StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Novel Interaction Game for Kids Information Technology Coursework
5 pages (1250 words) , Download 3 , Coursework
Free
Overview Tangible Interactions refers to innovative forms of human interactions based on the physical manipulations of everyday objects (Ishii and Ullmer, 1997). Tangible interaction encompasses the use of physical tokens as user interfaces and provides physical manipulation of things which are common to people in order to create a Tangible User Interface.
Preview sample
What Is a Firewall Information Technology Report
5 pages (1358 words) , Download 2 , Report
Free
A compromise of the firewall could be disastrous to other less-protected systems on the subnet. This weakness can be countered; however, with the argument that lapses and weaknesses in security are more likely to be found as the number of systems in a subnet increase, thereby multiplying the ways in which subnets can be exploited.”
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Computer Sciences and Information Technology in Humanity Information Technology Research Proposal
6 pages (1601 words) , Download 3 , Research Proposal
Free
Power is one of the most essential in daily lives of human lives and their operations (Sarmento, 2010). More imperatively, power is utilized almost in every aspect of life ranging from domestic use in lighting to industrial use in production of goods. In this case there will be analysis of the electrical generator that can provide free electricity.
Preview sample
Information and Communications Technology in Diplomacy Information Technology Literature review
8 pages (2086 words) , Download 3 , Literature review
Free
Hence, they lag behind the academicians and business leaders, who are able to use technology to their best interests. While this is true for many developed countries, which possess cutting edge technology; political leaders and policy makers in relatively smaller countries, like Austria, Latvia have utilized the application of information technology perfectly well.
Preview sample
The Modern Era Is Characterized by Digital Communication Means Information Technology Dissertation
3 pages (1001 words) , Download 6 , Dissertation
Free
The modern era is characterized by digital communication means. In this regard, new methods and techniques are being introduced for purpose of faster and more reliable means of establishing communication. The technological advancements in the field of communication over digital mediums have taken different shapes.
Preview sample
Personal Security and The Internet Information Technology Research Paper
12 pages (3000 words) , Download 3 , Research Paper
Free
The internet is one of the greatest innovations of the 20th century. With the internet, almost all aspects of operations including business, security and communication have gone immense revolutions. The internet has made the traditionally manual works simpler and cost effective. However, the internet has its ugly side too.
Preview sample
Childhood Obesity as a Health Problem All over the World Information Technology Essay
5 pages (1333 words) , Download 2 , Essay
Free
The family category includes factors that are genetic and family rituals that encourage obesity among the members. Some of these rituals include a lack of family exercises. Obesity at the community level may arise due to the environment and factors of communal activities that may be encouraging most people to acquire this disorder.
Preview sample
Admissions Process at the University of Reading based in Microsoft Dynamics CRM approach Information Technology Coursework
7 pages (1750 words) , Download 2 , Coursework
Free
Admissions Process at the University of Reading based in Microsoft Dynamics CRM approach. As noted in the Browne report having independent platforms for every function or for every department can be cumbersome. It greatly inconveniences the users who at times have to serve in all schools or faculties.
Preview sample
End User System For Clean It services Information Technology Assignment
4 pages (1000 words) , Download 2 , Assignment
Free
This type of approaches is ultimately purposed to realize high-end computing being performed in an exceptionally secure and trustworthy environment in solving extremely complex problems.
Preview sample
Information Systems Management & Quality Information Technology Report
12 pages (3447 words) , Download 2 , Report
Free
The project of independent learning account had poor and at some point, it lacked the appropriate requirements. The requirements, in this case, were security necessities, and these facilitate favorable conditions for fraud. Similarly, the pathway project that had vague and unhelpful components that only attributed to increasing costs of maintenance with little users' input.
Preview sample
Information technology ethics Information Technology Essay
3 pages (750 words) , Download 3 , Essay
The concept of the cyber world and the Internet has revolutionized the World to a great extent. Every technology has some pros and cons. The above mentioned are the advantages of computer but there are also some weak points of this technology. The computers have mechanized the whole world too much and people heavily depend too much on computers.
Preview sample
How to Extract Evidence in Relation to HTTP, FTP, and SMTP Application Layer Protocols Information Technology Research Paper
7 pages (2267 words) , Download 4 , Research Paper
Free
There has been extensive research that gathers evidence by collecting and analyzing network traffic data logs. This analysis can be a difficult process, especially because of the high variability of these attacks and a large amount of data. Identification and Tracking of online digital identity have been a significant issue around efforts on cyber security.
Preview sample
(Institutional Affiliation) FORMAL REPORT COMPARING THE USE OF THE IDEF METHODOLOGY TO UML Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
(Author’s Name) (Institutional Affiliation) FORMAL REPORT COMPARING THE USE OF THE IDEF METHODOLOGY TO UML Abstract IDEF and UML techniques have become very popular in academic and industrial circles (Kim 2003, pg. 1). IDEF is made up of a family of graphical modeling methods that are developed to formally define and communicate vital elements of enterprise engineering projects (Kim 2003, pg.
Preview sample
Depersonalization and the Protection of Personal Privacy Information Technology Research Paper
5 pages (1549 words) , Download 3 , Research Paper
Free
Neubauer and Heurix (2011) further provided specific applications when they proposed a depersonalization system or pseudonymization of medical data to be used in health care institutions. The application is called Pseudonymization of Information for Privacy in e-Health or PIPE, which aims to provide a “traceable anonymity”. 
Preview sample
How you would attempt to keep a business from suffering a similar attack Information Technology Essay
3 pages (750 words) , Download 2 , Essay
What is also clear is that the attack was carried out by juveniles who overreacted to a rather casual remark by the website. This paper will focus on illustrating what was learned from the attack, as well as what can be done to protect other businesses and websites from a similar attack.
Preview sample
Complete Computer Network Infrastructure for a Real or Ficticious Business Information Technology Research Paper
20 pages (5030 words) , Download 4 , Research Paper
Free
Our IT strategy executes by defining the topology of the network. The topology will define the structure of the entire network along with preferred cable to be used. Secondly, hardware specification of all departmental workstations and will be carried out along with the cost.
Preview sample
Human-Computer Interactions Information Technology Essay
5 pages (1436 words) , Download 2 , Essay
Free
Hover tools have been used to ensure that the user interface is kept simple and tidy by concealing controls by default and revealing them only when users “hover” over areas in which they are required. A block of space was set aside on the interface so as to accommodate the action panel. It was placed to the side of the action’s target.
Preview sample
Comparison of Exception Hardware & Software in ARM Cortex-M3 & Altera Nios II Embedded Processors Information Technology Report
10 pages (2614 words) , Download 2 , Report
Free
Description of ARM Cortex-M3 Processor The Error handling software procedures for the ARM Cortex-M3 are described within the appropriate Developer’s Instructions within the ARM Information Center. Available:- http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0203h/Cihbbbc1.html The ARM Cortex-M3 Embedded Signal Processing microprocessor handles it's exceptions in the same way as other standard-architecture microprocessors, in that, during the normal flow of execution through a program, the program counter (PC) increases sequentially through the executable instruction sequence, obeying the specified branches to nearby entry points or branches to subroutines.
Preview sample
Review of Government Survey Results Information Technology Essay
4 pages (1183 words) , Download 2 , Essay
Free
The study design that used survey information that was collected on the whole population and not on a single data sample was quite reliable since it gives information on all expected cases. Information on teen pregnancy issues in other countries was also collected from their survey data which is again reliable.
Preview sample
Value of Information Technology and Management Information System to Accounting Information Technology Research Paper
5 pages (1554 words) , Download 3 , Research Paper
Free
These mainly include different methods, which are based on technology, people management, and decision-making in companies. Nonetheless, management information systems are tools, which a manager uses to collect information about different aspects of the company, including sales and personnel, among others, and analyze it (Moghaddam, et al 2012).
Preview sample
Aspects of Research Information Technology Essay
3 pages (750 words) , Download 2 , Essay
This is done so through number of steps which are formally called the research steps. Following these steps is vital towards accomplishment of the objectives. Research can be conducted in any field, ranging from medial to strictly science, or environmental or any other experimental grounds (Norwood, 2010).
Preview sample
Social Media Usage in the Workplace Information Technology Research Paper
5 pages (1250 words) , Download 3 , Research Paper
Free
Many people today use social media to connect to friends and families from different parts of the world (Abate et al. 2011, p. 6). In fact, the introduction of social media has made communication easier than ever before. It is certain that social media is impacting on almost every aspect of human life today; workplace, not an exception.
Preview sample
Evolution of Computer Technology Information Technology Essay
5 pages (1313 words) , Download 3 , Essay
Free
Computer technology has evolved over the last 25 years to provide the near-perfect conditions that are experienced in the current age. Much of the evolution that has seen the better performance of computers involves the improvement of the speed and performance of computers. Since computers process large amounts of data, most of the improvement is focused on processing speed, hence improving the performance of the computer.
Preview sample
Using Amazon Web Services to Improve Efficiency in Healthcare Information Technology Case Study
8 pages (2359 words) , Download 4 , Case Study
Free
Researchers, analysts, and organizations alike appear to agree that Amazon Web services, with great emphasis on cloud computing; will in the near future become a crucial trend having a huge impact on businesses and how they are practiced. Big technology organizations are by now making investments worth millions of dollars to facilitate these services.
Preview sample
Open Source Alternatives for Small Business Information Technology Research Paper
12 pages (3000 words) , Download 2 , Research Paper
Free
This paper presents an analysis of three open source programs and all these programs are from different domains. For instance, the first application that this paper discusses is Ubunto that is an operating system. In the same way, the second application is application software and third is a utility program that is supported by a software application.
Preview sample
Information System Theories Information Technology Report
10 pages (5705 words) , Download 4 , Report
Free
The literature shows that Information System is not considered seriously as an area of research previously. The important factors of the Information System explored the new ways of success to the business world and other organizations. Further research is done in this area and now it is internationally used in the globe as an international Information System (IIS).
Preview sample
System Analysis and Design in Business Information Technology Assignment
4 pages (1401 words) , Download 2 , Assignment
Free
In business, system analysis and design can be regarded as the process of monitoring the business situation to improve the procedures and methods of the business. This enables the business in improving performance and achieving its goals and objectives in terms of profitability and growth.
Preview sample
The Need for Wireless Standards and Protocols Information Technology Assignment
4 pages (1284 words) , Download 2 , Assignment
Free
International Standards of Organization has many departments that specialize in various fields to check the standards of various goods and services in the world. One of that departments is the department of wireless technology standards. This department sets and enforces standards that impact the wireless technology sector. 
Preview sample
The United States Army Corps of Engineers Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
The United States Army Corps of Engineers Name Institution U.S. Army Corps of Engineers The United States Army Corps of Engineers stands out as the single largest public engineering and construction management agency. It consists of more than 23 000 civilians and about 18 000 military trained personnel and headed by a Commanding General.
Preview sample
Wireless systems Information Technology Research Paper
7 pages (1750 words) , Download 2 , Research Paper
Free
The term wireless refers to the type of communication system in which instead of a physical medium like wires, information is communicated through electromagnetic waves over a part or whole path of communication. In broader perspectives wireless communication involves number of technologies with numerous applications yet basic under laying idea behind each technology and application is to information shearing.
Preview sample
Importance of Internet Security Information Technology Coursework
17 pages (4371 words) , Download 2 , Coursework
Free
Confidentiality- entails verification of information’s privacy. For example, the policy information in a company should only be known by the executive management. Integrity- Ensuring that a party gets is the original one that was placed there. For example, the patient information entered into the computer by a nurse is the exact information that reaches the physician.
Preview sample
The Creation Sweeping Data Networks Information Technology Assignment
5 pages (1332 words) , Download 2 , Assignment
Free
Numerous research tasks were carried out which served to populate the data foundation of the decision support system. The project integrated the research of numerous components for their contributions to the decision support systems. These classes and persons were managing, workers, competitors and the society at large.
Preview sample
Global Catalog in Fast-Paced Financial Companys Sites Information Technology Assignment
5 pages (1220 words) , Download 2 , Assignment
Free
Global Catalog implication involves entry for all objects within the FPF’s site forest but few properties are available for each entry. In this case, the developed forest shares a global catalog with other servers, which holds copies. Implicating the global catalog will require extra or more hard disk space.
Preview sample
Will money disappear and what will replace it Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Will Money Disappear And What Will Replace It? There has been a discussion on the issue of whether the money will finally go away. Money has existed for a very long time. After coins were used for a very long time, use of bank notes was eventually used to supplement coins.
Preview sample
What Intellectual Property Is Information Technology Essay
4 pages (1141 words) , Download 3 , Essay
Free
Intellectual property is the right recognized by law to protect an individual’s intellect. When someone comes up with an idea, a new invention, or an expression, the law protects other people from making use of such ideas without permission from the owner. Copyright, trademark, and patent are the three most recognized forms of intellectual property.
Preview sample
Wireless communication Information Technology Essay
12 pages (3000 words) , Download 3 , Essay
Free
The focus of this paper is to investigate the development of cellular phone systems since the inception of 1G, 2G, and 3G to the most recent 4G technologies. The paper also discusses the comparisons of the various techniques in terms of standards, data rates, multiplexing technology and core network among others.
Preview sample
Writing about pic-18 in computer desing subject Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
Essay: PIC 18 Microcontrollers [Student Name] [Instructor Name] [School] [Course/Number] June 3, 2015 Contents Introduction 3 History 3 Development 4 1.Base Line PIC 4 2.Mid-Range PIC 4 3.Enhanced Mid-Range PIC 4 4.PIC 18 5 Memory Variation for PIC 18 5 PIC 18 Harvard Architecture 6 Pipelining 8 Performance 9 Features and Peripherals of PIC 18 10 I/O Ports 11 Memory 11 Conclusion 13 Works Cited 15 Introduction A microcontroller is an in-built computer chip that is used for performing specific tasks such as displaying information through LEDs or any other remote controlled devices.
Preview sample
Innovation in Mobile Communication Industry Information Technology Case Study
17 pages (4776 words) , Download 5 , Case Study
Free
The mobile phone industry is highly motivated and grows from simple calls making devices to sophisticated machines for smooth use of the internet and playing high-quality games in it. In this research work, the case study is presented to analyze the Apple iPhone taken as an example. The analysis of the internal and external environment of Apple’s origination is made through PESTEL analysis.
Preview sample
Vertex Implementation at Starbucks Information Technology Article
2 pages (530 words) , Download 2 , Article
Free
Though the Vertex Indirect Tax Q series has been used in Starbuck previously, integrating it with Oracle ERP will enable the organization to get transaction-level consumer use tax evaluation on purchase and inventory transactions which is not possible under the old system. Like any new system that is being implemented, the implementation provided several challenges.
Preview sample
Geographical Information Systems Information Technology Report
8 pages (2226 words) , Download 2 , Report
Free
In this study, an imminent approach is determined that reveals the remote future and its role in the army. Furthermore, the achievements related to military technology and constructing robots in daily lives have an important role in the future of GIS. The profession of GIS includes important tasks and aims that helps to perform major duties called ‘GIS Service’.
Preview sample
Database Design Concepts British Insurance Company Information Technology Assignment
8 pages (2000 words) , Download 3 , Assignment
Free
According to the report, the second screenshot of the report illustrates the working of the function "Add new customer". When the system admin will click on the "Add new customer", he will be redirected to this page. The page will inquire about the following details. System Admin can also upload the picture of a customer.
Preview sample
Comparative Analysis between SAP System and Microsoft Dynamics System Information Technology Literature review
10 pages (2644 words) , Download 2 , Literature review
Free
Microsoft Dynamics and SAP Business One Microsoft Dynamics GP The latest version of Microsoft Dynamics GP is the version 12 that was released in 2013. It uses Microsoft SQL server 2008 and it is written in language called Dexterity. It is one of the four accounting packages that trade on the Microsoft Dynamics brand.
Preview sample
THE LEGAL ISSUE IN NETWORK SECURITY USA Information Technology Essay
3 pages (750 words) , Download 2 , Essay
To keep themselves safe and make things go as expected, it is important to have security of different level. A blend of physical, computer, communication, and network security together construct the information security. Not one defense type can protect the company; therefore the perception of total information security is vital to the success of the enterprise.
Preview sample
Cloud Computing: Security Issues and Solutions Information Technology Article
13 pages (3527 words) , Download 3 , Article
Free
The up to date tools and technologies provided by the information technology helped businesses to computerize and organize their business operations and consequently improve their business performance. Despite the fact that the ideas of remote working, processing, and communication are not new, because in every decade we have seen a lot of developments and efforts carried out in these areas.
Preview sample
The Shampoo-Bot Information Technology Essay
3 pages (750 words) , Download 5 , Essay
Free
The shampoo-Bot currently is on trial in japan to see how effective it works. Many have argued that it borrows from the car wash machine, but, all the same it is a descent innovation one must say. The hair care robot sounds a fascinating thing to hairdressers.
Preview sample
The Website of the Caf Cuisine: Goals and Objectives Information Technology Assignment
7 pages (1929 words) , Download 2 , Assignment
Free
The targeted audience of the website is the people used to have a restaurant’s food regularly or frequently. The age of these people lies between 16 - 45 years. The audience can be professional as well as a novice web user who understands email and how to use a web browser. The targeted audience is the people who can access the internet every day.
Preview sample
An Important Aspects of Lean Approach in Manufacturing Industry Information Technology Literature review
12 pages (3043 words) , Download 2 , Literature review
Free
1. Mass customization in manufacturing: According to Tseng and Jiao, mass customization refers to the production of goods and services according to individual customer’s needs while maintaining high mass production efficiency and saving costs and resources for the firm1.
Preview sample
Semantic Web and Implications Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
According to the study the World Wide Web is the greatest source of information ever created by human beings. The data is extensively available on the web pages and is easily accessible by anyone. But the size of the internet had become a curse for it. It takes longer time to search for required information. 
Preview sample
Routing Protocol Security OSPFv2 Information Technology Dissertation
3 pages (750 words) , Download 3 , Dissertation
Recognizing the OSPF as one of the most widely applicable Interior gateway protocol in most large enterprise network, the current work, delved into investigating the security measures often associated with the application of the use of OSPF v2 Routing protocol.
Preview sample
Sec 305 Week 4 assignment Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Among those who use an information system are the United States military and agencies of intelligence. They use the information systems to communicate, elicit intelligence and conduction of reconnaissance. To fully enable the information system fulfill the above objectives, satellites are used to achieve connections from different stations (John and Joe, 2002).
Preview sample
8151 - 8200 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us