StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Ethics of Artificial Intelligence & Machine Learning Information Technology Essay
1 pages (449 words) , Download 11 , Essay
Free
Currently, machines owing to their complex advancements over years have resulted in tackling varied and even intricate tasks challenging to human beings. However, this breakthrough has not prompted professionals especially in the field of machines rest but even work more to rectify significant shortcomings evident in robots and similar devices.
Preview sample
The Biometric Facial Recognition Process Information Technology Term Paper
5 pages (1483 words) , Download 2 , Term Paper
Free
There are various kinds of biometrics one of the most common being facial recognition. In facial recognition, the spatial geometry of facial biometrics is recorded. There are various ways of facial recognition but the common feature for all of them is the fact that they all rely on measurement of the distinguishable facial features. 
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Testing Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Test Essay Name: Institution: Test Essay Testing/User Testing Testing (software) is an analysis carried out to present stakeholders with facts concerning the quality of the product or service under investigation (Ammann & Offutt, 2008). Software testing can also give an objective, sovereign view of the software to permit the business to understand and acknowledge the risks of software realization.
Preview sample
Open Access, Piracy, and the Public Domain Information Technology Essay
4 pages (1151 words) , Download 2 , Essay
Free
Information has a long history in terms of the right to access. In historic times, the protection of information had far more serious implications than just financial implications. Governments and kingdoms protected their information in order to protect their territories from espionage. The modern information copyrights were however a result of commercial interests.
Preview sample
Change in User Interaction Using the Internet Information Technology Literature review
13 pages (3783 words) , Download 2 , Literature review
Free
The paper has a deep insight into human-computer interaction (HCI), which is the exploration of the interaction between humans and computer systems (Aghaei et al, 2012). Additionally, the World Wide Web is explored as part of the Internet that helps humans to interact through technological networks. The paper will be written based on research that includes a review of relevant academic and scientific literature.
Preview sample
Computer Sciences and Information Technology Information Technology Literature review
14 pages (4361 words) , Download 2 , Literature review
Free
As result Internet users are reluctant to share personal and financial information online and this impedes the growth of electronic commerce. Moreover, online shopping and information sharing provide businesses with a tool for gathering information for marketing purposes (Nam, Song, Lee, & Park, 2006). Cloud computing which provides Internet users with the ability to store and access data from remote locations is also compromised by privacy and security issues (Pearson, 2012).
Preview sample
The Public Changes as a Result of Digital Media Information Technology Assignment
7 pages (2092 words) , Download 3 , Assignment
Free
The emergence of web retailers with low prices has affected Brick and Mortar business as online retailers can sell at cheap prices compared to the physical stores. In addition, buying with just a number of clicks is more convenient for the customers and time saving hence many customers feel it convenient to buy online.
Preview sample
The E-Learning System and Student with Disabilities Information Technology Research Paper
5 pages (1250 words) , Download 2 , Research Paper
Free
The study proposes to test the relationship between the availment of e-learning programs and the impact on students with regard to measurable academic performance, personal skills leading towards independence and self-reliance, and eventual economic independence. Problems concerned with improving accessibility shall also be addressed. 
Preview sample
Computer Hardware and Operation Information Technology Essay
7 pages (2037 words) , Download 2 , Essay
Free
The monitor is determined as an electronic visual display.  For the standard user configuration, the monitor should be CRT based monitor and the size of the monitor should be 19 inches.  Similarly, the size of the monitor of the power user should be 19 inches as well but it should be an LCD monitor.
Preview sample
The Impact of Social Media on Project Management Information Technology Report
10 pages (3173 words) , Download 2 , Report
Free
The success of a project is highly dependent on the ability of team members to complete different tasks within time and schedule, without compromising the quality. It is hence, imperative for project managers to recognize the right human resources and to manage them properly. In such a situation, communication plays a vital party.
Preview sample
DigiPos Revolutionizing the Retail Sector Information Technology Case Study
4 pages (1057 words) , Download 2 , Case Study
Free
Stores closed during the process of changeover or upgrade which contributed to losses in revenue and the status of the firm. The upgrade was also expensive since all the system’s hardware had to be purchased and involved high technical maintenance at the cost of DigiPos. To offer a solution to these problems, DigiPos invented a Retail Blade.
Preview sample
Benefits and Limitations of Firewalls and DMZ Information Technology Assignment
4 pages (1491 words) , Download 2 , Assignment
Free
The augmented utilization of the Internet and the World Wide Web places networks at even larger danger of unwanted threats. Various companies distribute or publish information on the Internet (using websites), while the remaining companies have workers who distribute information on the Internet from the organization's network or download material from the Internet (Norton, 2001).
Preview sample
Resolve Conflicts and Promote Collaboration as an Agile Coach Information Technology Essay
5 pages (1418 words) , Download 3 , Essay
Free
Cohesion and mutual understanding are promoted among the team members such that they can pull their efforts toward the attainment of the desired goals. This will help them to share the same vision with the coach. The other strategy is that the coach should accommodate different team members so that they can also feel like part of the group.
Preview sample
IT Capabilities Transformation of Cloud Computing Information Technology Essay
10 pages (2734 words) , Download 4 , Essay
Free
Nevertheless, for organizations to achieve the benefits of cloud computing, organizations have to tread carefully and have the right map for migration to the cloud environment. Among other things, organizations have to develop enterprise applications that are suitable for distributed environments and appropriate data, information, and infrastructure architecture.
Preview sample
The Agile Method of Software Development Information Technology Essay
5 pages (1438 words) , Download 2 , Essay
Free
The agile method of software development should prove highly effective for the organization described in this case study due to the team’s tight deadline and the personnel shakeup.  Not only have product deliverable timelines been stepped up, but the leadership of the entire team is in doubt, causing each individual to question his or her own role in the project.
Preview sample
Success with Agile Project Management in General Dynamics Information Technology Essay
5 pages (1456 words) , Download 4 , Essay
Free
According to Cockburn (2007), agile project management has been termed and proven effective in software development. Agile project management involves stand-up meetings that bring together the development team, in addition to facilitating the spirit of teamwork that is core in software development. The stand-up meetings help in the undertaking of constant reviews and the performance of project assessments.
Preview sample
Change Management of Large Scale Enterprise Information Technology Essay
9 pages (2726 words) , Download 3 , Essay
Free
According to De Haes and Van Grembergen (2009a), the IT functionality of a business must be aligned with the needs of the business to improve the management of IT-related risk and its relationship with the business. Further De Haes and Van Grembergen (2009 b) state that the governance structures must be set strategically to align the IT to the business, manage risks, deliver value.
Preview sample
SCRUM, DSDM, and Lean Software Development Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
Different invaluable software has become an integral part of modern society since past two decades. Likewise, there exists several software development processes as compared to the past.
Preview sample
Design Issues in the System (Security) Information Technology Essay
5 pages (1250 words) , Download 3 , Essay
Free
The software designers implement access controls, firewalls, and / or encryption techniques to safeguard computer systems from intruders / hackers.
Preview sample
Menu Driven Interface Information Technology Essay
4 pages (1000 words) , Download 4 , Essay
Free
The author explains the operation of the user dialog strategy, where the control of the computer application is transferred back and forth between the computer application and the user. A recent example is the implementation of the text style Microsoft Office 2007 / 2010 which changes the text accordingly.
Preview sample
Prototyping Techniques Information Technology Essay
4 pages (1119 words) , Download 3 , Essay
Free
Considering the importance of prototyping many models/techniques have been developed to prototype the user interface of the software application (interactive system) for facilitating the human-computer interaction. From the various techniques of prototyping, three (3) techniques have been discussed by Maria Johansson and Mattias Arvola in 2007.
Preview sample
Risk Assessment for Incident Management Group Information Technology Case Study
11 pages (2953 words) , Download 2 , Case Study
Free
The computer network risk Assessment framework takes a holistic approach for accessing risks, threats, and vulnerabilities of the firm’s IT architecture. Likewise, this essential function incorporates a risk management framework led by a steering committee. This committee ensures that the risk management framework is operational, and up to date.
Preview sample
National Initiative for Cybersecurity Careers and Studies Information Technology Essay
3 pages (886 words) , Download 8 , Essay
Free
Cybersecurity remains one of the top national security challenges, taking charge of protecting computer networks and critical infrastructure from attacks by hackers, criminal groups, foreign nations and even terrorist organizations. This being a recent but rapidly growing specialty, there has been a need to identify, educate, recruit and retain an appropriate workforce (Jackson, 2011).
Preview sample
Remote Access Attacks Information Technology Essay
5 pages (1418 words) , Download 2 , Essay
Free
As we know, remote access attacks can debilitate any company but are particularly serious for small to medium enterprise.  This can be stated because they do not always have the budget to secure their network, yet they house confidential information that could be harmful to the operations of the company if stolen.
Preview sample
Mobile Devices Security Information Technology Literature review
8 pages (2280 words) , Download 2 , Literature review
Free
In addition to that, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (Zito) attack against Android users is an example of defeating the emerging technology to steal user’s credentials and ultimately money. It can also be seen that mobile devices can also spread malware. As such, this paper seeks to critically evaluate the impact of attacks on mobile devices on different individuals.
Preview sample
Critical Infrastructure Protection Information Technology Essay
3 pages (750 words) , Download 5 , Essay
b. Operations-The operational process of Department of Homeland Security includes integration, leadership and coordination of the broad efforts pertaining to enhancing CIKR protection in a broad manner. In addition, the operations also include development of risk management programs (GAO, 2011; Homeland Security, 2009).
Preview sample
Social Engineering Attacks and Counterintelligence Information Technology Essay
5 pages (1418 words) , Download 4 , Essay
Free
With the growth in technology, the world of crime has kept pace too. Criminals today are tech-savvy persons who update themselves with all the latest developments in the field of science in general and the cyber world in particular. With the cyber age, even the speed of crime has grown by leaps and bounds.
Preview sample
Using Wireshark To Solve Real-World Network Problems Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
Time synchronization is necessary because data packets are traveled from one-time zone to another. In order to address this challenge, a methodology named as packet marking will be implemented. Likewise, this methodology will integrate fractional information with data for conducting a successful traceback.
Preview sample
Application Project Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
There are four main reasons for software maintenance, namely; corrective, preventive, adaptive and perfective. There are six main processes of conducting the maintenance of software (Zhang, 2012). The first stage is the implementation process. This stage contains the preparation and transition activities of the software.
Preview sample
Data Breach of South Africa Police Information Technology Essay
3 pages (808 words) , Download 31 , Essay
Free
According to Rouse, “A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so.” As such, this paper seeks to discuss the data breach of South Africa Police and evaluate its impact on different people affected by this action.
Preview sample
Compare and Contrast Software Analysis Techniques Information Technology Essay
6 pages (1883 words) , Download 2 , Essay
Free
Adding up more to the story, the fifth bill came up with all the harsh statements of paying off the bill at once. With that story, the credit rating of that organization was in the hand of that wrongly programmed computer that was doing wrong calculations. After the detection of that fault in the fifth month, a software programmer was contacted and briefed with the entire story.
Preview sample
The Mobile Phones Information Technology Essay
6 pages (1872 words) , Download 2 , Essay
Free
In seeking to understand the impact that mobile technology has had upon the current environment and delineating the compliments of the most common smartphone, the iPhone, the following analysis will engage in a discussion of how this technology has come to impact upon culture and how the actual process of production for the iPhone takes place. Naturally, this discussion of the production and internal componentry of the iPhone.
Preview sample
Agile Methodology in Sapient Information Technology Essay
5 pages (1386 words) , Download 3 , Essay
Free
Sapient has developed its own methodology due to various reasons. The primary reason for developing the agile methodology was to remain competitive in the modern business environment. The company wanted to create all-around diversity pertaining to making all-around advancements in delivering its services in an effective manner.
Preview sample
Assessment of Best Practices and Available Tools for Compliance Testing Information Technology Essay
4 pages (1285 words) , Download 3 , Essay
Free
According to the U.S. Department of Veterans Affairs (2013), one of the best practices in ensuring Section 508 compliance is to apply Semantic HTML Markup. This helps particularly those website visitors “who use assistive technologies like a screen reader” (U.S. Department of Veterans Affairs 2013). Therefore, it is always a good idea to carefully select and double-check all the HTML tags used in the construction of a website.
Preview sample
Advanced Persistent Threats against RSA Tokens Information Technology Essay
5 pages (1538 words) , Download 3 , Essay
Free
Now and then, there is news of a major security breach resulting in an invasion of personal privacy data such as credit card details, emails, and vice versa. Despite securing the networks, workstations, and data centers, with the most updated and advanced security modules, there is still a probability of a new threat breaking into the network and void data integrity.
Preview sample
Denial of Service Attacks (DoSs) Information Technology Essay
7 pages (1750 words) , Download 4 , Essay
Free
Denial of Service Attacks (DoSs) One of the most well-known web server security attacks is known as a buffer overflow. Basically, a buffer overflow takes place when a software application attempts to store more data in a static buffer than its capacity to store or manage.
Preview sample
Agile versus Waterfall Information Technology Essay
4 pages (1000 words) , Download 4 , Essay
Free
It tells project management team what tasks they need to perform at certain level/stage of project life cycle (Hughes & Cotterell, 2002). In addition, there are many project management approaches that are used in different project scenarios. Every project management approach has similar stages but they are completed in different ways.
Preview sample
Trends in Health Information Systems and Applications Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Free
Trends in Health Information Systems and Applications The use of Health Information Technology to improve service delivery in the health sector has been on the increase in the past few years. The progress that this technology has made over the years on the administrative, financial and clinical operations in health care facilities cannot go unnoticed.
Preview sample
Differentiate the role of the System Analyst versus other I.T. roles Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
Free
This is a section of the paper that guarantees that the website has been accessed and confirmation is given by listing what can be seen on the website. SCR is an information technology consulting industry that provides IT resolutions train medium and small sized corporations (Shelly & Rosenblatt, 2012).
Preview sample
Customer Relationship Management of Warnaco Group Company Information Technology Essay
4 pages (1163 words) , Download 3 , Essay
Free
The research project argued that most technical staff members understand the significance of collecting information from clients, users, employees, stakeholders, and many others as the fundamental part of their job. This is through employing effective research design methods including qualitative and quantitative in gathering information.
Preview sample
Mobile Cybersecurity Information Technology Literature review
14 pages (3886 words) , Download 4 , Literature review
Free
With the advent of the third generation and now even fourth-generation a whole new realm of opportunities has opened. To top that cloud-computing has served as an icing to the cake. There is now a whole new and refined market place for mobile devices and their data-sharing. There are different kinds of threats that a user of these devices face.
Preview sample
Information Technology Revolution Information Technology Case Study
5 pages (1393 words) , Download 2 , Case Study
Free
Though it was the Western liberal education that revolutionized the scientific and knowledge-based approaches that redefined the developed world, yet, it is a fact that the process of acquiring education gradually got standardized and generalized over the years, extending meager encouragement to a yearning for self-study and need-based knowledge acquisition.
Preview sample
Evaluation and Risk Assessment Information Technology Research Paper
2 pages (722 words) , Download 2 , Research Paper
There are several websites and e-books on the Internet, where security professionals can research and discover proper approaches to information security. Companies that offer recovery and backup services have also posted various guidelines for risk identification and mitigation to limit adversarial impacts of insecurity on information systems.
Preview sample
Massive Open Online Course Information Technology Case Study
5 pages (1607 words) , Download 3 , Case Study
Free
Massive Open Online Course (MOOC) is considered to be a free online initiative aimed to update and teach individuals modern education theories and skills. The main aim of this paper has been to explore if/when a MOOC is right for an individual. With due analysis of the overall study, it has been determined that MOOC is one of the most convenient ways of learning or updating the skills of an individual sitting anywhere in the world.
Preview sample
Explanation Of Two Financial Giant Merger Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Information system is believed to significantly help the human resource to effectively manage a firm. In addition, studies have documented that customers are rational in consumption. They tend to shift from dormant organization, technology wise, to organizations that endorse technology.
Preview sample
Explain You Be the Judge as management of networks/people for storage of data for effectiveness of organization Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
First, he had created backdoor passwords and these were not in line with his job description. Although Childs had disagreements with the non technical managers about how the network should be build and managed, he did not have the right to do all the things he did such as having exclusive privilege passwords to the network, downloading passwords and intercepting his supervisors words.
Preview sample
Project Paper: How to Use Linux Operating Systems as a Network Security Device or Component Information Technology Essay
11 pages (2750 words) , Download 2 , Essay
Free
This paper intends to identify the ways in which Linux operating system can be used as a network security device or component. The history of internet is short but its growth has been explosive. The size of internet users has grown to millions and every year the figure is increasing at a rapid pace.
Preview sample
Wells Fargo and Wachovia Merge Information Technology Assignment
6 pages (1525 words) , Download 2 , Assignment
Free
From the discussion, it is possible to conclude that when Two Financial Giants Merge, they have to consider their “management of software/processes for processing of information for the effectiveness of the organization.” Failure to do so leads to poor performance and service \delivery to the customers.
Preview sample
Two Financial Giants Merge Information Technology Essay
7 pages (1858 words) , Download 2 , Essay
Free
Here, the systems are controlled through joint supervision with the reception of data from information systems across the merging organizations. For instance, when systems from Wells Fargo require information from those at Wachovia, they have to form new links between the business end the and control end of the two information systems.
Preview sample
Who Is Minding the Security Store Information Technology Essay
3 pages (750 words) , Download 5 , Essay
Free
Who is Minding the Security Store? An antivirus software update from McAfee failed on April 20th, 2010. This led to numerous computers running Windows XP to either reboot continuously or crash. The update reversed the activity of the antivirus software by turning it against Microsoft Windows vital components, rather than against malicious software (Harkins 70).
Preview sample
7801 - 7850 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us