StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Creating a Database - Shell Canada Information Technology Essay
4 pages (1095 words) , Download 2 , Essay
Free
It is quite essential to state that Shell Canada is one of Canada’s leading explorers and producers of petroleum products. Apart from being one of the leading producers of petroleum products in the country, Shell also engages in the sale and distribution of petroleum products in the country and beyond.
Preview sample
Digital Culture Issues Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Many people now are Making permanent decisions some of which are based on temporary conditions whereas others are based on permanent conditions. When these conditions created by the digital culture change they then start to realize that they caused more damage to their lives than the conditions did, as was in the case of cyber bullying.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Implementation of an Enterprise Resource Planning System Information Technology Literature review
8 pages (2315 words) , Download 2 , Literature review
Free
The International Accounting Standards have made it possible for applications such as SAP (Systems, Applications, and Products in Data Processing) to gain popularity. This is because not only does SAP faithfully comply with the provisions of the International Financial Reporting Standards they also provide the best practices and best methodologies for companies in the same industry.
Preview sample
Is Internet Anonymity a Myth or a Reality Information Technology Thesis
104 pages (10358 words) , Download 4 , Thesis
As the internet is used for online speech, forums, shopping, financial transactions, blogs, relay chats, and conferencing maintaining the anonymity of the user becomes essential. Apart from the primitive anonymity tools, the common anonymity tools include latency networks and multi-proxy aggregate services. 
Preview sample
The Services Provided by Cloud Computing Information Technology Assignment
14 pages (3801 words) , Download 2 , Assignment
Free
For accessing cloud computing online services via a web browser requires an updated or couple of years old workstation that supports all features of current Web browsers. For a fast and rich experience of cloud computing applications, a fast Internet connection is required along with an updated operating system with all critical updates installed.
Preview sample
Use of Google Documents Information Technology Essay
1 pages (354 words) , Download 6 , Essay
Free
Unlike MS Office suite which is mainly used offline on personal computers and laptops, Google Documents are created online and gives the flexibility to share the documents with anyone using a Google account and can be updated at the same time. It eliminates the need to e-mail documents to share with others and it can also be edited online by the shared users of the documents.
Preview sample
What Is Hiltons Core Business Information Technology Coursework
3 pages (945 words) , Download 5 , Coursework
Free
Hilton’s core business is to provide boarding and lodging facilities and related amenities to business people and travelers at a fee dependent on the desired level of service. Branding is critical in service industries such as the Hilton’s hotel business. Consumers use brands for the following purposes: to reduce the risks associated with staying at an “unknown” hotel;
Preview sample
How to Implement Antivirus Filtering Information Technology Case Study
8 pages (2097 words) , Download 4 , Case Study
Free
The invention of the internet has made life unimaginably easier, one can shop online, transfer money online, book movie tickets online, book airline tickets online, and in addition to this complete a host of other important tasks with just a few clicks. Websites like Amazon and eBay have taken online selling to the next level.
Preview sample
Competitive Advantage through Innovation Information Technology Essay
3 pages (1148 words) , Download 3 , Essay
Free
Corporations progressively demand that IT investments return business value in form of quantifiable results. However, it is an admitted fact that at the present, information technology is offering excellent support for the management of business activities. In addition, corporations use information technology to manage all areas of business.
Preview sample
Current and Fixed Assets Information Technology Essay
3 pages (750 words) , Download 2 , Essay
There are two main types of assets; fixed and current assets. There are other assets but these are the only two which are required in balance sheets to determine the growth of a company (Ingram & Albright, 2006.pp.292). Current assets are cash and other assets which are convertible to cash through selling or consuming but with no effect to the normal operations of the business.
Preview sample
Smart Grids. What is the Buzz on Smart Grids Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Smart Grids. The 21st century has brought with it a number of pressing new challenges. One of the prominent challenges is to develop more efficient and responsible uses of energy. An innovative response to this challenge is the smart grid. Smart grids are powered by digital technology that will allow service providers to monitor usage information and aid individual household’s power outages more quickly.
Preview sample
The Security Plan Development and Implementation for a Medical Records SAN Information Technology Report
9 pages (2774 words) , Download 3 , Report
Free
8 Roles assignment 9 System privileges 9 Object privileges 9 Part 5: Database Security Operations 10 Requirements and methodology for database logging 10 Requirements and methodology for activity auditing 11 Part 6: Data Isolation Policies 12 Requirements for data isolation 12 Database views 12 Database triggers 12 Database stored procedures 13 Part 7: Physical Environment for Secured Databases 13 
Preview sample
The Computer Rootkits Information Technology Report
8 pages (2274 words) , Download 2 , Report
Free
However, invention and implementation of technology has resulted to spread of viruses and worms. Rootkits is a form of malware which pose threat to computer management and networks (Bidgoli 19). This paper precisely discusses in detail “the state of a current computer rootkits, how it spreads, its impacts, how people are fighting it, and how technology pertaining to networks works.” 
Preview sample
Physical Architecture Layer Design Information Technology Coursework
3 pages (750 words) , Download 2 , Coursework
The paper explores on the different components of physical architecture design, network models, various architecture designs and the factors that affect the design of the physical layer architecture. Introduction The physical layer architecture design is used to specify how the system is distributed across the computers constituting the network of an organization.
Preview sample
Business Requirements for New System Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
The ability to communicate within the organization and acquire other relevant information about current and potential employees is an immediate need (Edwards et al, 2003). The second consideration is employee administration. Administration encompasses activities ranging from employee appraisal to task allocation (Edwards et al, 2003).
Preview sample
Process vs. Non-Process Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
No wonder, the task of process innovation requires long term commitment, dedication of resources and a propensity to engage in risk taking, which may intimidate even the mighty. The of late acerbic criticism of the scope and potential of HTML5 by Facebook owner Mark Zuckerberg and blaming the recent dwindling of the Facebook fortunes on its attempts to come out with viable HTML5 based mobile platforms amply testify to these trends (Geron, 2012).
Preview sample
Interest in Computer Forensics Information Technology Essay
4 pages (1059 words) , Download 6 , Essay
Free
The GCFA is the basic level and testifies the investigator is well-versed in forensics. Another, the GIAC Reverse Engineering Malware (GREM), enables the certificate holder to “hold the line” against malicious viruses and code. This works out well in the business environment as well as the law enforcement arena and is particularly valuable for systems administrators.
Preview sample
Google and its Evil Face Information Technology Essay
6 pages (1500 words) , Download 3 , Essay
Free
Google and its Evil Face. Google is an everyday tool that responds immediately to anyone looking for an answer with a solution making it the most-used search engine in the world by providing any search information or tool it can in an average of less than five cent-seconds.
Preview sample
Protecting IT: A Roadmap for Securing the Enterprise Information Technology Literature review
8 pages (2153 words) , Download 2 , Literature review
Free
AN I.T enabled enterprise is one that is fully integrated with the state of the art technological devices, machines and other components that enable completing the tasks easily and with little reliance on the manual methods. Having mentioned the characteristics of I.T enabled setups, these setups are equally vulnerable to outside threats.
Preview sample
Object Oriented Programming Information Technology Research Paper
7 pages (1750 words) , Download 3 , Research Paper
Free
The object oriented programming refers to a form of programming style or paradigm whose foundation is the representation of the programming concepts as objects. Each object in this form of interaction is referred to as an instance of a particular class of objects. In this paradigm, objects are those instances that are used to represent concepts.
Preview sample
Data Mining and Visualization Information Technology Essay
11 pages (2924 words) , Download 3 , Essay
Free
Given the rapid development of the internet, distributed databases have increasingly become a commonly used environment in many areas (Givano, 2003). Evidently, it has become a critical task to the mine association rules in the distributed databases. An Algorithm is defined as a definite list of a defined set of instructions used for completing a certain task.
Preview sample
Information management (MSIM program ) Information Technology Admission/Application Essay
4 pages (1000 words) , Download 2 , Admission/Application Essay
Free
Often, it has been viewed that the tools to efficiently organize information are missing or they are under-developed. Contextually, I am interested in ascertaining knowledge of both the aspects including how the information is gathered and how information providers deliver it to potential users.
Preview sample
A Level of Useful Inference upon a Given Idea Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
The author states that analysis and data mining within such a field can help to emphasize and/or underscore certain otherwise hidden consistencies. As a function of this particular type of inference, the researcher and subsequent users can draw a powerful level of understanding and create the possibility for medical resolutions.
Preview sample
Emerging Technologies: Peer-to-peer and Cloud Computing Information Technology Essay
5 pages (1372 words) , Download 2 , Essay
Free
Cloud computing includes the collection of data in a central place using third-party infrastructure and saves companies the trouble of procuring their infrastructure. It offers security in different forms, but there are challenges that are yet to be resolved and including unsafe APIs that are used by companies to access their data in the cloud. 
Preview sample
GCSE in Mathematics Information Technology Literature review
3 pages (750 words) , Download 2 , Literature review
Over the years, continued use of internet technology has been on the increase. This review is set out to describe a web system with an aim of developing an interactive website management system which will provide information of the GCSE in Mathematics for immediate communication among users.
Preview sample
Importance of Internet Security Information Technology Coursework
17 pages (4371 words) , Download 2 , Coursework
Free
Confidentiality- entails verification of information’s privacy. For example, the policy information in a company should only be known by the executive management. Integrity- Ensuring that a party gets is the original one that was placed there. For example, the patient information entered into the computer by a nurse is the exact information that reaches the physician.
Preview sample
Human-Computer Interactions Information Technology Essay
5 pages (1436 words) , Download 2 , Essay
Free
Hover tools have been used to ensure that the user interface is kept simple and tidy by concealing controls by default and revealing them only when users “hover” over areas in which they are required. A block of space was set aside on the interface so as to accommodate the action panel. It was placed to the side of the action’s target.
Preview sample
Attacking Cryptography Computer Security Information Technology Report
6 pages (1627 words) , Download 3 , Report
Free
The challenge with the data protection methods is that when two or more application programs are being executed concurrently, they share common resources such as the processor and the internal memory. As information shares the channels of transfer, there is a possibility of one program gaining access to the information in another program whether they have been encrypted or not.
Preview sample
Common Information Security Threats Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Attackers invent ways of hacking passwords, and steal information from different organizations. At the present, organizations face a number of security threats (Whitman, 2003), this paper explores the information security threats facing Apple Inc. Information Security threats According to Grimes (2012), the threats in terms of information security faced by Apple Inc include: The threat on data Attackers today have invented mechanism to alter data, this involves the data the company utilizes internally.
Preview sample
Global Insecurity and Digital Media Information Technology Essay
7 pages (2129 words) , Download 3 , Essay
Free
In situations, terrorists use the media to counter strategies laid down by their opponents. This shows the impact of media on national security and how it becomes hard to curb insecurity. According to this work, issues concerning national security relate very much to media because digital media contributes very much to ways of curbing insecurity and also contributes to increased insecurity.  
Preview sample
The Mobile Phones Information Technology Essay
6 pages (1872 words) , Download 2 , Essay
Free
In seeking to understand the impact that mobile technology has had upon the current environment and delineating the compliments of the most common smartphone, the iPhone, the following analysis will engage in a discussion of how this technology has come to impact upon culture and how the actual process of production for the iPhone takes place. Naturally, this discussion of the production and internal componentry of the iPhone.
Preview sample
How the theories are used Information Technology Essay
9 pages (2250 words) , Download 3 , Essay
Free
The relationship between theory and research will also be looked into; and how research contributes to the development. Conclusions and recommendation will be drawn from the data collected throughout the research project.
Preview sample
Windows Server 2012 Proposal Information Technology Research Proposal
7 pages (1750 words) , Download 4 , Research Proposal
Free
Windows Server 2012 Proposal. Windows Server 2012, that is also dubbed as “Windows Server 8” is the sixth publication of Windows Server. Windows server 2012 is also recognized to be the server version of Windows 8 and again takes place of Windows Server 2008 R2.
Preview sample
Network Design for UMUC Branch Office Information Technology Term Paper
6 pages (1426 words) , Download 3 , Term Paper
Free
The proposed network design allows for the development of a fast, reliable, and secure network. The switches further allow intelligent packet distribution minimizing inappropriate traffic between subnets whilst also offering local connectivity when there is some interruption in a segment. The firewalls permit security internal and external threats.
Preview sample
IIS Networking Infrastructure Design Project Information Technology Research Paper
1 pages (250 words) , Download 4 , Research Paper
Free
Integrated security and advanced information technology (IT) system and the incorporation of optical fibers have been selected as a probable solution for the company’s new infrastructure. The report presents the business needs, the needs of the customers, the operations of the company, the applications of the new facilities, and the organizational benefits that are expected to be obtained from the use of the new technology.
Preview sample
Efficiency of Clustering Algorithms for Mining Large Biological Data Bases Information Technology Research Paper
10 pages (2934 words) , Download 4 , Research Paper
Free
The accurate classification of sequences into classes is in recent times a necessity, and as a result, computer programs have been developed to help in automatic clustering. Various clustering algorithms-methods-have addressed the gene sequence clustering.
Preview sample
The Utilization of IPad in College Information Technology Term Paper
11 pages (2931 words) , Download 2 , Term Paper
Free
They have enabled achieving plenty and as a result are being employed in every discipline. I-Pads are the new addition to the classrooms which have enabled further utilization of technology in the field of education and the class room environment (Hess, 2011).
Preview sample
Network Security Plan Information Technology Case Study
9 pages (2523 words) , Download 4 , Case Study
Free
The network infrastructure in every institution is used to send particularly vital information. The infrastructure is vulnerable to threats like eavesdropping, tapping of network cable, and impersonation. These threats can lead to organizations losing their credibility on maintaining the security of their clients’ data.
Preview sample
The Malware Writers and Hackers Information Technology Article
5 pages (1250 words) , Download 3 , Article
Free
With the evolution in complexity, scale and span of computer technology it would be naive to expect that time has stood still for the hacker or malware content writer of the last century. It is a vast tract of technology and systems security that have gasped to keep pace with the enterprise and ingenuity of the present day cyber criminal.
Preview sample
Information Security - Application Supporting Statement Information Technology Outline
1 pages (250 words) , Download 3 , Outline
Free
The point of view of another organization that believes to be the “world’s largest education and career help desk”, DegreeDirectory.org, should be considered. It cites the Bureau of Labor Statistics (BLS) which estimated the salaries of various Information Security professionals.
Preview sample
The current State of Security in Smartphone Information Technology Term Paper
5 pages (1466 words) , Download 2 , Term Paper
Free
The installation of applications from unreliable sources makes the data vulnerable since the hidden motive behind the application may not be apparent to the user at the time of installation of the application. Some developers often piggyback Trojans with valid applications that make the smartphone perform malicious activities.
Preview sample
Effective IT Project Management Information Technology Case Study
6 pages (1772 words) , Download 4 , Case Study
Free
One project manager should be in charge of only one project to ensure the success of the projects. The company should provide outside formal training for project managers to ensure they carry out their duties effectively. Project managers should interact with customers to determine their needs and preferences and to carry out their duties in that manner.
Preview sample
Use Cases for ATM Service Information Technology Case Study
4 pages (1000 words) , Download 3 , Case Study
Free
Withdrawing money from an ATM involves the interaction and coordination of many heterogeneous system spatially and logically separated. It involves the interfacing of dissimilar components into one integrated super-system which functions as a money transferring unit.
Preview sample
Importance of Adhering to a Professional Code of Conduct of Ethics Information Technology Essay
5 pages (1424 words) , Download 2 , Essay
Free
Two responsibility categories are highlighted in the professional code of conduct; they include the profession, customer and the public. The minimum acceptable standards are established in the code of ethics governing behavior, practices and conduct expected. Without basing on the differences that exist in various professions, codes of ethics are on the ground that it is formulated on universal principles that are acceptable.
Preview sample
Operational and Implementation Problems Information Technology Coursework
8 pages (2000 words) , Download 3 , Coursework
Free
According to the paper modern business concepts necessitate the use of information systems to improve work efficiency and improve performance assessment process. Children healthcare services are not exempt to these challenges and issues. This paper discusses problems in referral and assessment services in children’s healthcare facilities and makes recommendations for smoother running of the systems.
Preview sample
Change Management and the Use of Appropriate Tools and Techniques Information Technology Coursework
3 pages (917 words) , Download 2 , Coursework
Free
A common saying is often used about change and it states that the only constant in this world is changing (Brown & Don, 2006). Without change, life and all its activities would come to a stagnant point. Change is a natural phenomenon and applies to all worldly bodies and affairs. Hence change is subjective. The Phenomena of change are equally applicable to the field of enterprises and management organizations.
Preview sample
IT - Hydro-Quebec Information Technology Essay
3 pages (893 words) , Download 2 , Essay
Free
Hydro-Québec has once again earned recognition for its sustainable practices by placing first in Corporate Knights magazine's 2021 ranking of Canada's Best 50 Corporate Citizens. Hydro-Québec is a public utility that manages the generation, transmission, and distribution of electricity in the Canadian province of Quebec, as well as the export of power to portions of the Northeast United States.
Preview sample
Method of Implementing QoS Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Purpose With too much reliance on the video data and other heavy natured content, these resources eat too much of bandwidth and have left the entire networks craving for more bandwidth and capacity accommodation. In such case the need is ever higher to ensure a smooth flow based on the category.
Preview sample
Primary Cyber Threats Information Technology Coursework
3 pages (1022 words) , Download 3 , Coursework
Free
The level of security or companies, especially of the airports, was changed in the entire world after the incident happened on 11th of October in 2001. After this, the internal security system of airports was pointed out by many people. They were talking about bringing a valued change in the internal infrastructure of the airports to confirm the security of passengers and others.
Preview sample
Post industrial and information society Information Technology Essay
7 pages (1750 words) , Download 2 , Essay
Free
Name Tutor Course College Date The two concepts of post industrial and information society are closely evident in the current society. The activities and developments experienced in the society today are as a result of features of post industrial and information society.
Preview sample
7751 - 7800 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us