StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Use of Computers Nowadays Information Technology Report
6 pages (1922 words) , Download 2 , Report
Free
The use of computers has been almost entirely concentric upon desktop and laptop PCs. Although it is true that servers and mainframe computers are able to synthesize and present cremation to localized networks and stream information via the World Wide Web, the use and application of such devices within the professional environment are limited
Preview sample
Software Requirements Specification Information Technology Term Paper
28 pages (6352 words) , Download 4 , Term Paper
For future use documentation such as the steps followed for development would be saved to be implemented in future projects. The steps are mostly general in nature and can be implemented in almost any system development process. Another section of the project that could be preserved for future use is the method used for cost.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Technical Paper Information Technology Essay
3 pages (750 words) , Download 3 , Essay
ii. OOP facilitates the maintenance and modification of existing code since the programmer can create new objects with small modifications to existing ones. iii. OOP provides an excellent framework for code libraries in which complete software elements can be simply adapted and changed by the programmer.
Preview sample
Use of RFID technologies for identification, tracking Information Technology Term Paper
5 pages (1250 words) , Download 3 , Term Paper
Free
Use of Satellites by the US military to Improve Battlefield Awareness The United States military has embraced satellite technology in ensuring improved battlefield awareness. Satellites are machinery installed in space to take pictorial outlook on the earth's surface.
Preview sample
MPI Shared Communication on Infiniband and Gigabit Ethernet Clusters Information Technology Essay
4 pages (1497 words) , Download 2 , Essay
Free
There exists an application of message-passing systems on distributed equipment with a distinct memory for implementing parallel programs (Gropp, Ewing & Anthony 1999, P. 19). In this system, every process of execution communicates and shares its facts with others by conveying and accepting incoming messages.
Preview sample
Social Engineering Aspects Information Technology Essay
4 pages (1114 words) , Download 3 , Essay
Free
The aspect of social Engineering is associated with tricks that people use to share as well as link out the information that in turn makes them susceptible to crime. The aspect of social Engineering just happening from diverse institutions in the technological world however is not good or evil since it carries both positive as well as negative norms.
Preview sample
National Initiative for Cyber Security Education Information Technology Assignment
3 pages (940 words) , Download 2 , Assignment
NICE is regarded as a national initiative with the main objective or aim of developing and augmenting the mien of cyber security through fast-tracking or hastening the obtainability and accessibility of edification as well as teaching materials and equipment geared towards enhancement and mending of conduct, expertise, and information awareness.
Preview sample
Network and Internet Security Information Technology Essay
5 pages (1482 words) , Download 2 , Essay
Free
A session key is a provisional method of encrypting data. When a consumer initiates an information exchange session, a key for that precise session is generated. The key is applied to all communication throughout that phase. It is also eliminated when the session is over. Session keys are characteristically symmetrical and uncomplicated as concerns cryptography.
Preview sample
Sensor Network Secure Routing Protocols Information Technology Coursework
18 pages (4816 words) , Download 3 , Coursework
Free
As an alternative of advancing the initial RREQ established, nodes by means of our secure course finding randomly choose single from initial n RREQs which it gets and treat as the forwarded RREQ. More, in particular, it spaces the inventor for the Route innovation in its direction-finding table via the preceding device for the selected RREQ s which is the next device destination.
Preview sample
Business Intelligence Dashboards in a Learning Organization Information Technology Research Proposal
7 pages (1750 words) , Download 3 , Research Proposal
Free
The author states that dashboards help determine if an organization is currently falling short of, meeting or exceeding the key performance indicators which drive the business towards success. Dashboards must have a simple, clear and usable presentation. Their design must be flexible enough to adapt to the evolving nature of a learning organization.
Preview sample
IP Addressing and Subnetting Information Technology Essay
5 pages (1250 words) , Download 3 , Essay
Free
An IP address is referred to as an internet protocol address. It is a numerical figure that is given to a device be it a laptop printer and so on, involved in a computer network and uses IP for communication. An IP address has some basic functions that include hosting and location addressing is crucial since any device connected to a network needs to have something that makes it be identified.
Preview sample
Semantic Web and Parallel Distributed Data Information Technology Research Paper
5 pages (1474 words) , Download 2 , Research Paper
Free
The main objective is to launch the web platform of data over its semantics in a machine-understandable setup that can be employed for problem resolving on the Web. In tally, the Semantic Web is devoted to offering an info distribution model and platform that is suitable for both machines and humans to comprehend and collaborate.
Preview sample
Network and Internet Security Information Technology Essay
6 pages (1500 words) , Download 3 , Essay
Free
As the author of the essay states, session keys are used to ensure that communication between two parties can be initiated when needed and terminated when there is no use of it. Besides, on of the main benefit of the session keys is that they limit the number of attacks on a system by making it difficult to attack a system.
Preview sample
Pollard Rho Algorithm Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
The most significant application of this algorithm is with Discrete Logarithmic Problem (DLP). It is a probabilistic algorithm which works by sequential iterations of a random quadratic function. Random coefficients are selected for a standard quadratic function which generates numbers, which are reduced modulo the composite number.
Preview sample
Information Technology and Human Resource Information Technology Research Paper
4 pages (1255 words) , Download 3 , Research Paper
Free
The rapid development in technology has made the world become so competitive that companies across the world are trying hard to get over each other by being distinctive in their respective field. Today, technology has both positive and negative impacts on different disciplines across the world including society, schools, and organizations.
Preview sample
Attack Plan on Goodwill Industries International Information Technology Essay
4 pages (1076 words) , Download 2 , Essay
Free
In short, just like many organizations of its scope, Goodwill is quite vulnerable to an attack. Its computer network contains millions of users, each with personal information that could very well be compromised if it cannot be adequately secured. A viable attack plan, at present, would most likely succeed until a fix is discovered and implemented.
Preview sample
Business Insourcing, Self-Sourcing and Outsourcing Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Knowledge personnel are workers who are reliant upon data or who expand and utilize information in the place of work. Self sourcing has a number of advantages which include: it improves requirement determination; it increases knowledge worker participation and sense of ownership; and it also increases speed of systems development.
Preview sample
My Online Personal Presence Information Technology Assignment
10 pages (2500 words) , Download 2 , Assignment
Free
I have my short-term goals simple, straightforward and related to my education. My basic idea is to graduate from the University of Salford with flying colors and move on to the next phase of my studies. The next phase of my studies is concerned with obtaining a master's degree in Advanced Computer Science and IT Management.
Preview sample
Data Communication and Cloud Computing Information Technology Essay
6 pages (1558 words) , Download 3 , Essay
Free
According to Ross and Blumenstein, Cloud computing has been an innovative disruptive technology that is changing how information and communication technologies are accessed and use as its perceived benefits include lower costs, scalability, portability and reduces software and hardware obsolesce.  
Preview sample
Impact of Sarbanes-Oxley Legislation Information Technology Research Paper
4 pages (1231 words) , Download 2 , Research Paper
Free
The enactment of the Sarbanes-Oxley legislation came in the wake of scandals in the corporate and business world. The Act, tabled by Senator Paul Sarbanes and U.S. Representative Michael Oxley in 2002, was aimed at monitoring the activities and operations of public companies. It was meant to increase investor confidence and increase reforms in public companies.
Preview sample
Enterprise Information Systems Information Technology Assignment
12 pages (3114 words) , Download 3 , Assignment
Free
An inter-organizational system (IOS) is a system that provides a technological infrastructure that facilitates the flow of information along the supply chain and thereby ensuring the smooth flow of goods. The main challenge facing these systems is the heterogeneity of the organization’s own IT architecture.
Preview sample
Emerging Technology -Facebook's Timeline Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
One typical corporation that has made the best out of the growing phenomenon of social media networking is Facebook, which recently added an emerging technology to its style of business in the form of what is termed Facebook Timeline. This is generally an electronic automated biographic feature that allows users of the social network to add critical personal information and data about their lives to the network’s platform in the form of cloud service.
Preview sample
Computer Architecture Information Technology Essay
6 pages (1627 words) , Download 3 , Essay
Free
An operating system refers to the concept of hardware activities that allow the hardware to be controlled by computer programmers. It also involves s the management of resources shared among computer users. There are related explanations about different issues that influence the process of designing the current operating systems.
Preview sample
Illegal Software Use Information Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
Illegal Software Use. In the modern research regarding the software piracy states that The Business Software Alliance has some interesting findings. The survey is conducted and the results revealed that around Fifty-seven percent of software users are using pirated software once in a life and around thirty one percent users confess using it always.
Preview sample
Evaluation of Cloud Networking Design, Security, and Architecture Infrastructure Information Technology Coursework
12 pages (3821 words) , Download 3 , Coursework
Free
The adoption of the cloud computing concept into IT networking is nothing but ‘Cloud Networking’. This service builds up the cooperative transmission, communication, and cloud data accessing through cloud networking. Cloud Networking decreases latency or network load. However, this new concept has many challenges’ in the future.
Preview sample
Vital Features of Digital Economy Driven by Digital Technologies Information Technology Assignment
8 pages (2000 words) , Download 2 , Assignment
Free
Decision support system (DSS) is meant to ease the organization’s decision-making process with the help of computer-based information system. It is used in mid and top-level management.  It can be fully automated or a combination of human effort and automation. An executive information system is a subsection of the subsection of management information.
Preview sample
Information Technology and Entrepreneurship in Nielson Norman Group Information Technology Case Study
7 pages (2044 words) , Download 3 , Case Study
Free
Intranets are vital in propelling social media interactions in modern economies. However, the services do not guarantee the acquisition of the set range of results in some fields of study. In entrepreneurship, the intranet serves to deliver different aspects that enhance the knowledge of the companies holds about the employment and service markets.
Preview sample
IT and Entrepreneurship - Issues Relating to Intranet Information Technology Essay
8 pages (2186 words) , Download 3 , Essay
Free
The World Wide Web (WWW) is considered to be a prime facilitator of free speech for many people. With the growing competitors and the escalating technological purview, the internet has emerged as a powerful tool that not only helps a business to complete its task efficiently but also facilitates an individual to keep a track of what is happening around.
Preview sample
Developing Potentially Highly Profitable New Systems Technologies Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Your Name Lecturer Name Subject Code Date How would you make a business case for developing potentially highly profitable new systems technologies that are based primarily on intangible benefits? How would you justify funding such a project and convince senior management to proceed with it?
Preview sample
Advantages Presented by IOS Systems Information Technology Assignment
12 pages (3476 words) , Download 3 , Assignment
Free
EIS can be used by the manager to support upper management planning of the firm’s strategic direction or assist manufacturing in controlling the operations of the plant. As a result, they also assist in recording routine transactions required to transact business, for instance, shipping, and fulfilling the customer’s sales orders, as well as office automation.
Preview sample
IT Project Success and Failure Information Technology Essay
12 pages (3194 words) , Download 2 , Essay
Free
The development of software is a crucial process that requires a great deal of planning and involves making some crucial decisions. One such decision that project managers have to make is deciding upon the methodology that they would adopt to make sure that the project is completed in the given time, budget, etc.
Preview sample
Information Security in Technology Information Technology Research Paper
5 pages (1327 words) , Download 2 , Research Paper
Free
Information security is one of today’s biggest threats in companies that depend on modern technology for the storage of important information. It is the job of a company to store important information concerning transactions made, the number of employees, and other managerial secrecy. Every company needs to have an effective system for preserving both information and physical security for the sake of its success.
Preview sample
Computer Sciences and Information Technology Information Technology Essay
5 pages (1380 words) , Download 2 , Essay
Free
DarkNet is a network of secretive websites that cannot be viewed on the regular internet. Sites on DarkNet are usually hosted on regular servers. However, to have access to them, one needs a special kind of software, something that will encrypt the traffic of every user and allows them relative secrecy (Thomas, 2013).
Preview sample
Project Part 3: Project Scope-Work Flow Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Free
There are different scopes of solutions supplied by the commercial workflow management systems. For instance, they only support documents, forms, or picture centered processes and other office automation functions. Additionally, most of the workflow management system products, do not support workflows that require functionality and data in legacy HAD systems.
Preview sample
Information Security Management Frameworks Information Technology Essay
4 pages (1115 words) , Download 2 , Essay
Free
The purpose of this program plan is to outline an efficient framework that will guide the healthcare industry in enhancing its cyber security and obtaining appropriate but cost-effective insurance coverage. It defines essential elements of an effective information security program without infringing the borders of law and other regulations governing it.
Preview sample
Privacy in Biometrics Information Technology Essay
8 pages (2133 words) , Download 2 , Essay
Free
Throughout history, humans have endeavored to propose different solutions to identify individuals from one another, and it has been an observation that every solution brought different challenges and a new form of biometrics. The history goes back to 1888 in which a French expert Bertillon “Anthropometrics” who used fingerprints. 
Preview sample
Attacks, Threats, and Vulnerabilities to the Organization Information Technology Assignment
4 pages (1229 words) , Download 3 , Assignment
Free
All businesses have an information system to help run their activities. This has proven to be very beneficial as it makes work easier and enables smooth running of operations. However, information systems have a loophole too. They are subject to multiple numbers of insecurities that could prove to be very disastrous for the business to which the system belongs should it succumb to a threat.
Preview sample
Comparison between Operating Systems: Linux, Windows & Mac Information Technology Essay
3 pages (903 words) , Download 6 , Essay
Free
Windows has a market share of around 90% and Macintosh holds a share of 8% and Linux is found in around 2% of the computers (TNW, World OS market share). Although Linux is the newest operating system it is based on UNIX which is over four decades old. Interestingly, as per unconfirmed reports over 90% of the websites are hosted on servers that have Linux as the operating system.
Preview sample
Monitoring quality / IT governance Information Technology Research Paper
3 pages (750 words) , Download 4 , Research Paper
Free
The main aim of a six-sigma application is to maximize the benefits of a project while minimizing the costs (Adams, & Gupta, 2003). The technique is much applicable in manufacturing projects given the reason that such projects in the nature of their operations and activities are repeated and identical.
Preview sample
Product Management & Information Systems - Module 2 Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
Digital products include digitised goods or services like financial services, books, software or mobile apps that are traded in the digital marketplace. Digital products lack the physical dimension; hence, the only room they take is the space within the hard drive and they differ from the physical product in that they are easy to obtain because they only need to be downloaded by the customer.
Preview sample
Place/Distribution & Information Systems Information Technology Assignment
3 pages (750 words) , Download 3 , Assignment
In some industries, middlemen such as retailers seem on the verge of extinction. The long predicted elimination of middlemen as opposed to the substitution of one type of middleman for another may just remain to be a dream rather than a reality. In this paper, middlemen are justified to continue being in existence due to their significant roles in the channel of distribution.
Preview sample
Information Systems Have Revolutionised the Way We Work Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
It is important to state that information systems have made people change the way they live due to the influence of this technology advancement. Technology has been considered very significant to human beings; in fact, people have integrated information systems in almost everything that they are doing.
Preview sample
Project Manager and System Analyst Information Technology Essay
11 pages (2923 words) , Download 2 , Essay
Free
System analyst ensures the company is protected from unhealthy competition by protecting the valuable information that guards the running of the business or organization. Systems analysts play an important role in merging business skills and computer know-how. Few have these skill sets, so those that do are in high demand.
Preview sample
The Ethical Aspect of Hacking Information Technology Research Paper
6 pages (1771 words) , Download 2 , Research Paper
Free
This research paper discusses the philosophy of justification of the end through its means. It highlights some of the laws that provide for the hacking process and explains their provisions for this process. The paper identifies the ethical aspect of hacking, whether the society considers it an ethical procedure or not.
Preview sample
Analysis of Green IT Information Technology Literature review
4 pages (1201 words) , Download 3 , Literature review
Free
Green IT stands for Green Information Technology and can also be referred to as green computing. It has various definitions, one being the study and use of computer materials efficiently and with less impact on the environment. It can also be defined as the study and practice of environmentally sustainable computing.
Preview sample
Cyber Attacks on America Information Technology Literature review
10 pages (2798 words) , Download 3 , Literature review
Free
The 11 September 2011 terrorist attack on the US exposed the vulnerability of the country to foreign attack in a way not witnessed in a long time. Since then, the public, media and even the federal government have been on alert to avert any future attacks by undertaking appropriate precautionary measures.
Preview sample
Windows Server Deployment: New Features of Windows Server 2012 Information Technology Assignment
7 pages (1750 words) , Download 10 , Assignment
Free
Premium+
According to (Schaefer 112-140) the new features of Windows Server 2012 that WAI can take advantages of are.The new Server Manager has the multi-server capabilities, which makes it easy to set up roles and features distantly to physical and virtual servers and also with this server it is easy to produce a server group.
Preview sample
An Overview of Big Data Information Technology Research Paper
4 pages (1165 words) , Download 13 , Research Paper
Free
In the past few years, the use of data is growing for carrying out a variety of tasks. Almost all organizations heavily rely on data they collect in different ways. In this scenario, big data is the huge volume of data that is collected from a variety of sources to perform a variety of tasks on it in order to derive some useful facts.
Preview sample
Electronic Piracy and Digital Media Information Technology Term Paper
3 pages (882 words) , Download 2 , Term Paper
Free
Electronic Piracy globally emerges over the last few years. Academic books are illegally copied because of their high prices. Piracy is an illegal act that involves consumption, manufacturing and distribution. E-piracy has become a problem where online producing industries find their products stolen. Paying customers to download these products and enrich pirates who steal the online products.
Preview sample
Serious Game Critique Information Technology Essay
3 pages (750 words) , Download 2 , Essay
In Kenya three educational systems were used in the early 1960’s. These were the East African Community (7-4-2-3) System and the Kenya 7-4-2-3 System. Later in the early 1980’s the 8-4-4 Curriculum was incorporated in the education system. Though these were in place, a parallel British education system was also being used in some private schools with ordinary level exams like the ‘O-levels’ (taken after 4 years of secondary school) and ‘A-levels’ (after 2 years of high school) (Mukudi, E., 2004).
Preview sample
7551 - 7600 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us