StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
E-participation model Information Technology Dissertation
3 pages (750 words) , Download 2 , Dissertation
In line with this, Suki and Ramayah (2010) explained that “perceived usefulness” is referring to the degree in which the end-users believe that the use of technology could improve his or her knowledge or performance whereas “perceived ease of use” is all about having the idea that the system is easy to use.
Preview sample
Open Source Alternatives for Small Business Information Technology Research Paper
12 pages (3000 words) , Download 2 , Research Paper
Free
This paper presents an analysis of three open source programs and all these programs are from different domains. For instance, the first application that this paper discusses is Ubunto that is an operating system. In the same way, the second application is application software and third is a utility program that is supported by a software application.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Services in Your Area Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
In addition, recommendations will also be provided for improving the services. Creation of a Diagram that Represents DSL and Cable Modem that Connects to ISP, Cable Organization and Telecom to the Home Router Source: (LChu.net, n.d) The above figure clearly represents how connectivity is shared among various departments.
Preview sample
Computer Crime and Personal Information Information Technology Article
6 pages (1763 words) , Download 2 , Article
Free
We live a highly technologically dependent lifestyle in the 21st century. Everything we do is somehow connected to the world wide web. As such, my privacy as a person has, for quite some time now, been floating around on the internet where it can be accessed by questionable persons. That is why computer companies work very hard to secure my personal information.
Preview sample
IT Project Management Assessment. UMCDF Information Technology Essay
3 pages (750 words) , Download 2 , Essay
A project is generally regarded as an effort or a way of managing along with organizing various resources. Project management represents the steps that are taken in order to complete a project successfully within a stipulated time period.
Preview sample
Agile Software Development Information Technology Dissertation
25 pages (6647 words) , Download 4 , Dissertation
Software development methodologies have been in existence for some time now. These methods were often developed as a result of finding easier methods and means of dealing with the development of software in the organizational setting. However, over the years, numerous approaches and methods have been introduced to help to ease the software development processes.
Preview sample
Forensics Research Project 2 Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
These tactics have been provided hereunder. 1. Developing a thorough plan for the preservation of the concerned data from the inception to the winding up of the corporation. 2. Establishing the level of "trust" while collecting data 3. Planning for future transition of digital data to new secured storage media (Brodkin, 2013).
Preview sample
Setting Off a Roadside Bomb Using Radio, Mobile Phones, Etc Information Technology Report
23 pages (6638 words) , Download 3 , Report
The smartphones allowing the third and fourth generation of wireless technologies have led to greater advantages in using them for data communication over large areas as well as in downloading of the necessary information as the devices allow the use of the internet technology as well. Thus preparing the bombs and then setting them off has become easy for the individuals and groups of enemies.
Preview sample
Different approaches to decision-making Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
The Do-It-Yourself (DIY) stores produce significantly varied outcomes. For instance, the Department stores with DIY dept produce very different annual incomes. Wal-Mart experiences an annual return to a tune of $405, while Sears and Target perform quite dismally.
Preview sample
Designing VB Applications across Multiple Platforms Information Technology Essay
6 pages (1671 words) , Download 2 , Essay
Free
It helps to improve the appearance of the source code. It helps the programmers to even out the application’s structure, the style of coding, and its logic. It enables the programmers to create a source code that is specific, easy to read, and explicit. Some of the advantages of implementing the naming convention system are: It supports the use of the tools used for searching and replacing, which has minimal possibility of incurring an error.
Preview sample
Identity Theft Destroying the Financial Security Information Technology Essay
3 pages (835 words) , Download 2 , Essay
Free
It is essential to state that one of the innovative ideas that have become quite popular in recent years involves the stealing of another person’s identity.  Identity theft involves the use of another individual’s personal information to gain access to financial and other information that would benefit the criminal.
Preview sample
Menu Driven Interface Information Technology Essay
4 pages (1000 words) , Download 4 , Essay
Free
The author explains the operation of the user dialog strategy, where the control of the computer application is transferred back and forth between the computer application and the user. A recent example is the implementation of the text style Microsoft Office 2007 / 2010 which changes the text accordingly.
Preview sample
How Pedagogical Principles Could Be Applied to Information Systems Information Technology Report
8 pages (2289 words) , Download 2 , Report
Free
Pedagogical principles can help for the management of information by different information system tools such as an intranet. These principles are already implemented in the different intranet-based learning environment for managing the learning components and for delivering learning materials. In organizations, pedagogic principles can be applied in several ways for improving the management of information.
Preview sample
Advantages Presented by IOS Systems Information Technology Assignment
12 pages (3476 words) , Download 3 , Assignment
Free
EIS can be used by the manager to support upper management planning of the firm’s strategic direction or assist manufacturing in controlling the operations of the plant. As a result, they also assist in recording routine transactions required to transact business, for instance, shipping, and fulfilling the customer’s sales orders, as well as office automation.
Preview sample
Prerequisites for Good Database Management Information Technology Assignment
7 pages (1415 words) , Download 2 , Assignment
Free
Among the factors that affect the speed of the system is the available RAM space. Usually, when a search operation is carried out there are a number of records that are loaded onto the RAM. Data that is mounted onto the RAM slows the speed of the system and affecting the overall performance of the system.
Preview sample
Youth cell phones compasny Information Technology Essay
4 pages (1000 words) , Download 3 , Essay
Free
Based on data provided, the following information was computed: YCP performance for the last five years Year ended Revenues (MUSD) No. of Subscribers Ave. rev. per subscriber 1998 80.0 100,000 800.00 1999 200.0 195,000 1,025.64 2000 270.0 330,000 818.18 2001 380.0 680,000 558.82 2002 750.0 1,970,000 380.71
Preview sample
Data collection methods Information Technology Assignment
5 pages (1250 words) , Download 3 , Assignment
Free
The paper operates mainly based on research questions which can be stated as follows: What instruments were used while describing the data collection methodology? What did the authors say about the reliability and validity of their instruments? What limitations did the authors face in data collection?
Preview sample
Sharing Ideas through the Internet Information Technology Research Paper
5 pages (1250 words) , Download 2 , Research Paper
Free
Its greatest strength sometimes also happens to be its biggest weakness. The biggest strength of using the internet and sharing ideas is that it is available to almost everyone. Even those who do not have access can go to public libraries or cyber cafes and log, on to the internet, to access their emails or social network accounts.
Preview sample
Detailed Comparison of 3G and 4G Technologies Information Technology Essay
10 pages (2813 words) , Download 2 , Essay
Free
At the present, the latest information and communication technologies are revolutionizing the entire world. Every day, we see the latest and most amazing technologies emerging. In this scenario, third-generation and fourth-generation are the latest wireless technologies, which have modernized the entire world.
Preview sample
Internet Protocol Version 4 and It Next Generation IP Information Technology Report
14 pages (3646 words) , Download 2 , Report
Free
For this reason, it was designed in a simplest and lightest form. However, after global adoption of IP version 4 throughout the world, it motivated researchers to review and redesign it. IP version 6 is a new or updated version of the previous version i.e. The protocol operates the network layer that is a third layer of the Open System Interconnection (OSI) model. 
Preview sample
Addressing Security Issues and Deployment Approach for WAN - Tyrell Corporation Information Technology Case Study
13 pages (3415 words) , Download 4 , Case Study
Free
Incident Management Group forwards the action plan to the BCP coordinator or Head of Departments for implementation. For Category ‘B’ Incident i.e. Natural Disasters or total outage of systems, networks and facility, the following are the procedure to respond to an incident of type ‘B’ category that requires relocation.
Preview sample
E-Maps vs paper maps Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
The aim of this paper is to show how the modern technologies affect our life and make it easier. The ability to define various locations with GPS and paper maps is one, which creates a sense of defining the locations and the capacity to locate a specific area. The paper maps generally worked better because it was more accurate in defining the specific locations.
Preview sample
The Manager as a Leader Information Technology Essay
8 pages (2000 words) , Download 5 , Essay
Free
The Manager as a Leader. Leadership is very important to any organisation and many people believe that a leader can be created. There are also different ways to define leadership. Clark (2010) defines leadership as “a process by which a person influences others to accomplish an objective and directs the organisation in a way that makes it more cohesive and coherent” (p.
Preview sample
Problems and Opportunities created by having too much data, and what to do about them Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Massive collection of data is also effective for business decision support. In this scenario the huge business data collections are used through some OLAP, data mining and data warehousing based tools. These all tools and capabilities lead to better business data management and issues handling.
Preview sample
Near Field Communication Information Technology Report
6 pages (1744 words) , Download 4 , Report
Free
This new revolutionary technology will contribute towards electronic commerce and may become a big player for businesses to earn revenue.  As per the standards we have discusses the semantics in terms of technical, positive, and negative factors. One example of a typical NFC reader is also demonstrated along with its specifications, features, and support for NFC technology.
Preview sample
The Social Web and Security Risks on People's Information Information Technology Literature review
6 pages (1793 words) , Download 3 , Literature review
Free
Organizations ought to do the same, but while doing so, keep in mind that there is a competitive push to using social media in appropriate and innovative ways. Simply from trends in social media usage, one can see the ever-increasing relevance of information privacy and protection going forward into this century.
Preview sample
Analysis of Robotic Technology Information Technology Research Paper
4 pages (1000 words) , Download 3 , Research Paper
Free
 These parts depend on the computer, electronics, and engineering knowledge integrated to help the robot perform different functions. Most of the studies done regarding robots and their ability to teach science and technology show positive results suggesting that robots are very helpful to teach students, especially programming languages. 
Preview sample
Information Technology Revolution Impact on the Third World Countries Information Technology Research Paper
5 pages (1250 words) , Download 3 , Research Paper
Free
According to the report people can state that the information technology revolution brings “up to the minute” knowledge. It makes individuals reason as “one”. This “one” relates closely to Averroes' idea of "Virtual Mind". Virtual with regards to the Internet falls under the term digital. Though present, it fails to be located in some places.
Preview sample
EISA: Knowing the Alternatives Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
The architecture mostly involves the better dissemination and management of data. Organizations that have adopted the EISA approach have experienced better performance and faster progression and growth in the market. This has improved their market status highly.
Preview sample
Computer Operating Systems Information Technology Research Paper
11 pages (3032 words) , Download 3 , Research Paper
Free
It is a set of different software’s which manages the hardware resources and different activities of the system. It monitors different application programs which run on the system. Operating system allots time to the tasks and monitors them so that the system works efficiently.
Preview sample
Functions of Input Controls Information Technology Assignment
4 pages (1000 words) , Download 2 , Assignment
Free
Input controls are meant to substitute the simple data entry in the form of text. Input controls are often used in response to the query variables. Input controls are usually available in the Hyper Text Mark-up Language (HTML) form elements.
Preview sample
Evocative Object - IPod (3rd Gen) Information Technology Essay
4 pages (1000 words) , Download 3 , Essay
Indeed, engineers, doctors, students, tutors, and other personalities have taken a big step in using technological advancements in their day-to-day lives. As such, the application of technology is unquestionable in the modern world as it drives almost all activities in every human department.
Preview sample
Website Interface/Ecommerce Re-design Information Technology Research Paper
4 pages (1000 words) , Download 2 , Research Paper
Free
Evaluation of this prototype is based on determining if clients are able to communicate effectively with a visible language; information communicated can be easily perceived by visitors to the site; the site is kept simple and principled; contents are written in short and concise phrases that customers can understand with ease and quickly; the design allow users to see for themselves the functions available for their use; both dynamic and static contents are used in concise to manage users’ attention; good navigation principles are used i.e.
Preview sample
Law and Policy Case Study Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
The organization should demonstrate commitment to ensure that its system adhere to legal policies and guidelines as set out by the organization and the government. The aim of the document is to highlight the legal environment such as laws, regulations and policies and its impact upon how an organization puts measures to achieve information and information systems confidentiality, integrity and availability.
Preview sample
Virtual World: Friendship Online Information Technology Research Paper
5 pages (1250 words) , Download 3 , Research Paper
Free
According to the report social Networks or Social Networking services have eventually become a part of everyone’s daily lives in the modern world of today. Social networks or social networking services can be defined as online facility or an online stage or a website which lays its focuses on the establishment and framing of social networks.
Preview sample
Reflection Paper in Terms of What I Learned in Software Access 2010 Information Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
A review of my abilities, skills, knowledge, creativity and innovativeness now convinces me that I have made significant progress in my understanding and ability to apply business information system in real life and solve related problems or challenges. This progress is attributed to the learning activities within the AC731 course and the appropriate teaching pedagogy which facilitated acquisition of theoretical knowledge and practical skills in business information systems.
Preview sample
Digipos: Revolutionizing the Retail Sector Information Technology Case Study
4 pages (1103 words) , Download 2 , Case Study
Free
Over the years, the company has grappled with challenges while upgrading systems to incorporate the needs of the retail business environment. For example, Digipos grappled with fixing its systems to suit the ever-changing needs of the clients. They also devised solutions to the problem by designing the quantum blade and the retail blade system.
Preview sample
Understanding Computers: Today and Tomorrow Information Technology Report
7 pages (1843 words) , Download 3 , Report
Free
Successful completion of the project requires the use of appropriate methodologies and web technologies proposed in various literature. For this particular project, I applied the various methods for the development of a secure website limiting the accessibility to only the company employer and employees.
Preview sample
Strategies of Social Networking Information Technology Assignment
7 pages (1973 words) , Download 2 , Assignment
Free
There are various ways in which people make money through social media marketing. It is important to note that not all money made by the company goes to their pockets rather they have to distribute this money through a chain of people who were useful in the implementation of the whole process. Some of the methods of making money include;
Preview sample
E-Commerce Merchant Server Software Functionality And High Cost Of Websites Maintenance Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Computer Science and Information Technology. This paper addresses the answers of two important questions relevant to functionality of a merchant server software and high cost of websites’ maintenance. Software packages for E-Commerce websites can provide the functionality of catalogue display, order and record tracking, and processing of payment via credit cards.
Preview sample
Ethical Hacking: the Three Shades White Hat, Black Hat, Gray Hat Information Technology Literature review
9 pages (2589 words) , Download 3 , Literature review
Free
The literature review itself focuses on detailed security justifications for white hat hacking; examples of effective and beneficial white hat hacking activities; the need for inputs from black hat and gray hat studies to make systems more secure; the persistence of security justifications for hacking in the literature; and some legal considerations tied to hacking (Sanger, Barboza and Perlroth, 2013; Navarro, 2013; Olson, 2012; Palmer, 2001; Brodkin, 2009l Lemos, 2002; Farsole et al.
Preview sample
New Developments in Radiology and Medical Imaging Information Technology Essay
3 pages (750 words) , Download 2 , Essay
According to the paper, the new release is made up of McKesson Radiology station, and the client side application for PACS solution which provide superior image display, work flow efficiency and system integration capabilities. The platform reduces the total cost of ownership of users through providing a scalable and flexible architecture.
Preview sample
Knowledge Management System Information Technology Essay
10 pages (2723 words) , Download 4 , Essay
Free
Generally, an organization should implement its KMS structure in a flexible manner so that the employees can easily share knowledge with one another effectually. Specially mentioning, technology has to be updated with concerning online security regarding the matter of preserving customer privacy policy.
Preview sample
Data Warehouses with Big Data Information Technology Term Paper
5 pages (1250 words) , Download 3 , Term Paper
Free
Big Data also involves the paradigm of developing continuously expanding storage system to accomplish the previously impossible storage and retrieval tasks. Big Data or advanced data warehousing systems of today are thus being benchmarked on the basis of continuous performance and versatility (Baru et al 2013). 
Preview sample
Applying Green IT Strategies and Applications to Wal-Mart Information Technology Case Study
15 pages (3739 words) , Download 2 , Case Study
Free
The biggest advantage that mobile devices incur into the business of Hyper Star is the communication facility that reduces the chances of carbon emission due to other devices like computers and laptops. Mobiles are being used for both work and social networking at Hyper Stars. The application of mobiles at various levels in Hyper Star is discussed.
Preview sample
Critical Infrastructure Protection Information Technology Assignment
3 pages (750 words) , Download 5 , Assignment
The incident left many Americans dead, and property worth billions of dollars destroyed. IBP USA (2003) reported that the incident did expose the United State’s vulnerability to terrorist attacks from both within and outside its borders. Reflecting on what happened on that fateful day; one is left wondering how it happened and where the security agents were at the time.
Preview sample
William Hill Online Betting Company Information Technology Essay
3 pages (885 words) , Download 3 , Essay
Free
It is of significance to posit that this has been made possible by easy access to the internet as people from all corners of the world can easily place their bets. Though gambling is considered illegal in some countries, online gaming is allowed in most of the developed countries. This survey describes the general background of William Hill company.
Preview sample
Network Routing Information Technology Assignment
11 pages (2841 words) , Download 4 , Assignment
Free
The head quarter is in Chelmsford (England) while news campuses are in Mexico City (Mexico) and Kuala Lumpur (Malaysia). This report will also give a brief explanation of the protocol and it pros and cons. Configuration of WAN and LAN components are also included.
Preview sample
Security Risk Analysis Issues Information Technology Outline
17 pages (4567 words) , Download 4 , Outline
Free
The risk involved should be analyzed in the network about cybercrime and its effects. Intrusion Detection methods suggest steps taken to curtail vulnerabilities in the system. Source determination and intrusion prevention procedures are designed as per the level of threat they pose. Network security has advanced to a vital part of network management.
Preview sample
Project Proposal for East Anglian Academy Information Technology Research Proposal
50 pages (10713 words) , Download 3 , Research Proposal
The recent government cuts on spending and red tape was making it frustrating for the school faculties as they were finding it increasingly difficult to be expected to do more with less resources. The new academy status was not an indication of poor Ofsted results, instead it was decided to detach the schools from the local government and become privately run and in control of its own finances.
Preview sample
8051 - 8100 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us