StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Method of Determining Effective Drug Combination Information Technology Research Paper
4 pages (1579 words) , Download 4 , Research Paper
Free
The use of predictive analytics helps in reducing the risks associated with overdose that may reduce the physicians’ competencies. The smarter prediction helps in reducing the drug combination time. It helps in increasing the quality of health care because it enables hospitals to change from sick care to effective predictive care.
Preview sample
Mobile Computing and Social Networking Information Technology Essay
4 pages (1191 words) , Download 2 , Essay
Free
Technology has revolutionized every walk of life ranging from education to fashion. Not to mention the health care sector. Wireless medicine has helped patients in cutting down hospital bills and in circumventing the dilemma of waiting for days to meet a doctor. In the not very distant past, we witnessed people waiting in a long queue to consult their doctor for their routine checkups.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Global Warming Is a Controversial Issue Information Technology Research Paper
4 pages (1103 words) , Download 2 , Research Paper
Free
Global warming is a controversial issue. We heard both sides of the story, one of them is telling us the peril linked to it and the other side informs us that we should not worry about it in the first place for it is non-existent after all. In other words, we could hear stories about it that at some point inform us that it is a reality and a myth on the contrary.
Preview sample
Classes and Class Hierarchies in C++ Information Technology Essay
9 pages (2412 words) , Download 2 , Essay
Free
Object instantiation is the creation of an object, that is, the realization of a specific item of a class. It is the creation of objects with similar attributes (Malik, 2012). For example, the class called “Employees” can have objects (instances) of the class "Employees" for "Sam" and "Aristotle". Classes have instances for every data type, known as objects. An example of a C ++ program implementing a class (Employee).
Preview sample
Ethical Issues That Arise from the Use of Internet Technology Information Technology Essay
6 pages (1621 words) , Download 3 , Essay
Free
The Internet is the most powerful invention of our times that has made life easier by bringing any information home just with a mouse click.  With the advent of internet communication, banking, academic, business, governance and everything has become faster than what we could imagine some years ago.
Preview sample
Why Do We Need Content-Centric Networking Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
The shift from host-centric to content-centric presents a number of advantages such as reduced network load, increased energy efficiency, and low dissemination latency. Content-centric networking has emerged as an alternative network architecture in which content, rather than its location, becomes the heart of the communication model.
Preview sample
Assessment of Best Practices and Available Tools for Compliance Testing Information Technology Essay
4 pages (1285 words) , Download 3 , Essay
Free
According to the U.S. Department of Veterans Affairs (2013), one of the best practices in ensuring Section 508 compliance is to apply Semantic HTML Markup. This helps particularly those website visitors “who use assistive technologies like a screen reader” (U.S. Department of Veterans Affairs 2013). Therefore, it is always a good idea to carefully select and double-check all the HTML tags used in the construction of a website.
Preview sample
Identity Theft - the Need for Protection and Security Information Technology Essay
10 pages (2717 words) , Download 3 , Essay
Free
When people have their identities stolen, they can unfairly become subject to a whole host of difficulties.  These include difficulty in finding employment due to failing background checks, a decline in credit score resulting in great difficulty securing loans, and even the possibility of encountering trouble with various law enforcement agencies (Orlov, 2012, p. 3).
Preview sample
Future of Biometrics in Network Security Information Technology Literature review
11 pages (2876 words) , Download 3 , Literature review
Free
Network security has become a major concern for many organizations in the world today. Networks form the heart of the organization and enclose crucial resources that must be protected from unauthorized access. The high intensity of network attacks has pushed organizations to invest in more secure systems that can resist external attacks.
Preview sample
Comparison between Operating Systems: Linux, Windows & Mac Information Technology Essay
3 pages (903 words) , Download 6 , Essay
Free
Windows has a market share of around 90% and Macintosh holds a share of 8% and Linux is found in around 2% of the computers (TNW, World OS market share). Although Linux is the newest operating system it is based on UNIX which is over four decades old. Interestingly, as per unconfirmed reports over 90% of the websites are hosted on servers that have Linux as the operating system.
Preview sample
Cisco Systems: Implementing Customized ERP in Nine Months and within Budget Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
Free
The direct reason behind Cisco’s reluctance toward establishing a novel ERP system in the company had two focal points. Number one, the company was not willing to replace its legacy systems in one go possibly because of a potential down time for at least a few days.
Preview sample
Online Booking System for Parking Information Technology Report
9 pages (2544 words) , Download 2 , Report
Free
Context of the project Usually people waste so much time trying to locate a parking space especially in busy commercial centres such as cities and shopping malls. Besides wasting time this activity can be draining psychologically and can be a demotivator and a prospective client may even drive away when they fail to locate a vacant space (Whapples 2005).
Preview sample
Donald Norman and his Experiences Information Technology Assignment
9 pages (2528 words) , Download 2 , Assignment
Free
Traditionally scientist hold that any idea or designed and success in the market could be traced back to its cognitive ability and scientific concepts incorporated in its production. Weak products fail while stable designs are successful in the market (Norman, 2007).
Preview sample
Cloud Computing In Todays Organizations And The Future Information Technology Essay
12 pages (3000 words) , Download 4 , Essay
Free
Technology is making progress at a rapid speed in the present world. New technologies related to the field of information technology are facilitating individuals and organizations in carrying out personal and professional activities.
Preview sample
Techno-Sociological Needs of the Nation Information Technology Essay
8 pages (2131 words) , Download 2 , Essay
Free
ICT technology is evolving rapidly and the world has become a global village where voice communication and the transfer of data take place in the wink of an eye. Analog technologies have been replaced with more efficient digital signals and data storage. ICT networks are now relying more on packet switching instead of analog-based circuit switching.
Preview sample
Combining Anomaly and Signature based Intrusion Detection Systems Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
To sum up, many studies and researches have been conducted to overcome issues related to the detection techniques, still, there were loopholes for threats and vulnerabilities to sneak in. Bayesian Algorithm with KDD99 was implemented for anomaly-based IDS and integrated multi-layer signature-based intrusion detection system using mobile agents were implemented.
Preview sample
The Civic Hybrid Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
The author states that the car is priced at about $1200 above the Civic hybrid. A disadvantage of the Leaf is its limited trip range of 100 miles. The Chevy Volt is the most expensive of the three vehicles. The car is most luxurious of the three autos. The 230 maximum mpg rating of the car is very attractive.
Preview sample
Development of Staffing Management Plan Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Preview sample
Methods for Resolving Small Scale Systems Problems Information Technology Essay
3 pages (750 words) , Download 2 , Essay
General systems theory analyses the similarities between systems from different platforms as common principles and concepts. Information systems denote the interaction between information technology and peoples’ activities that support operations, management and decision-making.
Preview sample
Network Basics Paper Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Free
Likewise, the school has also decided to introduce more services on the Local Area network (LAN), hubs is not a best option as it will create more traffic and degrade network functionality. Therefore, switches instead of hubs are recommended. As per scenario, only two public IP addresses are available.
Preview sample
Data Warehouse, Data Mart and Business Intelligence Information Technology Essay
4 pages (1000 words) , Download 4 , Essay
Free
Many organizations are increasingly adopting data warehousing to enhance reporting and decision making. A data warehouse facilitates the integration of data from various sources, data sharing, and provides consistent, organized, relevant and timely information for decision-making.
Preview sample
Enterprise Target Status Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Thus each user will have an account to access the network with. Furthermore, Antivirus and personal firewall software should also be installed on each PC. Each of the three networks is also protected by installation of Firewall which controls the access to and from the external network.
Preview sample
Organization Environment of Alcan Information Technology Essay
10 pages (2755 words) , Download 3 , Essay
Free
Technological advancements in various disciplines have helped spur the economies of various countries worldwide. The field of Information Technology has been one key area that has impressed technology to the latter. This paper explores the application of IT within the Alcan organization which is an organization that is IT supportive.
Preview sample
Emerging Technology Case Studay Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
In this paper I will present an overview of the issues associated with this cloud computing. This paper will also present solutions and suggestions to deal with these security risks. Introduction Concerns about how an attacker can attack organizations have turned out to be a key focus area of security endeavors and strategies to protect both individual targets and the country in general.
Preview sample
Wireless technology security Information Technology Research Paper
6 pages (1500 words) , Download 3 , Research Paper
Free
Wireless Technology Security. Wireless Technology Security A wireless network refers to the type of computer network not connected by any cables (Tse & Viswanath, 2005). It allows users access to information, applications and ability to communicate wirelessly, the air being the medium.
Preview sample
Creative Designs E-commerce Company Analysis Information Technology Essay
6 pages (1500 words) , Download 3 , Essay
Free
E-commerce is one of the mediums to increase the sale of the products globally and an advertisement is one of the critical factors involved in the success of any product. The vital aspect of the advertisement is the creativity in a way to encourage and compel the viewers, listeners and / or readers (audience) for buying the product.
Preview sample
Complete Computer Network Infrastructure for a Real or Ficticious Business Information Technology Research Paper
20 pages (5030 words) , Download 4 , Research Paper
Free
Our IT strategy executes by defining the topology of the network. The topology will define the structure of the entire network along with preferred cable to be used. Secondly, hardware specification of all departmental workstations and will be carried out along with the cost.
Preview sample
Classification of Access Network Types Information Technology Assignment
5 pages (1402 words) , Download 2 , Assignment
Free
The working environment is in fact the biggest contributive factor. The lighting should be focused on brightness and quality based on the floor it is used at. The ceiling light on the third floor should not be too light to cause eye fatigue. Desk lamps should be arranged to overcome any light problems.
Preview sample
Increasing Vulnerability of Organizational Information Assets Information Technology Assignment
7 pages (2293 words) , Download 2 , Assignment
Free
The research has shown that open or public networks such as the Internet are more vulnerable than internal networks for the reason that they are virtually open to everyone. Hence, when the Internet turns out to be an important part of the business network, then the organization’s information arrangements also become open for attacks from outsiders.
Preview sample
Cloud Computing Information Technology Case Study
3 pages (750 words) , Download 4 , Case Study
Free
This emerging trend in the contemporary world gives companies both attractive technological and financial benefits as well as giving them a competitive edge in the highly competitive environment. Cloud computing involves sharing of computer resources, both software and hardware, among many users along connected computers over a network, mostly the internet (Armbrust et al, 2010).
Preview sample
Software Engendering Information Technology Assignment
3 pages (750 words) , Download 3 , Assignment
The second characteristic is that the development cycle breaks the tasks into multiple smaller assignments, which require minimum planning. This also eradicates the need related to long term planning for a particular assignment. The next important characteristic of this method is that the time of development gets greatly reduced from a broad time span of years to just a few days.
Preview sample
Role of Alberti Leon Battista in Linear Perspective Information Technology Essay
6 pages (1610 words) , Download 2 , Essay
Free
The only solution offered by Alberti was “linear perspective”; he claimed that converging appearances meet at a particular dying point and that everything gets smaller when the distance from the eye is increased (Alberti & Sinisgalli, 2011). This paper will focus on the efforts made by Alberti to illustrate the theory of linear perspective.During the times Alberti introduced the idea of linear perspective, many other people could write a treatise about the upcoming work of art (Peter, 2007). 
Preview sample
Application Project Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
There are four main reasons for software maintenance, namely; corrective, preventive, adaptive and perfective. There are six main processes of conducting the maintenance of software (Zhang, 2012). The first stage is the implementation process. This stage contains the preparation and transition activities of the software.
Preview sample
Serious Game Critique Information Technology Essay
3 pages (750 words) , Download 2 , Essay
The game developers take into account the ability of the game to positively influence the social, physical or emotional environment of the user. I recently tried the game Farmville. It is basically a simulation of a farming environment. It is a free game played on a internet browser and is integrated into the facebook account.
Preview sample
History in Distributed Databases Information Technology Essay
10 pages (2710 words) , Download 3 , Essay
Free
This paper has discussed some of the important aspects associated with distributed databases. The research intended to discuss the history of distributed databases.  Basically, the history of distributed databases starts from the need for the management of data for large organizations that operate in different locations.
Preview sample
Privacy of Information Systems Information Technology Essay
5 pages (1434 words) , Download 2 , Essay
Free
The advent of information systems in organizations has stirred risks such as insecurity and lack of privacy of information about companies and their customers. Information privacy exists in a system when a person who has authority accesses data. This means that privacy of information ceases when unauthorized parties access the data of a company or consumer.
Preview sample
MPI Shared Communication on Infiniband and Gigabit Ethernet Clusters Information Technology Essay
4 pages (1497 words) , Download 2 , Essay
Free
There exists an application of message-passing systems on distributed equipment with a distinct memory for implementing parallel programs (Gropp, Ewing & Anthony 1999, P. 19). In this system, every process of execution communicates and shares its facts with others by conveying and accepting incoming messages.
Preview sample
Routing Protocols for Ad-hoc Wireless Network Information Technology Dissertation
20 pages (5000 words) , Download 4 , Dissertation
Free
IEEE 802.11b standard is operational on a 2.4 GHz unlicensed frequency spectrum that offers a maximum data rate of 11 Mbps. Likewise, this standard divides the band further to 11 separate channels, as 11 channels are available in north America and 13 channels are in Europe.
Preview sample
Advances in Wireless Network Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
As the technology is advancing, the wireless communication is considered as the major mean of communication between the people and different organizations. The methods utilized for the communication are becoming simples for the general people and becoming more complex for the engineers and related staff of the organizations that are providing the communication.
Preview sample
Network Administration Capstone Project Information Technology Report
22 pages (5902 words) , Download 4 , Report
The task of estimation has been going on in the present company for a while. However, in most instances, this is done either manually or by employing the use of an old DOS system. This has generally been identified to be highly ineffective as not much work as expected to be done by the department using it has always been produced.
Preview sample
How to Save Organisations from Hackers Information Technology Report
26 pages (6980 words) , Download 4 , Report
To highlight the threats to which IT companies are exposed with regards to hacking, the essay has used RSA’s hacking incident in which attackers used phishing to target low-level users of RSA’s information systems. These employees were targeted by e-mails, which were then used by the attackers to access RSA’s IS through back door channels.
Preview sample
Are the frameworks and principles of information security management Information Technology Research Paper
2 pages (500 words) , Download 3 , Research Paper
Free
Thus, the development of an efficient information security policy is extremely necessary. In this regard, the information security management framework involves countrywide, worldwide, managerial, and worker values to perform information security management.
Preview sample
Fighting Cyber-Crime Information Technology Term Paper
5 pages (1337 words) , Download 5 , Term Paper
Free
Cybercriminals should be highly punished so that others hesitate in committing cybercrime. The principles and practices of information security should be applied. That is, highly sensitive data should be kept in an encrypted form through the use of difficult cryptology-related algorithms that could not be broken by any hacker.
Preview sample
Wi-Fi and Its History and Principle of Work Information Technology Research Paper
2 pages (775 words) , Download 2 , Research Paper
The term Wi-Fi is a trademark of the Wi-Fi alliance. This alliance is an international nonprofit association of companies that are concerned with Wireless LAN technologies and products manufacture. It is the name given to a type of network connection that does not need any cords or physical connections to connect.
Preview sample
Research Paper on iPhone Network or Security Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Free
That part of the research paper is followed by a second and a third part, the outline for which is as follows: The second part will deal with the features of the network technology employed by the iPhone. It will be further divided into sections on the types and methods of connections used for the phone, both in the U.S.
Preview sample
Upgrading a PC Information Technology Assignment
3 pages (750 words) , Download 4 , Assignment
Free
Upgrading a PC He also enjoys using writeable media for backup storage. Thus, the three main areas to improve are processor, hard drive and possibly removable disk drive. CASE Fred does not need to update his case, as changes to case design are only really useful if something about the current case is a problem (not enough hard drive bays, overheating because of not enough fan bays, etcetera).
Preview sample
Human Factors in the Design of the Input Systems Information Technology Assignment
4 pages (1462 words) , Download 3 , Assignment
Free
Human factors refer to the "human characteristics”. A variety of human factors normally fall into one of three divisions of human personality such as physiological characteristics, physical characteristics, and psychological or behavioral individuality. However, these sub-divisions of human factors are not essentially equally limited (Nelson & Associates, 2010).
Preview sample
Malicious Software, Unknown Threats and Potential Solutions Information Technology Research Paper
6 pages (1824 words) , Download 2 , Research Paper
Free
Malicious software also gathers unauthorized information, thus leading to loss of privacy and confidentiality of information. Systems’ vulnerability to malicious software and unknown threats is the main cause of information and system attacks, destruction and interruption of normal system functioning and processing of information.
Preview sample
The Past, Present and Future of RFID Information Technology Research Paper
7 pages (1996 words) , Download 2 , Research Paper
Free
Everything about our lives happens at a faster pace than ever before and there are no signs of things slowing down. That is why we now need a more accurate yet faster way of doing transactions that would normally take hours to do. We need a piece of technology that will allow us to carry vital information with us wherever we go.
Preview sample
Database Security Measures Information Technology Report
6 pages (1928 words) , Download 3 , Report
Free
Among the vital elements of an OI, policy include purposes of OI, modes of data collection, security, knowledge management principles, and organizational learning strategies. Of equal importance is a strong IT team, with each sub-department and personnel assigned duties and responsibilities in which they are competent and skilled.
Preview sample
8351 - 8400 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us