StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
VoIP Call Analysis Information Technology Research Proposal
4 pages (1000 words) , Download 3 , Research Proposal
Free
Technology, led by the advent of the Internet has brought about several forms of advanced communication with Voice over Internet Protocols (VoIP) acting as the bedrock of this modern advent. A challenge that has however remained with the use of VoIP for the years however has to do with the subject of quality of service delivery to users.
Preview sample
How the Present-Day Data Centers are Turning to Virtual Data Centers Information Technology Research Paper
8 pages (2179 words) , Download 2 , Research Paper
Free
The research delves on the benefits of Hyper and cloud computing environment. Virtualization centers on segregating the computer resources into several execution languages with the use of partition concepts. Virtual machine users’ technology, cloud computing implementation, and hyper V implementation significantly, outweigh the benefits of physical machine use (http://technet.microsoft.com).
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Computer Forensic Tools Information Technology Term Paper
3 pages (750 words) , Download 3 , Term Paper
Recuva is file recovery software that is available freely. The software is extremely easy to use and have several advanced components that are optional. The software facilitates the recovery of files that are stored in external drives, memory card and the hard drive.
Preview sample
Identity Theft Through Unsecure Wireless Networks Information Technology Literature review
6 pages (1821 words) , Download 2 , Literature review
Free
Unfortunately, internet has become one of the ways that the thieves use to steal our personal and financial information. There are cases where unsuspecting customers have their user names and passwords hacked into by hackers who steal their credit card numbers and finally gain access to their money in various bank accounts and retirement funds.
Preview sample
TCP/IP - SDLC Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Their work revolves around signaling, authentication and error detection and correction. Some of these are Internet Protocol (IP), File Transfer Protocol (FTP), and Transmission Control Protocol and Internet Protocol (TCP/IP). Most of the Internet users are also aware of protocols such as Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) (Naugle, 2009).
Preview sample
A Network Infrastructure Information Technology Essay
4 pages (1220 words) , Download 3 , Essay
Free
A network infrastructure is an organization and configuration of interlinked computer systems, of a corporation, connected through various pieces of communication architecture. Network security, on the other hand, involves protecting the laid computer infrastructure from unauthorized access, continuity of services by assets, and continuity and integrity of operations.
Preview sample
Main Design Patterns Information Technology Research Paper
4 pages (1254 words) , Download 2 , Research Paper
Free
The patterns enhance flexibility in accomplishing this communication. The observer design pattern is a software design pattern whereby the object referred to as the subject, preserves a record of its dependents referred to as observers, and alerts them of any changes in state, normally by utilizing one of their techniques.
Preview sample
IOS operating systems Information Technology Research Paper
3 pages (750 words) , Download 4 , Research Paper
Free
Recent developments have been focused on the consideration of the customers’ demands and the security factors. The Mobile phone oriented operating system was formally introduced to the market in around 2007 and since then it has never looked back and I Phone stands amongst the top market players in the field of mobile phones (Tracy 2012).
Preview sample
Risk and Quality Management Assessment Information Technology Essay
5 pages (1402 words) , Download 3 , Essay
Free
A hospital is basically a community institution that provides medical, surgical treatment and nursing care for the sick and the injured. In a hospital, diagnostic studies such as x-rays, lab testing and ultrasound imaging are also performed. Hospitals also provide teaching services for medical experts and instruct patients on self-health care and ailment management.
Preview sample
Application of Hashing Algorithms Information Technology Essay
11 pages (3125 words) , Download 4 , Essay
Free
This output value is known as the hash value. This hash value consists of a distinctive and very condensed mathematical illustration of a portion of data. This process of translation from input to output is a compressed mapping, to be precise, the space that is taken by the hash value is a great deal smaller than that of the input.
Preview sample
Personal statement UCAs Information Technology Personal Statement
3 pages (750 words) , Download 3 , Personal Statement
I have realised that the experience that I had in the organisation gave me the opportunity to utilise some of these skills, in addition to providing me with the opportunity to nurture them into ways that will be beneficial to me, as well as the people that I will work with in the future.
Preview sample
A Training Information Management System for SCR Information Technology Assignment
7 pages (1779 words) , Download 3 , Assignment
Free
Batch processing is a phenomenon where a computer system executes batch jobs on a scheduled basis or when permitted by resources without user interaction. Batch jobs refer to large amounts of information such as database records, log files, billing information, and image processing executed on a scheduled basis or under low resource utilization.
Preview sample
The Ethical Aspect of Hacking Information Technology Research Paper
6 pages (1771 words) , Download 2 , Research Paper
Free
This research paper discusses the philosophy of justification of the end through its means. It highlights some of the laws that provide for the hacking process and explains their provisions for this process. The paper identifies the ethical aspect of hacking, whether the society considers it an ethical procedure or not.
Preview sample
Application implement into a business Information Technology Essay
3 pages (750 words) , Download 3 , Essay
The researcher believes that the best method of application implementation into a business is a wire wrap prototype. Prototype can be defined as a simple and effective way of communicating activities and testing the activities, which are replicated or one can have a study from them. This method or procedure is preferred by the writer.
Preview sample
Networks and Real-Time Traffic for Industrial Control Applications Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
The author explains that real-time traffic flows in a network and is required within specific time restraints of a processor simultaneously supply information to another system it is assisting. Usually, the traffic flow must be faster and arrive slightly earlier than needed by the receiving device.
Preview sample
Password Cracker Information Technology Research Paper
16 pages (4000 words) , Download 2 , Research Paper
Free
The research discusses the Rainbow table technique. Its introduction follows a detailed discussion of a rainbow cracker tool. How that tool uses rainbow tables to retrieve passwords has been taken into account. Screenshots of Brute-force cracker and rainbow cracker are given at the end of the report.
Preview sample
Code Smell as an Aspect of Software Maintainability Information Technology Term Paper
10 pages (2649 words) , Download 2 , Term Paper
Free
Therefore, the presence of code smells seems to be an ideal maintainability assessment indicator. Developing strategies that to be used in assessment of maintainability, is very important, considering that significant cost and effort is used during maintenance. Existence of code smell has been suggested and an approach that can be used for maintainability evaluation. 
Preview sample
Operational Excellence and How to Achieve It Information Technology Essay
2 pages (556 words) , Download 28 , Essay
Free
This essay will begin with the statement that Operational Excellence (OE) is one of the management buzzwords currently in circulation.  The term refers to an overall management philosophy, whereby the leadership continually strives to maintain high standards of efficiency, coordination, communication, and problem-solving both within and without the organization. 
Preview sample
Security Strengths and Weaknesses of the Internet Information Technology Report
6 pages (1611 words) , Download 3 , Report
Free
Internet security provides various significant benefits to internet users. Internet security is very important for a person who keeps or sends important data over the network. “A basic knowledge of internet security is essential for anyone who uses the web for tasks such as email, networking, and shopping” (Paul).
Preview sample
Difference between a Wired and Wireless Network Security Information Technology Term Paper
3 pages (750 words) , Download 4 , Term Paper
Alongside this basic dissimilarity, there are disparities in their security too. Wired networks are more prone to physical security breaches and threats, the most significant of which are electrical threats since the system is not portable due to heavy bundles of wires.
Preview sample
Make a research paper about two different types of application softare (exclude microsoft office softwares) Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
These applications allow users to truly maximize the functions of a computer. An application software (also known as “application” or “app”) is a computer software that allows a user to perform a specific task (Miller, Vandome and McBrewster 2). As such, applications are designed to perform a specific task.
Preview sample
Launching the Professor of Plumbing Application Information Technology Case Study
7 pages (1750 words) , Download 2 , Case Study
Free
The Professor of Plumbing will perform the above functions efficiently, effectively and comes with versatile features. The application integrates books, tables, calculators that exist in the market separately to make an interactive user interface that presents all these features rapidly and at the click of a button. 
Preview sample
Cellular Network and Smartphone Application Security Information Technology Report
7 pages (2027 words) , Download 3 , Report
Free
Users increased at a phenomenal rate and the concern for security and privacy became more intense. Crackers and malicious users have become a great threat to security and are constantly trying to find loopholes within new secure systems. Smartphones offer additional applications of PDAs and PCs along with general phone features.
Preview sample
Enterprise Resource Planning Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Finally there were inconsistencies in linking the system with other dependant external systems needed for the smooth running of the business. Due to these factors, POP 02 proved to be unreliable and the company decided to revert back to the old system (Hamilton 100).
Preview sample
Decision Making, Decision Levels and Types of Problems Information Technology Essay
3 pages (750 words) , Download 2 , Essay
The author of the essay states that the root of the system is primordial and through interactions with each other and combinations becomes more advanced and complex assembling progressively more complex level of systems that cooperate and exchange information and ultimately forming an information system.
Preview sample
Lanchester Liners Hospitality Database Information Technology Essay
8 pages (2117 words) , Download 2 , Essay
Free
The primary function of a database is not only to store and retrieve data but also to efficiently handle concurrent requests for data from multiple users while maintaining data security from unauthorized users. Designing a database to handle multiple concurrent requests and granting/restricting the data access based on the user’s access privilege is one of the most challenging tasks in a multi-user environment.
Preview sample
Router and IP Addresses Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
Routers have at least two IP addresses since it has the function of deciding where to next send the packet. There exists another IP address for management purposes usually the router’s own address for convenient access to the router by the user. Routers are generally used for switching and directing packet in a network, for this reason it has to have at least one incoming interface and one outgoing interface each of which have different IP addresses.
Preview sample
Networks and Security Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
While on the other hand integrity is the act whereby data contents cannot be modified as the case of a message whereby the message content is not modified. Confidentiality can exist without integrity since a person can have access to data whereby that person does not disclose the contents of the data/message but he /she ends up editing the contents of the document (Laet, 2005).
Preview sample
Annotated Bilbliography Information Technology Essay
3 pages (750 words) , Download 2 , Essay
The discussion would suggest that a lack of a holistic framework is a major contributor to this gap. The authors recommend a synthesized framework consisting of seven categories including: inputs management, knowledge management, innovation strategy, and other issues that are lacking in the innovation management process.
Preview sample
How Can Moral Responsibility Be Ascribed to Computer System Information Technology Research Proposal
6 pages (1866 words) , Download 2 , Research Proposal
Free
References 9 1.    Study area Review    A computer system from a simple point of view is a computer that is fully able to perform its various functions with the inclusion of software and other devices (Shelly et al., 2011; Verma, 2009). This is the reason why a computer for instance, requires an operating system in order to perform its respective functions based on its intended design.
Preview sample
Advantages and Disadvantages of Power over Ethernet Information Technology Essay
3 pages (750 words) , Download 3 , Essay
According to the research findings, the power of Ethernet is a very environmentally friendly option in that it helps save energy, and is consistent with the work culture of the contemporary organizations which calls for greater flexibility of placement of equipment and reduction in the time and cost of installation of devices.
Preview sample
Effects of Quantitative Easing on Food Prices Global Warming Information Technology Admission/Application Essay
4 pages (1119 words) , Download 2 , Admission/Application Essay
Free
Quantitative easing impacts the prices of commodities globally relatively to the dynamic economic conditions. Quantitative easing is implemented by a central bank by buying the resources of economic value from the banks and other privatized organizations with the newly produced money to initiate a strong flow of money into the financial system of the country.
Preview sample
Issues in Email Hacking Information Technology Essay
9 pages (2414 words) , Download 5 , Essay
Free
The right to privacy of an individual is far more important as compared to another person’s right to know. Since the start of the 21st century, there has occurred a dramatic change in technology. Today, finding personal information about someone is as simple as clicking a mouse. Methods of email hacking include but are not limited to phishing, RATS, keylogging, and social engineering.
Preview sample
Irans Nuclear Pursuits Information Technology Research Paper
4 pages (1140 words) , Download 2 , Research Paper
Free
Iran’s nuclear pursuits began in the 1970s under Iran's Atomic Energy Organization. The nuclear plant began under the direction of the Shah of Iran, who announced the building 0f nuclear power plants in the country, in which case the plan was supported by the United States (Dorraj 325). The goal of the nuclear pursuits was the generation of more electric power to drive the economy and meet the power needs of the Iranian people.
Preview sample
Internet Crimes Information Technology Literature review
7 pages (2057 words) , Download 2 , Literature review
Free
Individual People 7 A. Dealing with Internet Crimes 7 B. Personal Computers as Target of Internet Crimes 8 V. Conclusion 9 References 10 Internet Crimes I. INTRODUCTION Nowadays you will not be shocked if one of your friends told you that he was cybercrime victim by stealing his credit card number or his identity information.
Preview sample
Tangible and Intangible Risks Information Technology Term Paper
4 pages (1120 words) , Download 2 , Term Paper
Free
SunnyVille is vulnerable to many tangible risks such as those that result from crime, poor weather, and accidents. The institution is well versed in most of these risks and should put measures to avert them accordingly. There are many not readily visible risks, which are associated with different aspects of the company’s intellectual capital. 
Preview sample
Virtual Intimacy Information Technology Essay
6 pages (1641 words) , Download 4 , Essay
Free
Many thought-provoking stories can be found in the cyber world. At the current stage, people are neutralized up to some extent. Mature people usually do not commit such blunders but adolescents typically do. The old stereotype concept is getting demolished with the age of awareness. People now seldom trust others in order to accept a relationship at cyber places.
Preview sample
Information Technology Security Information Technology Report
8 pages (2043 words) , Download 3 , Report
Free
The human experience today continues to be benefited and expanding at a very fast rate because of computer-related technologies which contribute greatly to modern conveniences. In the daily experience, people expect their lives to be safer, smoother, and easier due to computer technologies which if considered in the context of history, are a fairly recent phenomenon.
Preview sample
Information Security Program Survey Information Technology Essay
4 pages (1200 words) , Download 2 , Essay
Free
The National Aeronautics and Space Administration (NASA) is the United States’ agency to manage the nation’s aerospace research, aeronautics, and other civilian space programs. As per the 2011 NASA strategic plan, NASA’s mission is to “drive advances in science, technology, and exploration to enhance knowledge, education, innovation, economic vitality, and stewardship of Earth”.
Preview sample
User Frustration Information Technology Assignment
4 pages (1000 words) , Download 4 , Assignment
Free
Frustrations experienced by users of modern application are associated with errors; in fact, there are no clear definitions of error. However, an error can be defined based on user’s perception towards something that seems wrong in a computer system.
Preview sample
Analysis of Operating Systems Information Technology Essay
4 pages (1109 words) , Download 4 , Essay
Free
Distributed computing systems are very important in the optimization of computing resources. In some cases, for instance, a single computer, regardless of how powerful it is, is unable to do certain computations which require extensive computing power. In such a case, several computers would have to work together to execute the task. 
Preview sample
Social Engineering Attacks and Counterintelligence Information Technology Essay
5 pages (1418 words) , Download 4 , Essay
Free
With the growth in technology, the world of crime has kept pace too. Criminals today are tech-savvy persons who update themselves with all the latest developments in the field of science in general and the cyber world in particular. With the cyber age, even the speed of crime has grown by leaps and bounds.
Preview sample
Facebook Advertisement Information Technology Assignment
3 pages (1004 words) , Download 2 , Assignment
Free
The author of the paper states that one of the potential advertisement sites in social circles is Facebook, a site that has garnered a lot of favoritism from business entities. Engaging Facebook is part of the organizational strategy to manage processes for data acquisition for an effective organization.
Preview sample
Software Requirements Specification Information Technology Term Paper
28 pages (6352 words) , Download 4 , Term Paper
For future use documentation such as the steps followed for development would be saved to be implemented in future projects. The steps are mostly general in nature and can be implemented in almost any system development process. Another section of the project that could be preserved for future use is the method used for cost.
Preview sample
Data Mining of Customer Information by IT Workers Information Technology Essay
6 pages (1887 words) , Download 2 , Essay
Free
Nowadays, companies have various ways to collect personal data from their customers as they use the Automated Teller Machines, browse certain websites, purchase items, and use their credit or debit cards to make transactions. The companies collect data for analysis in order to generate information that helps in customer profiling.
Preview sample
Privacy and Internet Policy Information Technology Research Paper
7 pages (1750 words) , Download 4 , Research Paper
Free
This research study will include an analysis of various reasons that justify internet policies, besides dwelling on the significance of using internet properly. It will also suggest a framework for the implementation of such policies so as to ensure proper utilization of the internet. The concept of privacy will be valued.
Preview sample
Change Management of People and Technology in an ERP Implementation Information Technology Assignment
5 pages (1250 words) , Download 3 , Assignment
Free
From the chart, it is obvious that 3rd party modified off-the-shelf solution’ was the acquisition strategy adopted by PowerIT. Prior to the adoption of this strategy, the company had employed a material resource planning system so as to enhance its production process. Anyhow, the new ERP approach gave great emphasis on software development and application domain.
Preview sample
Fiber Optic Cables Information Technology Research Paper
5 pages (1500 words) , Download 3 , Research Paper
Free
The author states that in order to test fiber optic cables, many tests are conducted to ensure reliable connectivity. Some basic tests are highlighted that are associated with continuity testing, insertion loss and Optical time Domain Reflectometer. Continuity testing method involves continuous checking of broken fibers from one end to the other.
Preview sample
ICTs in Global Context Information Technology Essay
7 pages (1750 words) , Download 2 , Essay
Free
The “technology” in the ICT consists of systems, services and tools that enable information storage, retrieval, communication and dissemination ICT includes all those electronics which manipulate, store, transmit and/or receive and extract information in the form of digits or binary.
Preview sample
Work Products in Software Requirements Analysis Information Technology Report
6 pages (1739 words) , Download 3 , Report
Free
The work products in this process are critical because errors in this process can get magnified in the subsequent processes leading to significant deviations in the plans. It was observed that Plan, Goals, Record, Template, Requirement Specification, Process Description, and User Documentation were some of the most significant work products of the Requirements analysis process.
Preview sample
8201 - 8250 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us