages (2927 words) , Download 1 , Coursework
Free
Through this paper, students will get a clear understanding of the issues in the ICT profession as well as identify the current trends in ICT as well as the ever-evolving technology and their impacts on the performance of organizations and institutions. Students will also obtain a sense of responsibility and develop a professional code of ethics.
Preview sample
Investigative Analysis of a Current Health Management Issue: Health IT Information Technology Term Paper
7 pages (2403 words) , Download 0 , Term Paper
Free
The methodology employed in this report is a qualitative approach. This involved wide and comprehensive research using authenticated journal sources, websites of government departments, as well as books. This report shall begin by proving a brief introduction to the subject. In the second section, this report provides an overview of health information technology (IT) in Australia.
Preview sample
Border Gateway Protocol - Main Stages, Finite-State Machine, Common BGP Problems Information Technology Essay
7 pages (3728 words) , Download 1 , Essay
Free
Biennium (2010) an autonomous system (AS) is a network or a set of networks that is under a shared technical administration and common routing guiding principle. BGP is often recognized as a path vector protocol though sometimes it can be classified as an expanse vector routing protocol (Berkowitz, 2005).
Preview sample
Performance in Service Management Layer Information Technology Essay
6 pages (1616 words) , Download 0 , Essay
Free
As the paper tells, business capabilities and IT management services are defined in this layer. The service management layer covers several aspects of management and monitoring of applications, services, processes, middleware, and infrastructure ad service tool for information technology in business management.
Preview sample
The Global Communication Enterprises Strategy on Information Security Information Technology Term Paper
11 pages (3405 words) , Download 0 , Term Paper
Free
Information technology is an area that is fast growing today. Organizations that have invested in the industry have a great potential for growth. The organization's administration should be structured in such a way that a relationship with external parties promotes an effective management policy to all information security aspects in the organization.
Preview sample
Current Trends in Information Security Information Technology Essay
8 pages (2475 words) , Download 2 , Essay
Free
The primary objectives of information security are; integrity, confidentiality, and availability. Confidentiality means that information that is stored in the system is protected against unauthorized users. Integrity means that the information that is available for an organization is whole or complete. In this case, the information remains unaltered or comprised by an unauthorized person.
Preview sample
Information Security - Risks, Security Plans, and Defensive Measures Information Technology Essay
14 pages (3842 words) , Download 1 , Essay
Free
Network security enforces constraints on computers which vary from other systems requirements as they mostly are applied as restrictions on what a network is supposed to undertake. Network traffic analysis and threat assessment should be done at regular intervals. The important element in ensuring network security is keeping the users of the system informed of possible threats.
Preview sample
The Need for Information Security Management for Small to Medium-Sized Enterprises Information Technology Literature review
17 pages (5027 words) , Download 1 , Literature review
Free
As highlighted by WatchGuard Technologies (2008), a lot of sensitive data is often compromised each year when enterprise employees accidentally forget or lose their portable devices such as USB sticks, smart phones, and in most cases laptops containing vital data either in cabs, hotel rooms, and even commuter trains.  
Preview sample
An Operational Strategy for a Defensive Cyber Campaign Information Technology Essay
8 pages (2000 words) , Download 0 , Essay
Free
The figure of noticed interruption across communal and confidential networks is rising at an alarming rate, while the expenses to defend against these interruptions are rising exponentially. Today’s most excellent cyber safety costs almost ten times as much as the malware it is planned to guard against (Gorodetski, et al. p. 59). This strategy is indefensible.
Preview sample
Network Protocol Services Information Technology Term Paper
8 pages (2379 words) , Download 0 , Term Paper
Free
The interconnection of computers to form both local area networks (LANs) and Wide Area Networks (WANs) is an intricate process involving network hardware, network software, operating systems, and user applications. The numerous differences in computers, network devices, operating systems, languages, and so on provide a major challenge to an effective networking environment.
Preview sample
Idea of Digital Democracy Information Technology Report
8 pages (2276 words) , Download 0 , Report
Free
This is because of the massive spread and easily accessible information that is acquired via the Internet as a Worldwide networking hub. Before, the adoption of mass media technologies such as the printing press, there were difficulties in communicating ideas. Political conversations, for example, were the highly affected purview of the elite.
Preview sample
Specifics and Opportunities of E-Paper Products Information Technology Essay
6 pages (1727 words) , Download 0 , Essay
Free
E-paper (which is also called the electronic paper or radio paper) is (together with e-ink) a type of storage and display technology designed to mimic the appearance of ordinary ink on paper. It is reusable, portable, looks like paper, and can be repeatedly refreshed by electronic means several times over.
Preview sample
The Digital Divide Information Technology Case Study
9 pages (2422 words) , Download 1 , Case Study
Free
Examples of these communication technologies include the telegraph and telephone, broadcast media like radio and television. Most recently, other networks have come up like the internet, social media which include Facebook, Twitter, etc. the last two decades, however, have seen explosive and huge growth in ‘information and communication technologies (ICTs).’
Preview sample
The Impact and Opportunities of Information Technology Information Technology Coursework
13 pages (3348 words) , Download 0 , Coursework
Free
In the past few years, the use of information technology has increased to an amazing extent in every walk of life. At the present, a wide variety of IT tools and applications are being implemented and used to carry out a number of tasks. In this scenario, the majority of business organizations and individuals are making the best use of information technology.
Preview sample
What Is New in Windows 7 Information Technology Essay
11 pages (3379 words) , Download 0 , Essay
Free
Windows 7 is technically an evolution of Windows Vista and considered the best version of Windows because it's faster, more powerful, non-intrusive, stable, secured, and retains just enough animation and attractiveness of Windows Vista (Pogue, 2010). However, these are just broad descriptions of Windows 7 and do not exactly tell what is actually new about it.
Preview sample
Analysis and Comparison of Search Engines Information Technology Essay
7 pages (2071 words) , Download 0 , Essay
Free
Information retrieval is the act of obtaining information resources relevant to the information needed (Korfhage 1997). Searching of the relevant information involves metadata, however; such is always connected with other links that may be relevant or irrelevant to the needed information. This is what Manning et al. (2008) term as Ads or Sponsored Links.
Preview sample
Professional Issues in Information Technology - Cloud Computing Information Technology Essay
7 pages (2058 words) , Download 1 , Essay
Free
The introduction of cloud computing has changed how people collaborate save data and implement various business models. In fact, small and medium businesses, as well enterprises are now tapping into the power of cloud computing. The rollout of cloud computing has created a disruptive wave of changes in the information technology sector.
Preview sample
Data or Information Visualization Information Technology Essay
8 pages (2316 words) , Download 3 , Essay
Free
The term visualization as defined by Maureen Stone (2009) refers to the field of study which applies graphical tools on represented, stimulated information via digital presentation. Visualization acts as a link for processing systems in the world. These processing systems are the two most crucial and powerful in the world, the human mind and the modern-day computer.
Preview sample
Belmont's Ruth Faulkner Public Library - Schedule, Membership, Special Services Offered in the Library Information Technology Term Paper
7 pages (2174 words) , Download 1 , Term Paper
Free
In the paper, the location of the library is outlined and the daily routine undertaken by the library users. The paper also explains the services offered in the library such as computer and internet services, printing services, Wii gaming, and special teaching classes. The two classes include the Yourtutor program and the lifelong learning program.
Preview sample
Modus Operandi of a Typical Winery Information Technology Report
8 pages (2000 words) , Download 0 , Report
Free
The use of cloud-driven sensory devices will also be beneficial to the company during the winemaking process. The use of the devices will be applicable in several steps of making the wine and hence improving the quality of the wine. During the fermentation process, the sensory devices can be used for the purposes of monitoring the temperatures.
Preview sample
Social Innovation Issues Information Technology Essay
7 pages (2145 words) , Download 0 , Essay
Free
The article titled “Inmates Cowed by Tasers & Torture” published in the Sunday Star-Times (New Zealand) on June 30, 2013, highlights different social innovation issues. This will help to identify how the different fundamentals of theories are reflected in real life and will provide a better understanding of the topic concerning real-world scenarios.
Preview sample
The Profile Picture of the Facebook Page Information Technology Lab Report
5 pages (1676 words) , Download 0 , Lab Report
Free
A good representative of the sample has been chosen randomly, ensuring that all needs of the investigation are satisfied and unbiased. The sample size in the current study is considered large enough since it forms a good percentage of the users. The sample is considered random since the researcher has not in whichever way influenced the response of any of the respondents.
Preview sample
Knowledge and Its Management System Information Technology Assignment
6 pages (1905 words) , Download 0 , Assignment
Free
Knowledge and its management is a discipline that promotes an integrated approach to evaluating, sharing, capturing, identifying, and retrieving all assets of enterprise’s information the assets may include previously un-captured experience in individual workers, documents, procedures, database, and policies. 
Preview sample
How the Internet Creates Communities of Interest, Helping to Forge Global Village Information Technology Literature review
7 pages (2077 words) , Download 0 , Literature review
Free
Human beings by nature are social beings and they tend to form communities based on shared common identity. Traditionally, communities were place-based referred to as neighborhoods but with the advent of the internet, communities are no longer bound by geographical boundaries.
Preview sample
Internet Censorship Information Technology Essay
9 pages (2672 words) , Download 0 , Essay
Free
In essence, internet use has proved to be invaluable in enhancing efficiency and effectiveness (Jones, 2008). Nonetheless, while the internet is widely celebrated for its potential, many governments across the world consider the internet a threat and have attempted to enforce censorship (Warf, 2011).
Preview sample
Critical Analysis of Google Company Information Technology Essay
9 pages (2629 words) , Download 0 , Essay
Free
Using innovations in advertising and web search, Google is currently a leading Internet destination and owns one of the most accepted brands across the world. Accessible to everybody who has an Internet connection, Google holds the world's major online directory of websites. Vise (2005) states the company presents productivity software.
Preview sample
Censorship of the Internet Information Technology Essay
8 pages (2483 words) , Download 0 , Essay
Free
Censorship can be defined as any action relatively taken by a particular society in order to control full access to crucial ideas and info. Restriction of access to important data is a move that can greatly benefit the entire society. Through control of pornographic content on the internet, children are less probable to get ruined by this content.
Preview sample
Censorship of the Internet Information Technology Essay
10 pages (2582 words) , Download 0 , Essay
Free
All through the past, a variety of approaches to suppression been employed to strengthen particular spiritual and opinionated plans. Technological know-how has often worked as a main obstruction and means for authorizing suppression. The scientific progression often ameliorates the inefficiencies and restrictions of the earlier period, it also can hasten unpredicted results.
Preview sample
Benefits of Playing Video Games Information Technology Term Paper
9 pages (2828 words) , Download 1 , Term Paper
Free
Today, video games have turned out to be a very important part of the majority of the youth. They have the tendency of spending more time with computers and consoles as opposed to reading books, studying, or playing other games. However, when a particular behavior becomes famous, there emerge people who oppose it and those who accept the idea.
Preview sample
Information Security - the Difficulty in Estimating the Probability of a Threat or Attack Occurring Information Technology Assignment
6 pages (1826 words) , Download 0 , Assignment
Free
Information security is the aspect of keeping and protecting information from unauthorized access, presentation, modification, and even destruction, which would attribute to huge losses mostly in organizations. As the paper tells, the qualities of information security are confidentiality, integrity, and availability.
Preview sample
Information System Strategy of HTC Computer Manufacturing Company Information Technology Case Study
13 pages (4114 words) , Download 0 , Case Study
Free
HTC Corporation is in the technology sector and this is a challenging field. As technology advances on a daily basis, it is paramount for HTC to keep up. Since HTC’s primary objective is to deliver quality and reliable high-end devices, smartphones, and tablets for this case, it is vital that HTC is informed of the latest technology available out there.
Preview sample
Operating System - Case of Windows 7 Information Technology Case Study
10 pages (2795 words) , Download 1 , Case Study
Free
Windows 7 enables the user to easily utilize the features found in vista. On the other hand, the management of the secondary memory is vital in terms of ensuring proper storage of data.  Windows 7 supports the use of various secondary memory appliances. Files management is also an aspect that the user is able to access the data as well as ensuring that easily access it.
Preview sample
The Alignment of Business and Information Technology Information Technology Coursework
13 pages (3615 words) , Download 0 , Coursework
Free
The increased demand for integration of business strategies with information technology has increased due to increased market competition in different industries. The alignment of business and information technology is aimed at increasing the performance of the company in the global market (Calder, 2005, p. 37).
Preview sample
Technology Advance and Networks Security Information Technology Coursework
6 pages (1920 words) , Download 1 , Coursework
Free
Many organizations are aware of the dangers of computer-related crime and are taking measures to ensure network security in an effort to safeguard their valuable data and that of their clients. It is also a measure to protect theft of intellectual property and other network resources from being destroyed.
Preview sample
Cybercrime - Investigating High-Technology Computer Crime Information Technology Literature review
17 pages (4857 words) , Download 1 , Literature review
Free
The perpetrator seeks to refuse users of these networks the ability to access and use available information for their benefit. This includes directing a very high bundle of traffic, thereby overwhelming the system and denying service to legitimate requests. Another class of service denial involves malicious attacks from attacked computers through distributive network access (Maras, 2012).
Preview sample
Information Technology Applied To Manufacturing Engineering Information Technology Assignment
12 pages (3266 words) , Download 1 , Assignment
Free
Information technology refers to computational data processing, business software, and decision support. Over time, Information technology has been useful in transforming all fields of engineering such as manufacturing engineering, civil engineering, electrical and telecommunication engineering, and graphic designing, among others. 
Preview sample
Cloud Computing: Overview and Risk Analysis Information Technology Literature review
6 pages (1728 words) , Download 1 , Literature review
Free
The emergence of cloud computing has rapidly changed everyone’s intuition of infrastructure structure, development paradigms, and software delivery. According to Fernando, et al. (2013), pursuing the transformation from mainframe computers to server deployment paradigms, cloud computing contains elements from automatic, utility, and grid computing into an inventive deployment architecture.
Preview sample
Various Aspects of the Website the 2f2f Information Technology Case Study
15 pages (4018 words) , Download 0 , Case Study
Free
The site shall cover some cars in-depth, features and specification, manufacturers, and other related information about such high performance, high-speed exotic cars. This document shall cover various aspects of the website, color scheme, textual content, images, logo and design, and more aspects that will make the website a success or at least what the site owners envisioned the site would be.
Preview sample
Software as a Service vs Outsourcing and Commercial Software for Payroll System Information Technology Essay
6 pages (1690 words) , Download 1 , Essay
Free
Since the introduction of computers in the early 1980s software development has always been at the center of every invention (Craig 2001).  The software basically is a term used to describe the various program types that operate the hardware components of a computer that broadly can be categorized into application and system software.
Preview sample
Information Technology and Information System Security Information Technology Coursework
8 pages (2320 words) , Download 1 , Coursework
Free
Due to the spreading of news about the latest computer viruses, information attacks, and new vulnerabilities as well as updates needed for operating systems as circulated across the globe, it becomes necessary for individuals to develop appropriate security mechanisms to protect their computer systems and information resources against threats.
Preview sample
Implications of Building a System from Finders Information Technology Research Proposal
9 pages (2588 words) , Download 0 , Research Proposal
Free
The arrival rate of data must be lower to ensure the stability of each tag in the collecting stations. The safeguard introduced in FINDERS for this type of problem is packet dropping when the queue is full or near overload. Those packets with the highest FTD or fault tolerance degree are dropped whenever the queue is full.
Preview sample
Surveillance through Facebook, Twitter, and Other Social Networking Sites Information Technology Literature review
12 pages (3000 words) , Download 0 , Literature review
Free
As more people get access to internet-enabled mobile phones, social networking is just a click away. These sites are used for maintaining contact with acquaintances, uploading photographs, blogging, and updating the status of everyday occurrences. The users of these social networking sites in their interaction with one another, reveal private information for all to see.
Preview sample
E-Commerce Sports Store Website Design Information Technology Case Study
6 pages (1578 words) , Download 0 , Case Study
Free
This section will also establish the specific design entities required for each of the concerns and how the functions by the administrators and users relate to each other. This will include information on the functions’ design for the users of the website, the design elements for the functionalities, relationships, attributes, and appropriate design languages for the services on the website.
Preview sample
Azez the Wonder Boy - Site's Target Audience and Competitive Analysis Information Technology Case Study
6 pages (1585 words) , Download 0 , Case Study
Free
The site shall also have a blog for Aziz's fan base to follow him and keep find out about his endeavors. The website shall be called Azez the Wonder Boy. The URL of the website has not yet been decided on and the domain shall be booked as soon as consultations with the client are completed. The purpose of this document is to guide the building of the website Azez the wonder boy.
Preview sample
701 - 750 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us