StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Use of Law Enforcement Cameras Information Technology Report
9 pages (2556 words) , Download 2 , Report
Free
In the context of USA law, privacy is defined as ‘a civil liberty, a right to be free of outside interference’ (Regan 4). In 1995, the British government defined privacy as incorporating two rights: ‘a) the right to be free from harassment and b) the right to privacy of personal information’ (Stanco 3).
Preview sample
Design of a Backup Program in Batch File Running on MS-DOS Information Technology Essay
4 pages (1180 words) , Download 2 , Essay
Free
It is a fully documented program with a bat extension. In the user interaction, it checks if the user back up directory is available, then proceeds with the backup process. In the absence of the backup directory, it asks the user for an alternative directory. This program is in the complicity level three since it can create a batch file.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Impact of Big Data on Healthcare Sector Information Technology Essay
12 pages (3677 words) , Download 4 , Essay
Free
In fact, data and information are believed to be the most important asset for business organizations for the reason that they make use of these data to drive useful patterns on the basis of which they take effective decisions. Because of the latest tools and technologies such as the Internet, this world has turned into an information based age.
Preview sample
Gambling in Cyberspace the Ethical Dilemma Information Technology Essay
6 pages (1657 words) , Download 2 , Essay
Free
As more and more people can access the internet, there has been an increasing need of examining what is proper and what is wrong for users of the internet to do, as well as the general social and economic impacts of information technology. With the technological advancements, it has become increasingly important to understand ethics related to this phenomenon such as concerning privacy and security issues (Lim, 2007).
Preview sample
Information Systems and International Development Information Technology Essay
5 pages (1298 words) , Download 2 , Essay
Free
The factors that make a state fragile include prolonged wars, for example, in the case of Somalia in Eastern Africa. The major issues that contribute to the phenomena of fragile states include lack of or poor development of ideas in a form, continuous conflicts within a state, and vulnerability among the members or citizens of a state.
Preview sample
Privacy in Biometrics Information Technology Essay
8 pages (2133 words) , Download 2 , Essay
Free
Throughout history, humans have endeavored to propose different solutions to identify individuals from one another, and it has been an observation that every solution brought different challenges and a new form of biometrics. The history goes back to 1888 in which a French expert Bertillon “Anthropometrics” who used fingerprints. 
Preview sample
Twelve Security Attack Trends of 2011 Information Technology Essay
9 pages (2250 words) , Download 2 , Essay
Free
GSM Security 15 7. References 19 PART I 1. Twelve Security Attack Trends of 2011 The first security threat is from the man in the browser (MITB). It is the attack on browser software used for accessing internet. Leading browsers are Microsoft Internet Explorer 8.0, Chrome from Google, etc.
Preview sample
Information Security Risk Management Information Technology Case Study
15 pages (3771 words) , Download 4 , Case Study
Free
What is ISMS? The ISMS consists of Policies, Processes, Guidelines, Standards, and tools. Likewise, in order to make this system a successful part of information security management system, it contains five key elements. The first component is CONTROL. The control establishes a framework and distributes responsibilities in order to develop an environment for implementing the ISMS.
Preview sample
Computational Modeling of Cerebellar Modelling Articulation Controller and its Application Information Technology Dissertation
54 pages (9496 words) , Download 4 , Dissertation
Today, the progression of robotics through the research of Artificial Intelligence is remarkable. The development of the computer has transformed the theories of great thinkers to VR. Capek’s robots were indeed a precursor to cerebellar modeling in theoretical fields of study, particularly in studies of robotics applications in AI.
Preview sample
Internet Banking Security Information Technology Essay
12 pages (3000 words) , Download 3 , Essay
Free
According to the research findings, it can, therefore, be said that the Internet Banking System of a bank requires continuous improvements in the security domain, as customer data is processed and transmitted over the Internet. Likewise, they need to mitigate any associated risks that may directly or indirectly affect the end user transactions.
Preview sample
Aspects of the APIs Based on Standard API Principles Information Technology Report
13 pages (3772 words) , Download 3 , Report
Free
According to Hans-Christian Jetter, application programming interfaces (APIs) are the interfaces to existing code structures, such as widgets, frameworks, or toolkits. Therefore, they very much do have an impact on the quality of the resulting system. So ensuring that developers can make the most out of them is an important challenge(Jetter,2011).
Preview sample
How cloud computing will affect businesses Information Technology Research Paper
5 pages (1250 words) , Download 6 , Research Paper
Free
Charles Babbage went on to propose another machine called Analytical Engine that is termed as the mechanical digital computer – the field of computing was born and since then this field has witnessed evolution at enormous rate.
Preview sample
Pro's Google Medical Records Information Technology Essay
3 pages (750 words) , Download 2 , Essay
I want to discuss the reality of what it delivers and not the conspiracy fantasies that float around its inception. At a basic level of analysis, Google Medical Records is a system for the storage of Medical information. If that were all, there would be no miracle involved.
Preview sample
What are the tradeoffs between relational and object-oriented databases and database management systems Information Technology Essay
7 pages (1750 words) , Download 2 , Essay
Free
Tradeoffs between relational and object-oriented databases and database management systems ODBMS or RDBMS This section of the paper will present a detailed analysis of some of the important aspects of relational, object-oriented databases and database management systems.
Preview sample
Use of Business Intelligence in Knowledge Management, Sales Forecasting or Market Research Information Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
This key business terminology has more than just one meaning associated with it. The various meanings it holds correspond to the numerous means in which it can be deployed. Each business holds this entity as its integral part without the inclusion of which it may be potentially impossible to run a business at all.
Preview sample
Incompatibility of the PlayStation III (PS3) with Newer Systems/Software/External Drives Information Technology Literature review
6 pages (1829 words) , Download 2 , Literature review
Free
In other words, it is a system which reads PS3 video playing games. A lot of models of PS3 platform have been released by Sony (that is a popular PlayStation production company). These models are developed on the basis of different levels of memory power and diverse models for different nations around the world.
Preview sample
Similarities and Differences between IPv4 and IPv6 Information Technology Literature review
8 pages (2173 words) , Download 3 , Literature review
Free
The internet protocol (IP) is the main communication protocol used for relaying packets or datagrams across an internetwork through the use of Internet Protocol Suite. Since it is responsible for routing datagrams across network boundaries, the IP is the principal protocol that establishes the internet.
Preview sample
Analysis of Red Hat Linux Operating System Information Technology Article
7 pages (2042 words) , Download 3 , Article
Free
The history of Red Hat is central to the history of Linux distributions emerging from the 1990s, including making milestones in the advancement of open source operating systems. For instance, Version 3.0.3 of Red Hat, released in 1996, introduced the Executable and Linkable file format into popular usage among Unix systems.
Preview sample
Copyright Compensation and Intellectual Property Case Information Technology Essay
4 pages (1130 words) , Download 2 , Essay
Free
In the case of other companies such as NewLeaf Technologies who are looking to make use of an important property without the required permissions, they better think twice and seriously consider whether their actions are still within the boundaries of intellectual property rights. Otherwise, they may be facing serious and damaging suits. 
Preview sample
Wireless Network Security - Cloud Computing Network Information Technology Personal Statement
3 pages (750 words) , Download 3 , Personal Statement
Perhaps the gradual trigger to the interest in wireless networking security can be traced back from the vast time that I dedicated to the study and teaching Information technology. In my Undergraduate and Masters Studies at King Abdulaziz University, Jeddah; I encountered several cases of computing data hacking and unauthorized access to data centers.
Preview sample
Local Area Networks and Wide Area Networks Hardware Technology Information Technology Essay
3 pages (1050 words) , Download 3 , Essay
The competitiveness of nations and the quality of life of their citizens could well depend upon the state of their indigenous information and communication networks.” (Bendis, 191). The need to keep pace with the advancements introduced in computer networks have opened even more horizons for research and development in this domain.
Preview sample
Ethics In Information Technology Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Today, computers have been applied in varied disciplines including medicine in the field of embryonic stem cell research. Stem cell research has been the most remarkable latest advances in medical research. There have been a great debate relating to the ethical perspective of carrying out the stem cell research.
Preview sample
Current Developments in Forensic Computing Information Technology Report
7 pages (2179 words) , Download 3 , Report
Free
Errors in large computer systems are hard to eradicate completely. These errors can retrospectively negatively impact corporations and individuals alike, making it impossible for social practices and prevailing laws unable to establish accountability for these problems. The use of computers widely increases chances for computer crime games and computer misuse.
Preview sample
Xbox Live Product Evaluation Information Technology Essay
3 pages (750 words) , Download 9 , Essay
Free
Developed by Microsoft, the Xbox brand was released in 2002, and has been an incredibly popular gaming system, competing with Sony and Nintendo. With its distinctive black box, the Xbox 360 is the current variant of the brand and a successor to the original Xbox. The brand took a big leap forward in 2006 when the Xbox Live service was released.
Preview sample
Electronic Health Care Practice Information Technology Research Paper
4 pages (1254 words) , Download 3 , Research Paper
Free
E-Health is a newly emerging field that is rapidly leading toward the improvement of health care in developing countries. Gunther Eysenbach has defined eHealth as “an emerging field in the intersection of medical informatics, public health, and business, referring to health services and information delivered or enhanced through the Internet.
Preview sample
Functional and Structural Modeling Information Technology Coursework
3 pages (750 words) , Download 2 , Coursework
Functional and structural modeling is an important stage of system analysis and design. This paper gives an overview of functional and structural modeling as part of the design process of a system. It presents various concepts of system design like the design elements and processes.
Preview sample
Information Technology and Public Key Cryptography Information Technology Essay
4 pages (1119 words) , Download 2 , Essay
Free
Security will not be guaranteed, as users may incorporate vulnerable PKI resulting in security breaches and other hacking activities. For making a standardized worldwide approach, the Public Key Cryptography Standards (PKCS) are specified and developed by RSA laboratories with the contribution of secure system developers located globally.
Preview sample
Information as a Vital Tool in Planning, Managing, and Maintaining Organizations Information Technology Essay
3 pages (1033 words) , Download 2 , Essay
Free
Information in organizations is well coordinated within the organization’s database providing management with the information they need for planning and making decisions. Modern technology has improved or rather restored the use of management information systems in management in response to the changing business circumstances and environments.
Preview sample
Methods of Identifying and Preventing SQL Attacks Information Technology Research Paper
5 pages (1250 words) , Download 3 , Research Paper
Free
The author states that commercial and governmental institutions are the common victims of SQL injection attacks due to insufficiency in the input validation. In fact, these cases occur when Web application receives a user input, thus using it for building a database query without ample validation.
Preview sample
Enhancing Cyber Situational Awareness through Active Defence Information Technology Research Proposal
7 pages (2531 words) , Download 2 , Research Proposal
Free
Effective Cyber Situation awareness will involve taking initiatives that integrate a number of factors such as metrics, mission assurance, dynamic risk assessment and visualization of the general architecture. After reviews of the cyber defense state of art, the following shortlisted measures will be considered for efficiency, effectiveness and security purposes.
Preview sample
Implementation of Network Structure in the Context of Sally and Johns Busines Information Technology Assignment
7 pages (2054 words) , Download 2 , Assignment
Free
The implementation of a network brings several advantages and opportunities for John and Silly. However, it can also create some security challenges such as virus attacks, data theft, and illegal access to their network. In this scenario, there is a need to consider all these factors while implementing this network.
Preview sample
Global Perspective of Information Technology Management Information Technology Report
5 pages (1602 words) , Download 3 , Report
Free
RFID is a gadget that uses wireless data to identify data from tagged objects, people, and animals. RFID is a cost-effective technology used by many companies to enhance the efficiency levels of the workers. The technology was incorporated by companies like Walmart and the Department of Defense (DoD). In 2003, Walmart introduced this gadget in their company to track inventory.
Preview sample
Medical Technology Assessment Information Technology Research Paper
6 pages (1500 words) , Download 3 , Research Paper
Free
As the report declares business today is dominated by technology, and the fundamental architectures of every successful organisation is based on certain aspects of technology. Technology assessment in this instance therefore, will paint a real time picture of an organisations performance, its operations, workflow, and information processing. 
Preview sample
Challenges of Implementing Health IT on the African Continent Information Technology Report
7 pages (2003 words) , Download 2 , Report
Free
Lack of education and literacy hinders both the installation of the Health IT systems as well as their use, while also making the motivation for such implementation by the health providers and the health institutions minimal. Without the motivation to improve the management of the health system, it becomes difficult to create an opportunity for the introduction of the health IT systems.
Preview sample
Google in china Information Technology Research Paper
3 pages (750 words) , Download 4 , Research Paper
Free
Though all of these services compliment significantly to Google’s success, what distinguishes Google from many other corporation that urge for expansion is that it has maintained its entire business operations to remain ethical. “Don’t be Evil” separates Google apart from the technological companies by being one on which millions of users and account holders have developed trust.
Preview sample
DigiPos Revolutionizing the Retail Sector Information Technology Case Study
4 pages (1057 words) , Download 2 , Case Study
Free
Stores closed during the process of changeover or upgrade which contributed to losses in revenue and the status of the firm. The upgrade was also expensive since all the system’s hardware had to be purchased and involved high technical maintenance at the cost of DigiPos. To offer a solution to these problems, DigiPos invented a Retail Blade.
Preview sample
Internet Security Issues Information Technology Term Paper
11 pages (2976 words) , Download 2 , Term Paper
Free
There are two primary reasons for adopting the field of computing professionals i.e. Interest and money (Adams, McCrindle 2008). Modern computer technologies are utilized for assembling, storing, and communicating information. Likewise, new technologies in the field of information technology (IT) are creating ethical dilemmas.
Preview sample
IT-related Professional Issues Information Technology Essay
7 pages (2037 words) , Download 3 , Essay
Free
The Information technology industry is one of the most rapidly changing industries. It is constantly evolving and developing and its dimensions ever-expanding and diversifying. This development has however not been accompanied by the corresponding legislation and ethical changes that streamline the interaction between humans and this technology.
Preview sample
End-User Development Information Technology Essay
8 pages (2098 words) , Download 2 , Essay
Free
It is an accepted fact that many interactive applications in software technology are not from software developers who are professionals. Rather, they come from persons who have knowhow in other fields who use computation to achieve certain individual goals. By the year 2012, professional programmers in the US would be less than three million.
Preview sample
Cloud Computing Information Technology Research Paper
10 pages (2500 words) , Download 8 , Research Paper
Free
“As business adapts to changing government and industry regulations, evaluates new business partnerships, and anticipates competitive threats, IT needs to help the business find new ways to respond” and cloud computing helps the business achieve that.
Preview sample
Human-Computer Interaction Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Back in the 80’s, when human-computer interfaces were born, the factors of ergonomics and user-friendly design were mostly ignored, which led to dissatisfied users and threatened the life of the interface. But as the computer software and hardware industry developed, so did the methods of evaluation of these products.
Preview sample
The Impact of Technology in the Business World Information Technology Speech or Presentation
3 pages (750 words) , Download 3 , Speech or Presentation
The author states that technology has made communication easier by cutting the time taken to send and receive data and information as well making the communication process cheaper. Two or more businesses can actually work together from different locations. Online services are easily handled in the current time, aided by Internet.
Preview sample
Social Networking Sites: Functions and Impacts Information Technology Report
6 pages (1826 words) , Download 2 , Report
Free
These sites are built and operated on strong technology platforms giving absolute attention to user satisfaction. Though the young world consisting of students is obviously addicted to the regular use of such sites, their dignified use can promote a wide range of organizational activities for social benefits for the future.
Preview sample
Terrestrial Trunked Radio Technology Information Technology Essay
4 pages (1340 words) , Download 4 , Essay
Free
It is a European Telecommunications Standards Institute (ETSI) specification and its first version was put forward in 1995. TETRA utilizes Time Division Multiple Access (TDMA) technology through which both one point to one point and one-point-to-many-point transmissions are possible. (Dunlop, Girma, and Irvine, 1999; ET Industries, n.d.)
Preview sample
Enterprise Architecture - Organization Model of Positions, Functions and Roles Information Technology Essay
4 pages (1228 words) , Download 2 , Essay
Free
Generally, enterprise architecture attempts to define the organization structure with respect to what is going on in an organization. The enterprise information systems define a tailor-made organization architecture that directs its functions and processes towards desired goals and organizational purpose.
Preview sample
Technology in Tattooing: Now and What the Future Holds Information Technology Research Paper
5 pages (1592 words) , Download 2 , Research Paper
Free
There was routine tattooing of the face and body through bare pricking by many Indian tribes and in California, some tribes put color into pricks. For many Arctic and Subarctic tribes especially Inuit, and also individuals in Eastern Siberia, needle perforations were made and a string covered with color was pulled through beneath the skin.
Preview sample
Computer Training Labs for the Elderly Information Technology Research Proposal
4 pages (1551 words) , Download 5 , Research Proposal
Free
This is the age of technology and digital media where anyone who wishes to stay on a par with everyone else must embrace the complexity of the technology and its penetrating influence through all spheres of life. From travel to documentation, cuisine to science and health to architecture, this influence of technology is evident. 
Preview sample
Toward Delivery of Effective Mobile Government: The Case Of Oman Information Technology Coursework
9 pages (2250 words) , Download 2 , Coursework
Free
This research paper demonstrate what underpin the concept of mobile government in the context of Oman, identify need and opportunity for mobile government in Oman, assess the efficiency and efficacy of national mobile government projects of Oman, critically evaluate the challenges of mobile governance, to identify factors that will lead to the success of mobile government.
Preview sample
Technology Changes in Healthcare: Case Study of Central Texas Hospitals Information Technology Case Study
3 pages (750 words) , Download 3 , Case Study
At the same time, they also become critical part of implementation of organizational goals and objectives which cater to the myriad needs and requirements of the masses. The advancing technology like computer and internet provide people with strong means to gather data and use them to garner vital information.
Preview sample
The Problem of the High Cost of Placing Inspection Requests Information Technology Research Paper
4 pages (1031 words) , Download 2 , Research Paper
Free
The organization is a construction contracting firm, that is experiencing the problem of the high cost of placing inspection requests for the consultant firm. The contractor firm gets the activity executed on-site and forwards the inspection request to the consultant to check and approve the work before further proceedings.
Preview sample
8151 - 8200 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us