StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Instagram as a Social Networking Application Information Technology Coursework
3 pages (824 words) , Download 21 , Coursework
Free
Kevin Systrom and Mike Kreiger are the creators of Instagram, which was first launched in October 2010 (Albarran). According to Google stats, Instagram as in April 2012 had over 100 million active users and rapidly gained popularity (Linaschke). Instagram is the fifth application on Google Play to reach one million ratings (Albarran). 
Preview sample
Business Driven Technology Information Technology Research Paper
4 pages (1140 words) , Download 4 , Research Paper
Free
The retail industry is undergoing a key transformation due to the improvement in technology. Billions of users are embracing technology such as internet connectivity, mobile networking, and online shopping among others which are profoundly changing the way in which people purchase and companies sell their products and services.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Secure Internal Network and Entrepreneurshipp Information Technology Essay
5 pages (1361 words) , Download 3 , Essay
Free
Managers from Alstom, a French engineering firm that manufactured and designed the French high-speed train used the concept to map out the important technologies of the train and their independence. This is to allow them to identify which train to release to a strategic client with respect to a technology transfer project.
Preview sample
Security for Deploying Information Systems Information Technology Essay
9 pages (2272 words) , Download 2 , Essay
Free
As per the proposed network for an educational establishment, 24 hours availability is required for services related to digital libraries, online learning and web application. In order to implement a disaster recovery plan, replication of data and services is required. This is conducted by installing additional hardware in terms of a backup server that will replicate data on regular basis.
Preview sample
Windows Sharepoint Services Information Technology Research Paper
4 pages (1199 words) , Download 4 , Research Paper
Free
The person who owns the resource defines user principles and guidelines which will govern the use of the resource. The traffic manages caries out the routing according to the set rules.  For instance, the users in a particular department are routed to use a particular printer depending on the urgency and significance of the work to be printed. 
Preview sample
The Internet Speed and Wi-Fi Coverage at Camps and Dormitory Information Technology Research Proposal
7 pages (1936 words) , Download 2 , Research Proposal
Free
The paper also comprises a discussion of the various benefits that people in our camps and dormitory will enjoy as a result of the solution. The slow internet connection at our camps and dormitory could be caused by various reasons. Slow internet is often experienced when users do more that 1 thing whilst on the internet.
Preview sample
The Decision Support System for Maurice Hotels Group Information Technology Case Study
7 pages (1914 words) , Download 5 , Case Study
Free
Maurice Hotels Group has three branches that are located in Devon and Cornwall. Each of the hotels has about 100 rooms.  All the hotels are located on the seaside. The hotel’s current decision support system only focuses on the hotel assets and not customers. The hotel has opened a new branch on the south coast.
Preview sample
The Impact of Knowledge Sharing on Hotel Industry Effectiveness in UK Information Technology Literature review
10 pages (3017 words) , Download 3 , Literature review
Free
Despite a decrease in international arrivals during previous years, the trend reversed in 2011 and United Nations World Tourism Organisation (UNWTO) has forecasted a “continued growth in 2012” (Sloan, Legrand & Chen 2013). Similarly, major events such as Olympics and Queen’s Diamond Jubilee, have further boosted the industry in the UK.
Preview sample
Your thoughts concerning an intranet where employees can learn and mutually inspire each other Information Technology Essay
7 pages (1750 words) , Download 3 , Essay
Free
Intranets Name: Institution: Introduction An intranet is an internal computer network used within an organization. Unlike the internet that connects computers globally through the World Wide Web, intranets use computers among other similar media to connect different departments and sections of the organization to a central database thus facilitate the sharing of information among other resources.
Preview sample
Relational Database System Design Information Technology Admission/Application Essay
4 pages (1000 words) , Download 3 , Admission/Application Essay
Free
ECT uses the keywords to create and to manage the data elements and the data about its products and relevant transactions. ECT has the vision of improving the support for its varied client size. The database layout shows a variety of products and services, which the organization adopting the system will be able to operate in.
Preview sample
Information Systems Has Revolutionized the Way We Work Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
In this essay, the developments in information systems and how the technology has affected service delivery in businesses and government sectors will be evaluated. The paper will discuss the development and new discoveries that have shaped the current information system and its application in various sectors of the economy will be discussed.
Preview sample
SWOT Analysis of Yahoo Inc Information Technology Essay
10 pages (2513 words) , Download 3 , Essay
Free
Yahoo Inc has a grand of thirteen thousand and seven hundred employees in its store, a bench of over seven hundred million customers from across the globe, and the country’s fourth most popular and most visited website online. It stands in the category of Google.com and Youtube as the other two websites that attract more customers and attraction.
Preview sample
The Assumption from the Network Diagram Information Technology Case Study
5 pages (1561 words) , Download 3 , Case Study
Free
From there we shall identify the vulnerabilities from the perspective that we have been contracted to make the network secure. Another assumption from the topology would be the company is using an outdated network security policy. From the topology, the network has been set up poorly with very many access points into the system.
Preview sample
IT-related Professional Issues Information Technology Essay
7 pages (2037 words) , Download 3 , Essay
Free
The Information technology industry is one of the most rapidly changing industries. It is constantly evolving and developing and its dimensions ever-expanding and diversifying. This development has however not been accompanied by the corresponding legislation and ethical changes that streamline the interaction between humans and this technology.
Preview sample
Management Information System Information Technology Assignment
9 pages (2882 words) , Download 3 , Assignment
Free
There has always been a need to align the business company’s long-term Information Management Strategy with its overall corporate strategy in order to ensure success in today’s world of competition-driven through information technology. An information management strategy involves the use of some particular systems.
Preview sample
Universal Plug and Play and Its Weaknesses Information Technology Assignment
12 pages (3172 words) , Download 2 , Assignment
Free
One of the main weaknesses of universal plug and play devices is that trust on all other communicating devices which in most cases are not trustworthy. There is no software that can check whether the devices with which UPnP devices communicate are prone to attacks or not. Moreover, buffer overflows are an issue regarding the use of UPnP devices.
Preview sample
CommunicationsSummative Assessment Information Technology Essay
14 pages (3840 words) , Download 3 , Essay
Free
The food and drink sectors have been the highest contributor to Gross Value Added in the year 2012. Moreover, the UK economy has also witnessed the presence of too many small, medium, and large food and drinks setups in the last few years. This is mainly beach at an average UK resident spends 11.3% of his income on food and drinks.
Preview sample
Windows Server 2012 Proposal Information Technology Research Proposal
7 pages (1750 words) , Download 4 , Research Proposal
Free
Windows Server 2012 Proposal. Windows Server 2012, that is also dubbed as “Windows Server 8” is the sixth publication of Windows Server. Windows server 2012 is also recognized to be the server version of Windows 8 and again takes place of Windows Server 2008 R2.
Preview sample
Slic3r vs Skeinforge Information Technology Assignment
15 pages (3750 words) , Download 2 , Assignment
Free
3D printing also known as Additive manufacturing involves the production of three-dimension solid objects from a digital model through digital technology (Brian 45). The process involves piling of different shaped materials.
Preview sample
Biometric Authentication Information Technology Research Paper
8 pages (2488 words) , Download 4 , Research Paper
Free
Smartphones contain a collection of personal data, and also provide access to even more data that is stored on the internet. Today most mobile devices provide password-based authentication, which is becoming more vulnerable. Recent advances in biometric authentication make it a viable alternative to password authentication, and voice biometrics is one of them.
Preview sample
How Hacking Can Be Helpful Information Technology Essay
12 pages (3175 words) , Download 2 , Essay
Free
The majority believes that hacking is an unfair activity that primarily intends to intrude into someone’s privacy. However, a hacker is someone with advanced computing skills. Admittedly, many people negatively use hacking techniques to break into computer systems and the privacy of others without the parties’ knowledge.
Preview sample
Future of Biometrics in Network Security Information Technology Literature review
11 pages (2876 words) , Download 3 , Literature review
Free
Network security has become a major concern for many organizations in the world today. Networks form the heart of the organization and enclose crucial resources that must be protected from unauthorized access. The high intensity of network attacks has pushed organizations to invest in more secure systems that can resist external attacks.
Preview sample
Internet Security Issues Information Technology Term Paper
11 pages (2976 words) , Download 2 , Term Paper
Free
There are two primary reasons for adopting the field of computing professionals i.e. Interest and money (Adams, McCrindle 2008). Modern computer technologies are utilized for assembling, storing, and communicating information. Likewise, new technologies in the field of information technology (IT) are creating ethical dilemmas.
Preview sample
Designing the LC-415/505 Computer Information Technology Essay
5 pages (1656 words) , Download 2 , Essay
Free
Most of the concepts of the operating system become more complex as technology improves. Its difficulty applies in the application of software and connections in different stages of the pipeline. All the learners must understand different processes of the operating system and their extensions before learning a detailed concept of the internal implementation algorithms and data configurations in different systems.
Preview sample
The Server Virtualization Information Technology Term Paper
8 pages (2084 words) , Download 4 , Term Paper
Free
The hypervisor has ability of executing on bare hardware (i-e without installation of any operating system on computer system) known as Type one (1) or native virtual machine. Moreover, there are various hypervisors which can run on the top of the operating system installed on the hardware known as Type two (2) or hosted virtual machine.
Preview sample
Information Strategies Information Technology Coursework
5 pages (1313 words) , Download 2 , Coursework
Free
Information and consultation are distinct, they are interrelated processes. Which include management sharing of information with employees and consultation of managers and employees on issues of mutual concern? However, there are some challenges that employees and managers face in information strategy practice.
Preview sample
How people react to robots Information Technology Essay
7 pages (1750 words) , Download 2 , Essay
Free
According to the research findings, for the robots to fit in the future into the society, research should be done to investigate ways to make the robot touch more human-oriented, thereby, acceptable to people; this is because of the fact that most useful robotic tasks or interaction require a robot touch.
Preview sample
Business Analysis & Requirements Frameworks Information Technology Essay
7 pages (2126 words) , Download 4 , Essay
Free
Ambridge Software Ltd (ASL) has been declared as a software development organization whose specialization is to develop and tailor customized software in order to make them meet the needs of small and medium enterprises (SMEs). The managing director heads the top leadership, who has senior managers who report to reporting to her.
Preview sample
The Security of an Organizations Information System Information Technology Essay
4 pages (1228 words) , Download 4 , Essay
Free
The security of an organization’s information system or network system is critical and hence needs to be addressed with a lot of concerns to ensure business continuity. Having an effective IT disaster recovery plan is crucial to any organization. The most significant information such as customer records, financial information, or employee information is to be well protected.
Preview sample
Information Systems and International Development Information Technology Essay
5 pages (1298 words) , Download 2 , Essay
Free
The factors that make a state fragile include prolonged wars, for example, in the case of Somalia in Eastern Africa. The major issues that contribute to the phenomena of fragile states include lack of or poor development of ideas in a form, continuous conflicts within a state, and vulnerability among the members or citizens of a state.
Preview sample
Social Media and Security Issues Information Technology Term Paper
4 pages (1218 words) , Download 2 , Term Paper
Free
The cost-effective and instant communication over digitized networks has left other technologies far too behind, thanks to social networking which enable humans to communicate in a surprising and innovative way. An idea is available (Facinelli, 2009) that states it as “user-generated content or consumer-generated media”.
Preview sample
Central Network System for Sharjah Government Organization Information Technology Research Paper
32 pages (8498 words) , Download 2 , Research Paper
Automation of operation could be a costly endeavor for an organization. One factor that distinguishes system implementation from other expenditures is that it has a set of hidden costs. There are several variables that will determine the total cost for the project and system acquisition alone just forms a small percentage of the incurred cost.
Preview sample
The Global Data Model Articulates and Design Information Technology Assignment
11 pages (2725 words) , Download 2 , Assignment
Free
The design of the global data model articulates all the business processes, which either receives data or acts as the data presenters. It enables the Budget Company to make effective use of the data with strong, reliable relationships between the entities. It uses the Entity-Relationship Diagram as the major tool in the Erwin Designer.
Preview sample
Management and Modeling of Oracle Data Modeler Information Technology Assignment
12 pages (3149 words) , Download 3 , Assignment
Free
Oracle provides graphical representations of the user entities, virtual tables, inheritances including links available between classes. You are also able to describe specific parts of a model using the subviews option. The relations between all included entities and classes are clearly viewed using logical functions that include logical subviews.
Preview sample
Modern Cloud Computing Information Technology Research Paper
4 pages (1093 words) , Download 3 , Research Paper
Free
The cloud allows businesses and individuals to utilize software and hardware under the management of the third party in remote locations. These include webmail, online business applications, social networking websites, and file storage among others. This allows for the accessibility of information anywhere a network connection could be accessed.
Preview sample
William Hill Online Betting Company Information Technology Essay
3 pages (885 words) , Download 3 , Essay
Free
It is of significance to posit that this has been made possible by easy access to the internet as people from all corners of the world can easily place their bets. Though gambling is considered illegal in some countries, online gaming is allowed in most of the developed countries. This survey describes the general background of William Hill company.
Preview sample
User Experience with Online Ticketing Information Technology Essay
11 pages (3190 words) , Download 2 , Essay
Free
Online ticketing has become common in the recent past and many organizations including football teams have largely embraced the technology as it has more advantages. First, online ticketing is considered faster and safer. Clients can log in to the company’s website and check the categories of tickets that are available at their convenience.
Preview sample
Web-Technologies in Booking Systems Information Technology Research Paper
18 pages (5569 words) , Download 2 , Research Paper
Free
Waterfall methodology is chosen for this project because it enforces discipline since every stage has a defined standpoint and endpoint. It is also easy to identify progress conclusively by the development team, client and vendor. It also ensures that less time is wasted since no code can be written before requirements and design is done.
Preview sample
How the theories are used Information Technology Essay
9 pages (2250 words) , Download 3 , Essay
Free
The relationship between theory and research will also be looked into; and how research contributes to the development. Conclusions and recommendation will be drawn from the data collected throughout the research project.
Preview sample
ABC Health Care Information Technology Research Paper
6 pages (1500 words) , Download 2 , Research Paper
Free
ABC Health Care 1. Question One The main vision of addressing the security problems currently experienced at the ABC Health Care is to overcome the complications that the company is facing due to the hitches experienced in its networks. The main reason for the health care analysts of the institution in addressing the security requirement poised by the overall technical design requirements of the network is to improve its performance, as well as root out other non-performance factors of the network.
Preview sample
Team member encouragement Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
A project manager has the mandate to plan, manage, and ensure the success and timely completion of a given project. However, this proves to be a daunting task for most project managers. In my case as a project manager on the large multidisciplinary product testing team, I am having problems with two team members who are consistently late turning in weekly reports.
Preview sample
Cyber Ethics and the Use of Technology Laws Information Technology Essay
6 pages (1684 words) , Download 2 , Essay
Free
The moral issues surrounding copyright issues and the internet downloading of material copyrighted to individuals have been under great debate over a long period of time. The focus of this essay will be centered on the argumentative approaches that support the fact that ethics regarding to matters has both its pros and cons when viewed from the educative and economical paradigms.
Preview sample
Socio-Technical Design of Knowledge Work Information Technology Essay
4 pages (1311 words) , Download 2 , Essay
Free
The new system would see an upgrade of the company’s technological system to incorporate a system that would allow for data integration, imaging and automated flow of work (Painter, 1).   In order to achieve this, the company had to involve its entire staff in the accomplishment of the task at hand.
Preview sample
Network Design of SHFL Entertainment Information Technology Essay
4 pages (1045 words) , Download 2 , Essay
Free
We propose the connection through ATM because of its guarantee of a high-speed connection, being a packet-switched connection of about 622 Mb/s. SHFL will operate in its network by replicating data between its network sites. The data center will be linked through fiber optics. It will also have a large storage.  
Preview sample
Network Design of Two Companies Information Technology Coursework
4 pages (1096 words) , Download 2 , Coursework
Free
One of the companies is connected with three networks running RIP protocol for communication while the merging company has one OSPF-based network. Merging of networks with different routing protocols should be done in a way that the working of end users should not be disrupted and communication between the network remains transparent.
Preview sample
Project Management Methodologies Information Technology Essay
12 pages (3243 words) , Download 5 , Essay
Free
The document presents an introduction to the project management standards, similarities, and differences between the processes and knowledge areas being used by the project management standards. Moreover, the project management standards utilize themes, tools, and techniques for managing and monitoring the projects, the document contains a discussion and comparison of these tools and techniques.
Preview sample
Encouraging Young Adults to Make Healthier Food Alternatives Information Technology Literature review
11 pages (3588 words) , Download 3 , Literature review
Free
The purpose of the chapter is to conduct a literature review on unhealthy eating behaviors of young adults, the scenario related to food labeling within the United Kingdom, and the role of persuasive technology in encouraging healthier food choices in order to gain an in-depth comprehension of the prevailing circumstances.
Preview sample
Crowdfunding Web Sites Information Technology Essay
4 pages (1233 words) , Download 3 , Essay
Free
This term is derived from crowd-sourcing. Its core intention is to capture the interest of social networks to contribute money and also pool resources together to support a project essential to its social network mem­bers (Grier 2013). The crowd-funding website is therefore an online marketplace for users who are usually called project creators.
Preview sample
Cloud Computing - Wizni Incorporated Information Technology Case Study
11 pages (2843 words) , Download 3 , Case Study
Free
Cloud computing storage and associated risks with respect to information security were discussed. Likewise, the open-source cloud concept is also discussed in detail. Moreover, the total cost of ownership, management and configuration of computing devices is not required and most importantly, critical business applications can be accessed anywhere.
Preview sample
The Core Features of Blowfish Algorithm Information Technology Assignment
15 pages (3642 words) , Download 2 , Assignment
Free
Wi-Fi protected Access is a pre-shared key that employs RC4 encryption and key exchange TKIP. Likewise, TKIP is enhanced by increasing key exchange frequency. Moreover, WEP can be replaced directly, as in most cases compatibility issues may occur with older, slower hardware. WPA-PSK weaknesses are more difficult to compromise as compared to WEP.
Preview sample
7601 - 7650 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us