StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Importance of Experiences and Emotions Information Technology Research Paper
4 pages (1112 words) , Download 3 , Research Paper
Free
A good design product intends on creating pleasant experiences during the product life cycle. Don Norman looks at how emotions play a crucial role in the understanding of the world by humans and how human beings learn new things. According to Norman 2002, aesthetically pleasing objects usually appear more effective by virtue of their sensual appeal.
Preview sample
Purpose of study Information Technology Personal Statement
3 pages (750 words) , Download 3 , Personal Statement
From copper cables to a world of glass screens and a devise that will fit into the pocket, which will be at your beck and call with the push of a button, to give you the latest information on your chosen subject. Shopping involves planning and spending some amount on gas, and visits to various malls, by locking your residence—not anymore!
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Procrastination by Regina Arnold Information Technology Book Report/Review
8 pages (2210 words) , Download 2 , Book Report/Review
Free
It emerges that listening to music from the iPods have an addictive behavior that philosophers describe as learned. Indeed, people juggle and shuttle between certain tasks or places with the white earbuds on. This reduces their ability to concentrate and complete the task at hand (Wittkower, 2008). Therefore, the resulting scenario has always been tasked with being postponed to a later date or time.
Preview sample
Some Summaries of Books that Relate to the New Information Technologies Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
Walter Isaacson is a renowned writer who is enjoying exclusive rights concerning the biography of Steve Jobs. Some of his previous biographies include the one of Albert Einstein. Walter takes us through the history of computing in relation to Steve Jobs contribution to the world of computing. Steve Jobs is widely remembered for his contribution at the Apple Incorporation.
Preview sample
Forensic Computing Development Information Technology Essay
4 pages (1424 words) , Download 3 , Essay
Free
It will enable the user to search/find files faster than the default search functionality that comes pre-installed in the Windows operating system. It is known to be one of the most powerful and fastest tools for searching or locating files. OS forensics does not miss or omit files during the search operation, a weakness associated with the default search tool.
Preview sample
The Importance of Experience and Emotions Information Technology Research Paper
8 pages (2085 words) , Download 4 , Research Paper
Free
According to Norman (2004), the importance of emotional appreciation during product design can never be overestimated. The author argues that attractive products not only enhance our creativity but also can also expand our mental processes thereby increasing our tolerance of minor difficulties.
Preview sample
Important certifications / Eight types of people responsible for security Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
There are a large number of information security certification programs that are designed to test the knowledge of information security professionals in specific areas. In their book, (Merkow, 2006), a number of information security certification programs such as International Information Systems Security Certification Consortium (it is useful for all kinds of information security professionals) and certified information system auditor.
Preview sample
Information System Development Life Cycle: Case of Apple Information Technology Case Study
7 pages (1750 words) , Download 4 , Case Study
Free
The Apple Company strengthened its financial base and diversified their operations to production of consumer electronic products and by 1980 it had dominated the market with a share of 50% and thousands of employees. As the company expanded its operations and increased workers, there was a problem of communication between newly recruited employees and the existing workers.
Preview sample
Virtual Reality Information Technology Literature review
7 pages (2213 words) , Download 2 , Literature review
Free
Virtual Reality is the emerging trend that makes use of the growing power of computers to demonstrate real-world and artificial situations and environments with extensive practicality and interaction. The primary cause of attraction of virtual reality is its capability to generate tests near to everyday life with wonderful investigational power.
Preview sample
Computer History Information Technology Term Paper
3 pages (750 words) , Download 2 , Term Paper
The professor invented the Analytical Engine that serves as a basis for modern computers. A computer is a constantly improving device. The process is so fast that it is not possible to keep pace with it. Speaking about the development, it is important to mention that computers are classified into three groups.
Preview sample
Aspectual evaluation of IS in use Information Technology Research Paper
6 pages (1500 words) , Download 2 , Research Paper
Free
This videos and games raise the user’s level of enjoyment, this games and videos in the internet are always updated and the user will have an access of the current sports only. Eventually some of this graphics are funny picture of the players that they like most and this makes the users happy and excited to use the champion golf flashy.
Preview sample
Management Report Information Technology Case Study
16 pages (4000 words) , Download 2 , Case Study
Free
Write a Management Report Addressing the Following Issues. The report is based on analysing Enterprise Resource Planning (ERP) system in a manufacturing organisation named Solaricot that deals with the production of organic solar cells. In order to raise the efficiency of its different operational functions, Solaricot had installed an ERP system named SiME, but it faced certain problems due to crash of the ERP system resulting in malfunctioning of its various operational functions.
Preview sample
Properties of the Decision Tree in the WEKA Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
TN represents the correct classification of negative numbers, and FN shows the incorrect classification of positive numbers as negative. These are called omission errors. Predictive accuracy becomes the way for measuring the performance of a classifier. Predictive accuracy is known as the calculated success rate determined by the use of accuracy.  
Preview sample
Oracle Database Recovery Information Technology Research Proposal
7 pages (1909 words) , Download 2 , Research Proposal
Free
In addition, the recovery process follows the guidelines that are previously present and works without considering the backup methodologies. A flowchart is present that contains several steps and elements that will help to ease the recovery procedure. Step 1: Startup Mounting Initially, in order to verify the conditions present in a typical Oracle database we need to mount first.
Preview sample
Systems Analysis and Design Information Technology Assignment
4 pages (1143 words) , Download 3 , Assignment
Free
In Pier Systems Incorporated, the marketing manager proposes an integrated system that would effectively manage the customer’s contact. The second fundamental function of the system is to rate the daily performance of each salesperson by reporting the number of customers served by a particular employee. 
Preview sample
Wireless Technology Information Technology Assignment
5 pages (1250 words) , Download 4 , Assignment
Free
Wireless Technology. In the rapidly varying area of wireless communications, scientists and researchers frequently attempt to offer techniques with the help of the latest technologies that convince the continuing need of more rapidly data rates through longer broadcast assortments as well as that appropriate for innovative applications.
Preview sample
Business Intelligence System modeling Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
The business model, which takes into account change processes in business environment, applies decision analysis, monte carlo simulation, data envelopment, exponential smoothing, and non linear programming.
Preview sample
Disaster Recovery Planning Information Technology Essay
5 pages (1345 words) , Download 3 , Essay
Free
This is the process that involves organizing, controlling, planning and leading the efforts of members in an organization to facilitate the achievement of the goals stated. Small and big decisions are required on a daily basis and high level and professional managers are required for a smooth running of the organization and constant problems solutions which leads to beneficial decisions (Rainey, 2009).
Preview sample
The Virtual Memory Manager Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
The virtual memory is the storage being which holds the files on the hard drive and can be retrieved when the computer run out of memory. The virtual memory and physical memory are the two types of the computer memory which are used in the storage of data in the computer systems (Hosford-Dunn, 2000).
Preview sample
Aspectual Evaluation of IS in Use Information Technology Report
10 pages (2855 words) , Download 2 , Report
Free
Each scene contains instrumental music with appropriate changes in musical tones. In the process of using the application, one relates information of cigarettes with entertainment and its factual data. Alex says that he could connect music and cigarette smoking taking place in recreational venues. This places the application in its typical context within the user's mind.
Preview sample
Human-Computer Interaction: Theory and Practice Information Technology Report
7 pages (2051 words) , Download 2 , Report
Free
There is also a Home button that takes the viewer back to the main screen. Upon clicking on the Story link, the story of Smokey the smoker is told and Smokey is shown smoking at different places.  Upon clicking on the fact button, various facts related to smoking and how it is hazardous to the human body and the environment are shown.
Preview sample
Aspectual Evaluation of IS in Use Information Technology Report
7 pages (2031 words) , Download 2 , Report
Free
In the beginning, I will start with the introduction of the discussion of several elements. Time is always a limiting factor and therefore looking for information on how basketball goes on on the internet can be time-consuming and thus it is easy when using this champion basketball flash since it is only by a single click and all information is displayed.
Preview sample
The Advantage of Data Mining Information Technology Research Paper
5 pages (1468 words) , Download 4 , Research Paper
Free
Most people feel that companies may offer different services to different people based on their racial or ethnic groups as there is a general tendency to guess confidential properties based on race and gender. Applying different commercial standards to different people shows business efficiency and competitiveness, but it can also promote stereotypes.
Preview sample
Nextguard Technologies Information Technology Research Proposal
9 pages (2250 words) , Download 2 , Research Proposal
Free
As per the scenario, the district offices incorporate employees connecting remotely via mobile devices and smart phones. For establishing a secure channel, Virtual private network is an appropriate control. VPN will encrypt the data before sending and it establishes a secure channel protected from hackers of cyber criminals.
Preview sample
Cloud Computing Storage Issues Information Technology Literature review
8 pages (2171 words) , Download 3 , Literature review
Free
Cloud computing delivers numerous benefits along with many security vulnerabilities that are classified as: Customary Security Availability Third Party Security Virtual Machine Issues This type of security is associated with the threats applicable on connecting the workstations to the cloud.
Preview sample
Implementation of Infrastructural Design for IT in a Financial Environment Information Technology Research Paper
20 pages (5370 words) , Download 2 , Research Paper
Free
It will work to analyze the best possible solutions to each of the potential questions that would be posited as either potential issues, or the best way to meet a specific need that the company may have at the current time, or in the future. Each specific hardware and software choice was made after a careful consideration of what is in the best interests for the company, while still remaining viable and cost efficient solutions to the company’s specific individual needs.
Preview sample
Green Computing Research Project Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
Free
The essence of a flow chart is to give a step by step solution to algorithmic or other types of analytical problems. While a set of other diagrams are used for solving data related problems, a flow chart is mostly applied in analyzing, documenting and managing a process (Reynard, 1995).
Preview sample
Computer sciences and Information technology Information Technology Article
3 pages (750 words) , Download 3 , Article
I believe what needs to happen is that the IT software industry needs to start developing standards. In the article Software’s Chronic Crisis from Scientific American, the author mentions that “software parts can, if properly standardized, be reused at many different scales” (Gibbs, p.
Preview sample
Life before the Internet versus after the Internet Information Technology Coursework
7 pages (1811 words) , Download 3 , Coursework
Free
Prior to the internet, everything was being handled and operated in black and white and textual format. The Internet is an extension of the television and computer. While it was a computer first that brought about colors, but it was the internet that allowed connectivity. Prior to the internet, the connectivity was limited only to the four walls.
Preview sample
Security Threats That Face People Online Information Technology Essay
4 pages (1013 words) , Download 2 , Essay
Free
There is a need to realize a stronger user security and device identification and limit much of the insecurity. The paper identifies some of the security threats that face people online. However, it is realized that while people are reactive about aspects of online security, they only invest slightly to reduce this risk. This is majorly done through passwords without strong authentication.
Preview sample
The European Union Health Monitoring Programme Information Technology Literature review
6 pages (1559 words) , Download 2 , Literature review
Free
According to the Hospital Data Project, “hospital data are now required to serve a variety of purposes including supporting activity monitoring, performance measurement, case-mix-based funding, service planning, and epidemiological analysis” (HDP, 2003). The data provided this way has become the hub of health information for all its beneficiaries.
Preview sample
History and Impact of Computing Information Technology Essay
5 pages (1685 words) , Download 2 , Essay
Free
The involvement of IBM in the history of digital computing started when no computer existed in 1933. However, IBM card sorting and punch cards, which are considered precursors to computers, were invented. IBM through the German subsidiary followed the Jewish destruction. More than 2000 machines were dispatched through Europe and Germany.
Preview sample
The Role of the Chief Information Officer Information Technology Research Paper
3 pages (1034 words) , Download 2 , Research Paper
Free
The CIO was time and again defined as the corporate savior to support the business and technology globally (CIOs aren't CIOs for long - Computerworld). In the field of information technology, the CIOs were defined as a new variety that includes businessmen, managers, and technologists as information system managers in any organization.
Preview sample
Data Mining and Data Warehousing Information Technology Assignment
4 pages (1085 words) , Download 4 , Assignment
Free
Data mining is the latest and the most powerful technology, and that has great potential in helping companies to focus only on the most vital information in the collected data on the behavior, of their potential customers and their current customers (Olson & Delen, 2008). This method gets the data that can’t be obtained through reports and queries with a high level of effectiveness.
Preview sample
Anomaly Detection Scheme for Prevention of Online Attacks Information Technology Dissertation
5 pages (1250 words) , Download 2 , Dissertation
Free
The author states that hacking of the internet system distorts the original information that was fed and may bring about a jam. All these are prevented by use of highly advanced modern devices that quickly sense and produce signals to notify the comptroller. Data analysis must be undertaken to confirm and ensure only the vital information.
Preview sample
The Engineering Economics of RFID in Specialized Manufacturing Information Technology Essay
5 pages (1440 words) , Download 3 , Essay
Free
If an organization fails to produce the required product within the allocated manufacturing cost, they may lose the customer as well as suffer from high audit cost, high labor cost, and consequently lost sales. A study from (Jones et al. 285-303; Jones et al. 285-303) highlighted cost reduction in non-calibrated tools by implementing RFID solutions. 
Preview sample
Internet and Distributed Application Services Information Technology Essay
5 pages (1403 words) , Download 2 , Essay
Free
The term cluster is used in computer technology to refer to a group of loosely coupled computers that are configured to work as a unit (Englander, 2003). Every computer within the cluster often operates as a complete unit and not as a tightly coupled multiprocessing system. Clustered computers or nodes have independent Central Processing Unit (CPU), I/O, and memory (Englander, 2003).
Preview sample
Info Analysis - Computer Information System Information Technology Article
3 pages (750 words) , Download 2 , Article
This is because unlike the other technologies like electricity and railroads, the use of information technology in an organization will depend on the processes that are to be automated. Business processes are different in various organizations. There could be a business process that is found I a certain organization that is unique from all the other organizations.
Preview sample
Computer Security as an Integral Element of Sound Management Information Technology Literature review
9 pages (2491 words) , Download 2 , Literature review
Free
Digital security covers various areas which include computers and internet, telecommunications, retail and financial transactions, travel and transportation, health care, and secure access. Digital security comprises of tools that an individual or user uses in securing his or her identity, technology, and assets in the mobile and online world.
Preview sample
Conducting Personal Communication in the Public Sphere: Facebook Information Technology Report
7 pages (2036 words) , Download 2 , Report
Free
One significant drawback of conducting personal communication in the public sphere (Facebook) is that it hampers genuine discussions and arguments because people tend to encircle themselves in a periphery that is surrounded by similar interest groups individuals. The feature of community in Facebook is thus formed in keeping with narrow perspectives.
Preview sample
Innovative Information Systems Capabilities of Disney Company Information Technology Research Proposal
6 pages (1722 words) , Download 3 , Research Proposal
Free
The organization has spread from involving itself with simple animations and branched out to other businesses including production companies, amusement parks and even food and clothing products that are related to the company’s brand name. One of the essential parts of the Walt Disney organization is the IT sector, and it is one of the areas that make up the backbone of the organization.
Preview sample
Most Important Cybersecurity Vulnerability Facing IT Managers Today Information Technology Term Paper
9 pages (2250 words) , Download 2 , Term Paper
Free
According to the report with the developments in information technology field, there emerged a large number of useful techniques to support a wide variety of functions such as better online communication, data transfer, business, marketing, management. These tools and techniques have provided wonderful advantages for the business organizations.
Preview sample
A Level of Useful Inference upon a Given Idea Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
The author states that analysis and data mining within such a field can help to emphasize and/or underscore certain otherwise hidden consistencies. As a function of this particular type of inference, the researcher and subsequent users can draw a powerful level of understanding and create the possibility for medical resolutions.
Preview sample
Operating Systems: Hardening and Security Information Technology Research Proposal
8 pages (2172 words) , Download 2 , Research Proposal
Free
Consequently one of their priorities is to upgrade their current network into a secure system. With nearly 250 employees in 5 countries, the organization currently faces a number of security challenges. The vulnerability of NextGard technologies is further increased by the fact that all of their employees have internet access and are likely to visit unsecure sites.
Preview sample
Application Architecture and Private Networks Information Technology Case Study
4 pages (1214 words) , Download 2 , Case Study
Free
Figure 1.1 shows the physical design of the proposed application infrastructure. In the network dictionary, Network Address Translation delineates as “An Internet protocol that allows individual sites to support more IP hosts than the number of IP addresses assigned to it. This is done using special Internet addresses that have been reserved for this purpose. 
Preview sample
Information Technology 1-4D Information Technology Essay
5 pages (1250 words) , Download 3 , Essay
Free
Mark Kennedy said, “All of the biggest technological inventions created by man – the airplane, the automobile, the computer – say a little about his intelligence, but speak volumes about his laziness.”
Preview sample
Saudi Aramco Company Information Technology Essay
6 pages (1774 words) , Download 3 , Essay
Free
Saudi Aramco has been in existence for just a year and has gone up to the top within the oil industry. This company is the pillar of the energy industry not only in the Saudi Kingdom but also in the rest of the world. The Saudi population has tremendously benefited from the inception of the company, with the increased employment opportunities it has offered.
Preview sample
Analysis and Evaluation of Peer-to-Peer Search Methods Information Technology Essay
3 pages (817 words) , Download 2 , Essay
Free
Peerism is a java developed open-source framework that was created to support large network scalability. Peerism is composed of two simulation engines (cycle-based engine and an event-driven engine). The engines are supported by extendable and pluggable components, with a flexible configuration mechanism.
Preview sample
Mobility Management for LTE-Advanced Relay Systems Information Technology Research Paper
9 pages (2250 words) , Download 2 , Research Paper
Free
Standardization activities are underway with the aim of achieving a next generation high capacity and high-speed mobile communication system. The future wireless communication network is expected to be a heterogeneous environment with different wireless technologies that differ in cost, bandwidth and coverage area.
Preview sample
Evolution of Formal Organizations Information Technology Term Paper
5 pages (1303 words) , Download 2 , Term Paper
Free
Formal organizations are corporate establishments that are built and operate on a set of rules and regulations, which are put down, in writing, to govern the members in the execution of the organization’s main objectives. Formal organizations are designed in such a way that each member or group has a specific obligation to fulfill.
Preview sample
8351 - 8400 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us