StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
IT Governance and Law Information Technology Report
13 pages (3678 words) , Download 4 , Report
Free
Information systems are one of the most cherished of inventions of the modern times. Removing the distances between man and machines the information systems not only bridge the gap but also enhance the productivity of the computing machines themselves. This is mainly owing to the increasing usability that is achieved by the deployment of information systems.This is done mainly with the help of information systems.
Preview sample
Enterprise systems management : Software Development Laboratories Information Technology Book Report/Review
12 pages (3000 words) , Download 2 , Book Report/Review
Free
In 1977 SDL implemented first commercial version of RDBMS for CIA. The code name for the project was Oracle. The unique product that the company offered was increasingly recognized in the market and company changed its name to Oracle Systems Corporation to identify itself with its flagship product Oracle.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
The impact of technology on history and development Information Technology Coursework
2 pages (500 words) , Download 2 , Coursework
Free
One of these areas, which have seen the largest development in the field of education, has been through the use of mobile devices and the Internet (Beale, 2005). In my life, it has allowed me a great amount of flexibility in doing my assignments.
Preview sample
Cyber Crime as opposed to Cyber warfare Information Technology Research Paper
11 pages (2750 words) , Download 2 , Research Paper
Free
The world has become a global village after rapid developments and advancements in information and communication technology, media resources, transportation, and networking. The interaction and coordination among people has improved tremendously in last 3 decades after the advent of internet and use of desktop PCs and laptop notebooks.  
Preview sample
Electronic Communications Privacy Act: Advantages from an Employer and Employee Perspective Information Technology Research Paper
4 pages (1356 words) , Download 2 , Research Paper
Free
There are a number of other effects that increase the organizational productivity such as reducing the use of company resources for personal use, decreasing the wastage of resources that are not used by the employees and hence the company, by eliminating legal problems that arise out of employee misbehavior, etc.
Preview sample
Computer Sciences and Information Technology Information Technology Personal Statement
4 pages (982 words) , Download 3 , Personal Statement
Free
It is essential to state that “Computing is not about computers anymore.  It is about living.”  ~Nicholas Negroponte A job in the field of computing had been my ambition ever since I had the fortunate chance of being exposed to this most modern equipment that science has put into the hands of mankind.
Preview sample
Networking in Telecommunication Field Information Technology Term Paper
5 pages (1457 words) , Download 2 , Term Paper
Free
In the packet switching, the data is broken down into pieces which are then wrapped into structures known as packets. Every packet has the data, the information of the address of the source as well as the destination nodes, sequence numbers in addition to other control information. A packet is also called a segment or datagram. 
Preview sample
Project Management in IT Industry Information Technology Essay
10 pages (2250 words) , Download 2 , Essay
Free
Project Management is the discipline that achieves a set of defined goals by using resources such as time, money, people, space, technology, etc. A project is a group of tasks and actions that are performed to achieve a specific objective within the finite period of time. It is an endeavor undertaken for a limited time.
Preview sample
Employee Monitoring Paper Information Technology Research Paper
3 pages (750 words) , Download 5 , Research Paper
Free
Employee monitoring could be defined as the practice of observing employee’s activities with their working equipment during the intended work hours in a work environment. Many employees would argue that it could be an infringement of their privacy by the employer if at all any employee monitoring tools were used.
Preview sample
How Should We Help Our Organizations to Use Internet-Based Conferencing Safely and Effectively Information Technology Essay
3 pages (750 words) , Download 2 , Essay
In fact, the overwhelming advantages and opportunities of Internet based communication (especially the computer conference) have led to the extensive acceptance of electronic communication tools all the way through the world of work. In addition, people who work together via e-mail take pleasure in amenities that free them from a location and time limitations.
Preview sample
Virtual Reality Technology Information Technology Essay
6 pages (1500 words) , Download 4 , Essay
Free
As the essay stresses modern lifestyle has been made possible due to the advancement in technology in various aspects of life. Among the many technological evolutions, virtual reality technology has made remarkable progress in advancement. Modern virtual reality systems and machines are simplified, light, and more advanced. 
Preview sample
Vodafone and the Use of Internet Information Technology Case Study
9 pages (2250 words) , Download 3 , Case Study
Free
Vodafone was formed in 1982 as a subsidiary of Racal Electronics Plc and it became the largest mobile network in the world in 1987. It became an independent company in September 1991, at which point it changed its name to Vodafone Group Plc. From those beginnings, Vodafone now owns and operates mobile phone networks in more than 30 countries.  
Preview sample
Adaptive Web-site Design Information Technology Essay
2 pages (500 words) , Download 3 , Essay
Free
“One of the problems often mentioned in adaptive Web-site design is that there are some issues for which no general approach or solution appears to exist. One of these issues is the separation of a conceptual representation of an application domain from the content of the actual Web-site.” Paul de Bra’s statement no longer holds true in today’s Web development environment.
Preview sample
Growing Up in the Digital Age Information Technology Research Paper
5 pages (1428 words) , Download 2 , Research Paper
Free
Smart companies collaborate with Net-Genre and decentralize their decision making and embrace new technologies in order to manage their global team (Tapscott 158). Net-Genres' need for freedom, fun, and collaboration is manifesting in virtual workplaces and the freedom to work from anywhere, and anytime they want.
Preview sample
White Paper Risk Analysis Metric Machine Parts Supplies Corp Information Technology Assignment
4 pages (1000 words) , Download 2 , Assignment
Free
White paper risk analysis metric machine parts supplies corp. Metric machines parts and supplies Corp., experiences frequent network crashes, and this has led to the interruptions of customer service and e-mail service. It is, as the company says, quite costly.
Preview sample
Solution to a Real World Problem Information Technology Assignment
3 pages (750 words) , Download 3 , Assignment
Free
The customer relations officer of the company has noted that there an increase in customer complaints about the effectiveness of the services of the help desk. An investigation by an outsourced group of IT specialists revealed that the application of relational or database oriented spreadsheets by the help desk staff has some limitations.
Preview sample
History of the Stuxnet Worm Information Technology Research Paper
5 pages (1403 words) , Download 4 , Research Paper
Free
The managing partner Joe Weiss serving at the Cupertino, which is California-based Applied Control Systems shared that a lot of people have been fixated on the impact of the Stuxnet worm upon the systems of Microsoft Windows, and are unaware of the use of the Stuxnet worm by its authors as a way to end.
Preview sample
Software Development Information Technology Essay
5 pages (1250 words) , Download 5 , Essay
Free
The development process of a software product entails a lot of steps. All these steps should be followed up in its entirety to ensure that all the processes are captured in the development process. The paper says that SDLC also helps as a guide in collecting data that is used to design the software.
Preview sample
Network Topology Information Technology Assignment
3 pages (750 words) , Download 3 , Assignment
This paper intends to outline the functionality of a network topology. The topology signifies the network of the research lab. The diverse Cisco switches symbolize the unlike vlans that can be configured for the dissimilar project teams in the lab. EIGRP router functions as the interior routers of the research lab system.
Preview sample
The Information Security Framework Information Technology Essay
3 pages (1003 words) , Download 4 , Essay
Free
The Information Security framework is considered the most wide-ranging framework model that guarantees entire security solutions for information by reducing business risks. In addition, information security does not only focus on technological aspects but also points out other core elements in an organization.
Preview sample
Electronic Retailing: Online Shopping Information Technology Literature review
5 pages (1555 words) , Download 2 , Literature review
Free
The company operates its business online and offers a wide range of luxury clothing products, such as bags, shoes, clothes, and other garments to the customers. To ensure efficient working of business processes, the company has implemented an efficient management information system that keeps the business information up-to-date.
Preview sample
Mobile and wireless computing Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
Let’s begin with competition within application standards of development on various devices; for a long time Nokia group using Symbian OS has dominated in this field but not anymore, there is a lot of competition from iOS, Android, HP webOS, BlackBerry, Window Mobile and Bada from Samsung.
Preview sample
Enterprise Resource Planning (ERP) Proposal Information Technology Case Study
8 pages (2000 words) , Download 2 , Case Study
Free
Enterprise Resource Planning (ERP) Proposal Introduction BrainFreeze Pty Ltd manufactures and sells ice cream, with most of its revenue being recognized from the manufacturing process. The company was started in 2001 by 5 partners who still own and manage the company.
Preview sample
Case Study - Emerging Technologies Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
In stemming his contribution on the cloud computing, Choo considered cloud computing as a pool of computing resources that enables users to access computer applications and data within a web based environment depending on the data or information they need (Choo, 2010).
Preview sample
The Role of Government in Information Assurance and Security Information Technology Research Paper
18 pages (5065 words) , Download 2 , Research Paper
Free
With increasing incidences of cyber crime and unwanted access to public and private online data rising, the need for more government input is highly needed. The expanding use of the internet and the growing knowledge in computer programming has made it almost impossible to keep private information private.
Preview sample
Understand the Nature of Business Communication and How to Plan For It Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
Merger occurs when two firms enter into an agreement to move ahead with better competiveness as a single new company instead of operating separately. The above represented pyramid of ideas is intended to offer the senior managers of the acquiring company with deeper understanding of the deal in order to coherently align the strategic rationale for performing the deal.
Preview sample
The System Administrators of MegaCorp: Security Goals Information Technology Assignment
12 pages (3298 words) , Download 2 , Assignment
Free
To ensure adequate security of the network infrastructure, network devices must be configured safely and are accessed securely. During the conduct of infrastructure, application, file and print services, secure protocols should be introduced as well as utilized for network communication.
Preview sample
The Advantages and Disadvantages of Improving the Digital Divide Information Technology Coursework
11 pages (3083 words) , Download 2 , Coursework
Free
Statistics show that the fraction of the population that has internet access stands at more than half, while those that own computers stand at two thirds. The computers are used both within households and at places of work. As a result, computers greatly influence their jobs, their leisure time activities, communication patterns and their access and distribution of information.
Preview sample
The Design of Software System Information Technology Report
11 pages (2803 words) , Download 2 , Report
Free
The approach depends upon the personal interpretations of the knowledge engineer. Misunderstandings are likely in conditions whereby the experts are unwilling to deliver information or whenever they feel that their positions would be threatened by the embarrassment of technology. It is possible that the knowledge engineers meet experts who are non-cooperative or who give faulty information.
Preview sample
The Security of an Organizations Information System Information Technology Essay
4 pages (1228 words) , Download 4 , Essay
Free
The security of an organization’s information system or network system is critical and hence needs to be addressed with a lot of concerns to ensure business continuity. Having an effective IT disaster recovery plan is crucial to any organization. The most significant information such as customer records, financial information, or employee information is to be well protected.
Preview sample
Technology of the future Information Technology Research Paper
12 pages (3000 words) , Download 4 , Research Paper
Free
This research aims to evaluate and present a great amount of future technology. Technology can enrich our lives, but it’s the responsibility of the people that make sure it is put to beneficial use. Ultimately, the future will be an exciting place, but we must all work together to ensure that true progress is achieved.
Preview sample
Converting A Network of Personal Computers From Windows XP to Windows 7 Information Technology Report
20 pages (5423 words) , Download 6 , Report
Free
However, one work that has been most useful is Meredith & Mantel [Project Management: A Managerial Approach, Jack R. Meredith & Samuel J. Mantel Jr., Third Edition, John Wiley & Sons, 1995, ISBN 0-471-01626-8].  This has been extensively quoted from, and the specific references are given where appropriate. Much of the material cited below, where it has not been specifically referenced has come from the consensus of practical industry project management experience, for which specific sources cannot be cited, if many cases some years after the event.  
Preview sample
Scope and Kinds of Cyber Security Information Technology Research Paper
22 pages (5500 words) , Download 4 , Research Paper
The conclusion states thatthe common saying of “a stitch in time saves nice” aptly applies to the field of cybersecurity. This can be done so in multiple ways, the first being creating a sense of awareness, second about safe practices, third technical knowledge and increasing research in this field and finally making long-term policies that are designed towards safer operations of computers.
Preview sample
Infrastructures Of The Information Technology And Systems Information Technology Research Paper
8 pages (2000 words) , Download 3 , Research Paper
Free
Entering into the realm of Strategic Business Information Technology was never an easy decision because strategic studies in any field are supposed to be involved but when you study Information Technology in business perspective it requires expertise and mastery of both domains; the business and the Information Technology.
Preview sample
The Ethernet Technology Report Information Technology Essay
4 pages (1000 words) , Download 4 , Essay
Free
Introduced in 1980, Ethernet is presently the most widely used LAN technology that defines the cabling and signaling specification for the physical and data link layer of the OSI model. It refers to the protocols defined by the underlying data rates, the physical medium, running different signaling methods.
Preview sample
The Contributions of Web 20 in E-Learning in Saudi Arabia Information Technology Research Paper
6 pages (1846 words) , Download 2 , Research Paper
Free
The relevance and importance of E-learning to all levels of education in any given society has been felt over the years. Most governments and educational institutions have now realized that this is the perfect time of focusing on the benefits of E-Learning (Rosenberg, 2001). One of the nations supporting E-Learning in its Educational institutions is Saudi Arabia.
Preview sample
EISA: Capturing the Current State Relative to a Given Business Process Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
Some of the main contributions it has made to the company include the ability of the organization to analyze the production trends in the company and develop proactive measures of dealing with the problems. It is also important in determining the optimal process and procedures that the organization can follow to leverage its competitive advantages and realize its productivity.
Preview sample
A Detailed Overview of Virtual Reality Information Technology Research Paper
6 pages (1957 words) , Download 3 , Research Paper
Free
The primary cause of attraction of virtual reality is its capability to generate tests and experiments near to everyday life with wonderful investigational power. Virtual reality refers to a technique for computer users to imagine, control, and communicate with computers and enormously complicated data and information.
Preview sample
What Can Computing Do 'Beyond the Office' Information Technology Essay
5 pages (1250 words) , Download 4 , Essay
Free
What can Computing do ‘beyond the Office’? Artificial intelligence (AI) has emerged as a future of computing in the field of information technology. Basically, the AI is a science that is aimed at developing artificial intelligence into machines and as a result automating their actions.
Preview sample
Communication Technologies and Their Applications Information Technology Essay
3 pages (1034 words) , Download 2 , Essay
Free
The first consists of applications developed and being marketed and sold for use. The second is business enterprises that offer videoconferencing services and facilities for individuals and businesses. There is a company called Cliftons that caters to multinational clientele and provides conferencing services to its staff who are scattered across the globe.
Preview sample
Critical Requirements for Rapid Freight Information Technology Case Study
4 pages (1156 words) , Download 3 , Case Study
Free
Following the dramatic changes taking place in the global, technological arena such as challenges regarding growth and expansion, freight companies continue to struggle with the problem of instituting significant measures to counter the challenges. This paper will examine Rapid Freight Company, describing five essential requirements and analyzing them.
Preview sample
Program Management Issues Information Technology Essay
6 pages (1503 words) , Download 2 , Essay
Free
The main challenge when implementing a tech portfolio is the difficulty of shifting the entire enterprise into the new processes and technologies before they become obsolete. I am particularly interested in a Game Changer Program of Projects in the Corporation that will have a great impact, particularly in improving the working methodologies for all users.
Preview sample
Biometric Authentication, an Overview of the Telecom System Security Information Technology Assignment
5 pages (1250 words) , Download 2 , Assignment
Free
There is an important technology-based solution that is called Telecom VPNs. It is probable to snoop on network communication calls through PSTN. The suggested security management solution implants encryption facility in the telecom safety device. Such an arrangement will offer a great deal of security and privacy of network calls.
Preview sample
Clarion School for Boys Information Technology Case Study
3 pages (750 words) , Download 10 , Case Study
Free
Clarion School for Boys is apparently facing several issues with its information system. The major issue in this case study is the effectiveness in the adoption and implementation of the information system. Even through the school’s information system is being used for various functionalities, it is evident from the case that employees are lacking adequate skills and knowledge in the use of the information system.
Preview sample
Failures in Scope Control when Developing a Web Portal for EBazar.com Information Technology Case Study
8 pages (2488 words) , Download 2 , Case Study
Free
Using the PRINCE model for management, the position where this project failed was in controlling the stages of the process (see Appendix 1). The WBS or the work breakdown structure was initially set, but as the project progressed, the added elements to the scope were not distributed, thus continuing the breakdown of the overall management of the project.
Preview sample
How to Maintain Effective Accountability in Project Management Information Technology Essay
4 pages (1286 words) , Download 4 , Essay
Free
To effectively manage projects in an increasingly changing and dynamic society, the business world has put more emphasis on maintaining high standards of accountability in project management, which many project shareholders and managers believe is essential in the successful completion of a project as a result of the improved management system.
Preview sample
Internet and criminal activity Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Free
The author states that crimes make the user prone to the nuisance caused by any type of the crime because access of computer and the internet are now easier than before. Violating and offending the laws are also the crimes, but elevated technology increased the crime rates. Hacking is also most known crime in the current era of technology.
Preview sample
Advantages of New IT Management Information Technology Research Paper
4 pages (1154 words) , Download 2 , Research Paper
Free
One of the advantages is that there is central management of the services. With this system, all tasks are managed under one person and that manager will understand the working and the issues that arise with the management. The IT leaders that are found in these setups are experts in IT and will know all the technical details.
Preview sample
Reuse of Software Information Technology Essay
2 pages (500 words) , Download 2 , Essay
Free
Reuse of software is the utilization of existing assets in some kind within the process of software product development. This does not only apply to codes, but to components of the lifecycle of software development. These include designs, software components, documentation, and test suites.
Preview sample
Class student dicussions answers week 4 Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
By ensuring that certain registered user accounts have access to sensitive information; an organization may be guaranteed that only the right people get the intended information. This is one way of going about configuring the resource permissions, as Zeck put it.
Preview sample
8651 - 8700 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us