StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Enhancing Cyber Situational Awareness through Active Defence Information Technology Research Proposal
7 pages (2531 words) , Download 2 , Research Proposal
Free
Effective Cyber Situation awareness will involve taking initiatives that integrate a number of factors such as metrics, mission assurance, dynamic risk assessment and visualization of the general architecture. After reviews of the cyber defense state of art, the following shortlisted measures will be considered for efficiency, effectiveness and security purposes.
Preview sample
An analysis of Palm Malls Management Information System Information Technology Term Paper
6 pages (1500 words) , Download 3 , Term Paper
Free
This basic purpose of this project is to develop an MIS for Palm Mall which will automate some of the important business functions. This system will be used for the management of Palm Mall’s working and operations. This application will make use of an automated BAR-Code detection system to detect the product details.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Analytics, Interfaces, and Cloud Technology Information Technology Essay
7 pages (2027 words) , Download 3 , Essay
Free
The intelligent design of data sources along with the ease of use, data manipulation speed are critical factors for a successful business analytics deployment. Likewise, if a native data source is not suitable for reporting, there will be a requirement of a data mart or data warehouse. This job will be considered as an initial discovery stage with the customer.
Preview sample
Impacts of the technology on one's future Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Application of twenty first century technology has therefore been instrumental in facilitating efficiencies in applications in different fields, especially fields that rely on analyzed information for decision-making and knowledge development.
Preview sample
Threats to Computer Security Information Technology Essay
3 pages (818 words) , Download 3 , Essay
Free
Considering that the threats of phishing scams and cybercrime are increasing with each passing day, it is relevant for individuals to equip themselves with cyber intelligence information and awareness, which keeps individuals aware of the current and newly devised attack tactics used by computer attackers and cybercriminals.
Preview sample
The Internet: Change for the Better Information Technology Essay
4 pages (1293 words) , Download 2 , Essay
Free
The Internet is indisputably one of the greatest transformational inventions in the history of mankind. It permeates every aspect of life. It is such an integral part of daily routine that it is difficult to conceive of a time when barriers of time and space limited communication. It is an invention that serves as a combined medium for broadcasting, information dissemination and interaction, without regard to geographical barriers.
Preview sample
Cyber Threats Information Technology Assignment
5 pages (1650 words) , Download 4 , Assignment
Free
Address Resolution Protocol spoofing, also referred to as ARP flooding, or ARP poisoning/ARP poison routing is a mechanism that is employed when one wants to attack an Ethernet wireless or wired network. This may allow the attacker to undertake packet sniffing. In the case of email, the attacker will sniff the traffic sent by one host to another.
Preview sample
Network Security Fundamentals, Security Threats, and Issues Information Technology Case Study
4 pages (1234 words) , Download 4 , Case Study
Free
Security consists of tools, technologies, measures, and laws used to ensure the safety of resources. At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet.
Preview sample
Greatest Challenge Facing Law Enforcement Agencies Information Technology Essay
3 pages (884 words) , Download 4 , Essay
Free
In line with this, the world has witnessed the explosive growth of the internet with individuals, organizations, and governments using the internet for various reasons. Nonetheless, the continued adoption of the internet by users worldwide has resulted in its misuse with a new form of crimes, known as cybercrimes, emerging.
Preview sample
Disparity in Use of Internet in One Country Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
According to the paper digital divide refers to the gap among those with steady and operational accessible digital technologies, especially the internet, with those lacking. The worldwide digital divide is a phrase frequently used to define the gap among amply and less economically developed countries, whereas at the nationwide level, there is habitually an urban-rural gap.
Preview sample
Strong Named Assemblies (DOT NET) Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
This has brought a great havoc to the use of these information systems. Microsoft has taken this issue with great concern and has introduced a mechanism that is aimed at checking the security of programming and the way these are taken. This is the reason why they have introduced the Strong Name Assemblies in Dot NET.
Preview sample
Data Warehouse and State-of-the-art Application Information Technology Essay
5 pages (1250 words) , Download 4 , Essay
Free
In computing the term data warehouse (DW) refers to a centrally managed and integrated database containing both raw and formatted data received from various operational sources (in an organization), generally stored in an archival manner for easy access and used for reporting and analysis purposes as shown in fig. 1. Data warehousing is a process of centralized data management and retrieval (Greenfield, par.1).
Preview sample
Social Networking Sites and the Legal Framework in the UK Information Technology Literature review
8 pages (2134 words) , Download 2 , Literature review
Free
The protection offered to the innocent users of social networking sites is not satisfactory. Although laws have been established to ensure the safety of children who use social networking sites, and they have also been modified from time to time to keep pace with the changing needs of the time, yet the laws are not complied with and there is ineffective supervision of their implementation.
Preview sample
Economic Implications of IPhone5 Information Technology Research Paper
5 pages (1486 words) , Download 2 , Research Paper
Free
As much as the launch of the Iphone5 has led to a growth in the economy of the United States, it has also led to some phone companies being pushed out of the market due to the competition brought about by the launch of the iPhone (Krugman, 2012). Additionally, those bound to make losses are window-based pc makers. 
Preview sample
Wi-Fi as a Type of Internet Network Information Technology Assignment
4 pages (1199 words) , Download 3 , Assignment
Free
A Wi-Fi is a type of internet network whose nodes are interconnected without any wires, and the remote transmission of information takes place by means of radio waves at the physical level (Wysocki 2005). Since all current high-speed wireless networks are using IEEE standards, especially 802.11g, the term Wi-Fi is used to distinguish wireless networks from other traditional wired networks.
Preview sample
Sequence Diagram Flight Reservation System Information Technology Assignment
3 pages (750 words) , Download 4 , Assignment
Sequence Diagram – Flight Reservation System. A Sequence diagram in the words of Janssen available at Techopedia: “A sequence diagram, in the context of UML, represents object collaboration and is used to define event sequences between objects for a certain outcome.” (Janssen, 2010) A Sequence Diagram consists of actors (identified in the use case diagram), system, and their interaction (sequence of actions) with respect to time.
Preview sample
Royal Caribbean Cruise Information Technology Essay
4 pages (1317 words) , Download 2 , Essay
Free
A work system is one where humans or machines conduct work using information technology and other resources to produce results that are positive for both internal and external clients. Modern-day organizations have systems that are used for procurement, supply, production, marketing, financial report production, and hiring of employee coordination of work processes across departments among other crucial organizational undertakings.
Preview sample
How Social Networks Have Affected the Way We Communicate Information Technology Essay
7 pages (2168 words) , Download 2 , Essay
Free
The rapidly growing and advancing technology has greatly changed lifestyles in many societies. The performance of almost every activity in our societies depends on technology or includes certain inputs of technology, based on computers. Communication that defines the subjects and foundation of almost every activity carried out in our societies has greatly experienced similar changes.
Preview sample
HIPPA and HITECH regulations Information Technology Article
3 pages (750 words) , Download 7 , Article
Free
This law resulted in massive expansions in the reach and scope of the Health Insurance Portability and Accountability Act (HIPAA), as well as its corresponding penalties (Carter, 2009). This paper will examine the impact of HITECH and HIPAA regulations on future healthcare systems, defining how regulations will alter the implementation and ongoing use of software systems.
Preview sample
Analysis of Relational Databases Information Technology Essay
3 pages (1045 words) , Download 2 , Essay
Free
Data and information are very fundamental elements when it comes to computing. For this reason, it is of the essence to come up with mechanisms that will enable this data and information to be easily accessed. This is especially in the case of databases. One of the solutions that are put forth, in this case, is the development of a relational database
Preview sample
Organizations Digital Investigation Process Information Technology Essay
5 pages (1472 words) , Download 2 , Essay
Free
Digital investigation is the process of preserving, collecting, validating, identifying, analyzing, interpreting, documenting, and presenting digital evidence from digital sources. The evidence may be used to facilitate the construction of events deemed to be criminal or in contrast with the laid down procedures.
Preview sample
Internet and criminal activity Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Free
The author states that crimes make the user prone to the nuisance caused by any type of the crime because access of computer and the internet are now easier than before. Violating and offending the laws are also the crimes, but elevated technology increased the crime rates. Hacking is also most known crime in the current era of technology.
Preview sample
Development of a Dispatch System for Fire Brigade Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
This report will highlight the internalization issues involved in globally introducing a model that substantially resembles the ambulance dispatch system developed for London. The report shall shed light on the general software issues, changes in the software construction procedure, and issues specific to fire fighting dispatch systems.
Preview sample
Ethical, Social, and Legal Issues Relevant to Information Systems Information Technology Report
6 pages (1682 words) , Download 5 , Report
Free
The standards are important in the current environment where various institutions are facing immense challenges in data management. Institutions that seek to leverage their performance and confidence levels should adopt effective data management systems. The systems should enhance data privacy to ensure sanity in the management of client information.
Preview sample
How to Behave on the Networks: Remember Where You Are Information Technology Assignment
6 pages (1660 words) , Download 2 , Assignment
Free
In order to guard the principles of individual expressions, people must remember where they are (Aranda 2007). Every discussion that is unlawful and believable can be discussed in groups. On some parts of the internet, the field of pornography is flourishing, which is considered to be unethical. Verbal harassment is another issue raised by some people on the Internet.
Preview sample
Smart grid Information Technology Research Paper
6 pages (1500 words) , Download 2 , Research Paper
Free
Additionally, collaborative communication mode is used to make possible the computer processing that has been employed for decades in a number of other sectors. At the present, these technologies are being used on electricity networks, from wind farms all the way to the consumers of electricity in homes, the power plants and businesses.
Preview sample
Law and Policy Case Study Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
The organization should demonstrate commitment to ensure that its system adhere to legal policies and guidelines as set out by the organization and the government. The aim of the document is to highlight the legal environment such as laws, regulations and policies and its impact upon how an organization puts measures to achieve information and information systems confidentiality, integrity and availability.
Preview sample
Network Topology Information Technology Assignment
3 pages (750 words) , Download 3 , Assignment
This paper intends to outline the functionality of a network topology. The topology signifies the network of the research lab. The diverse Cisco switches symbolize the unlike vlans that can be configured for the dissimilar project teams in the lab. EIGRP router functions as the interior routers of the research lab system.
Preview sample
Protecting IT: A Roadmap for Securing the Enterprise Information Technology Literature review
8 pages (2153 words) , Download 2 , Literature review
Free
AN I.T enabled enterprise is one that is fully integrated with the state of the art technological devices, machines and other components that enable completing the tasks easily and with little reliance on the manual methods. Having mentioned the characteristics of I.T enabled setups, these setups are equally vulnerable to outside threats.
Preview sample
The Role of Adopting Cloud Computing to Lower Energy Consumption in Data Centers Information Technology Research Proposal
6 pages (1797 words) , Download 6 , Research Proposal
Free
Generally, the research will use an interview guide which is primarily designed to investigate the ICT background of the selected respondents, their experiences as well as their knowledge and use of various new data management technologies such as cloud computing in their respective places of work. 
Preview sample
Network Security as a Business Benefit Information Technology Case Study
6 pages (1701 words) , Download 3 , Case Study
Free
Network can be defined as `any set of interlinking lines resembling a net, for example, ‘a network of Roads ’. Any interconnected system can be termed as a network. Hence interconnected computers formulate a simple network system. Network security refers to any activities designed to protect your network.
Preview sample
Large-Scale Data Processing Technique Information Technology Research Paper
4 pages (1091 words) , Download 2 , Research Paper
Free
A large-scale data processing technique that has been extensively utilized in recent times for tasks that need direct human input is crowdsourcing. Crowdsourcing, according to Howe and Robinson, refers to a novel online business model and problem-solving technique that utilizes the creative capabilities of a distributed pool of individuals through an open call.
Preview sample
Mobile Health Applications Information Technology Dissertation
18 pages (5246 words) , Download 4 , Dissertation
Free
Low distribution is due partly to the complication of IT venture, which goes further than acquiring technology to altering work processes and customs and making sure that nurses, physicians, and other staff apply it. Moreover, certain features of the market such as disbursement policies that recompense volume and not quality, and the disintegration of care delivery do not encourage IT investment, and might hinder it.
Preview sample
Individual's Personal Privacy Information Technology Literature review
8 pages (2000 words) , Download 4 , Literature review
Free
Social issues can be described as matters of concern to both the community and the government. Social issues may include the cost incurred by the society for switching ways to computer-based systems, increased internet associate crimes and the division that may arise in the society on the basis of the “information poor” and the “information rich”.
Preview sample
Re-Engineering Computer and Electrical Engineering at Cleveland State University Information Technology Research Proposal
5 pages (1504 words) , Download 2 , Research Proposal
Free
Today the technology is accelerating at a very high note implicating that the machines used in operations are changing with time and the labor-intensive part of it is needed to have the expertise in operating it. This research aims at articulating and designing the computer and electrical engineering department to have the credential in offering the best and indefectible units.
Preview sample
Open Source Versus Closed Source Software Information Technology Essay
5 pages (1313 words) , Download 2 , Essay
Free
Open-source software (OSS) is computer software that is available with not only the source code but also the right of redistributing the source code along with all the modifications and the works derived. Moreover, the license of the open-source software allows the users to learn, revise, modify, upgrade, and also to share out the software without any cost.
Preview sample
Floating point IEEE754 Information Technology Coursework
3 pages (750 words) , Download 2 , Coursework
There is therefore an exponent and mantissa when representing these numbers. The significant bits section makes up the mantissa while the representation of the point values makes the exponent. This method is referred to float because the radix part of the number, that is, the binary/radical/decimal point can be located anywhere.
Preview sample
Digital forensic analyst Information Technology Case Study
5 pages (1250 words) , Download 2 , Case Study
Free
Digital computer forensic has revolutionized the process of collecting, analyzing and presenting evidence from computers before any court of law. While computer forensic is a new field, much has been realized through the use of various techniques that have made it possible for digital analyst to collect and analyze data that are admissible in court (Casey, 2010).
Preview sample
Networking and Distributed Systems Information Technology Research Paper
4 pages (1117 words) , Download 3 , Research Paper
Free
The current and future state of the communications industry depends solely on these applications. It is, therefore, particularly vital to have the groups and people involved address some of the constraints that face this field. They may have the field’s scalability, efficiency, and flexibility improved so as to facilitate better functioning of all the operations in place.
Preview sample
Contemporary Issues in Information Systems Information Technology Report
9 pages (2740 words) , Download 3 , Report
Free
In view of the fact that the basic aim of a software development team is to design and develop a scalable, robust and maintainable application system that convenes end-user needs. However, it is unfeasible achieve this goal without formulating effective application design as well as documentation that is a basic stone of the software development process.
Preview sample
Technologies Coming True Information Technology Literature review
6 pages (1670 words) , Download 2 , Literature review
Free
The 2003 documentary is focusses on an actual experiment conducted by Professor Ronald Mallet. The professor of theoretical physics teaches at the University of Connecticut. Mallet invented the famous Time Machine which, he argues, has the power to connect events in the past and even in the future.
Preview sample
Science Fiction and Reality Information Technology Article
7 pages (1961 words) , Download 2 , Article
Free
However, the film is currently owned by the CBS TV studios, and it is distributed under the Paramount home entertainment. The Star Trek is a series in history that reveals classic adventure drama. It began in 1964 on Start Trek TV series, but Roddenberry made it more sophisticated in 1966 (Roddenberry and Abrams 1966).
Preview sample
The Transition to Modern and Efficient Software and Hardware Information Technology Essay
3 pages (911 words) , Download 3 , Essay
Free
ANDC is an established company (since 1998).  Our ground personnel is highly qualified and all of the developers possess MCSE or higher.  In answer to the privacy and security concerns, our people respect the company’s proprietary information and utmost care will be taken to ensure network security.     
Preview sample
Technology and E-Commerce in Perspective Information Technology Research Proposal
6 pages (1611 words) , Download 2 , Research Proposal
Free
Moreover, these technologies support business models and strategies that are planned to control the technologies under commercial advantage and profit. Thousands of commercial start-up companies were accompanied by huge development and growth. Thus, information technology is generating a long term successfully planned explosion of technologies by large entrepreneurs (Laudon, 2011).
Preview sample
Key Technology Trends That Raise Ethical Issues Information Technology Research Paper
4 pages (1000 words) , Download 5 , Research Paper
Free
The conclusion from this study states that information technology plays a significant role in the successful execution and improvement of business operations. It also causes certain security and privacy issues. This paper has discussed various security issues that can happen due to illegal use of information technology.
Preview sample
Employee Benefits System Information Technology Research Paper
5 pages (1469 words) , Download 2 , Research Paper
Free
This document is a system specification for the Benefits System and intends to give a description of the functions, constraints, and performance. It will help Suite Spot Hotels by providing a solution on how to manage the employees’ benefits. This means that the system specification will act as a basis for verification and validation of the employees’ preferences based on their information.
Preview sample
Efficient Crowd-sourcing Techniques for Large Tasks Information Technology Essay
3 pages (877 words) , Download 3 , Essay
Free
There is a concern with regard to dishonesty, and possible misjudgment, which is considered to threaten the quality of results. Commonly used countermeasures focus more on redundancy, resulting in a tradeoff between efficiency and quality. Measures should always be aimed at ensuring efficiency while at the same ensuring results of high quality.
Preview sample
Proposal on Data Security for The Kingswood, Inc Information Technology Business Plan
5 pages (1540 words) , Download 3 , Business Plan
Free
The Kingswood, Inc. is a small facility that aims to ensure affordable and quality healthcare support to all its patients. Although the facility makes no attempt to prolong life or cure its patients it, however, does its best to ensure its patient always receives the first priority. Kingswood Inc. volunteers and nurses provide basic medical care.
Preview sample
IT Consultancies Information Technology Essay
3 pages (867 words) , Download 2 , Essay
Free
An IT consultant provides technical guidance to clients by finding and analyzing security threats, analyzing code, improving the efficiency of systems, and generally helping a business best use IT to meet its goals. An IT consultant has the skills to communicate with customers and clients, troubleshoot issues and provide strategic advice.
Preview sample
Adoption-Centric Software Engineering Information Technology Assignment
6 pages (2626 words) , Download 2 , Assignment
Free
The difficulties that are encountered in object-oriented can be eradicated with the use of BlueJ. BlueJ, like Eclipse, is used when programming applications in Java 2 Platform, and also the Standard Edition. Developing simple programs is still possible as one can create objects and call methods that are associated with these objects.
Preview sample
8601 - 8650 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us