Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
Building information systems is a very difficult task partly due to the exertion of ascertaining the intended users’ requirements, but majorly because of the complexity that arises from a large number of interactions between humans and machines. In modern computing, “every actant acts on or is acted upon by at least one other actant, in order to fulfill the aims of the assemblage”.
Actor-Network Theory is a social type of theory developed in the 1980s by French scholars of Science and Technology Studies; Michel Callon, Bruno Latour, and John Law. ANT argues that for the existence of a network, it has to have both social and technical parts. These parts are the entities and are referred to as either actants or actors. Actants refer to either non-human or human actors.
Preview sample
sponsored ads
Hire a pro to write a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
The paper "UML Models and User Interface" is a good example of an assignment on information technology. A use case diagram is a UML component that shows the interaction of the user with the system. The figure below shows how the users interact with the class attendance system. It is used to in analysis phase in clarification and organization of system requirements.
The information is classified by the operator, which will be provided by the teacher for a specified class. The system will, therefore, aid in appraising the attendance eligibility criterion of a student. The objective of developing and the need for an NFC-powered mobile application for student attendance into automating the old approach of taking attendance (Alan Dennis, 2014).
The process of gathering information for future applications is known as logging. Any data acquisition system is meant for gathering information from a sensor, storing and analyzing it to ensure the environment of the sensor is maintained as per the given set points in the control system.
Leadership is among the most important aspects that separate success from unsuccessful businesses. Although most organizations concentrate on the importance of operational success, it is impossible to realize better and efficient results through pioneering such activities under the supervision of leaders.
The securing of the company's wireless network will protect the company from unwanted security concerns and will control the individuals who can access the wireless network. Depending on the functions of each channel allocation, the company would like to exclude the other channels from access this network, therefore, security will be necessary.
The data center and server rooms concentrate on the storage, management, and dissemination of data. The nature of the energy utilized in the data center and server rooms is supposed to be maximally utilized efficiently. These practices include power usage effectiveness, management of airflow, free cooling, and adjusting the thermostat.
These are the differences between the TCP and the UDP. The TCP is connected based, the data makes its way across from source to destination. The UDP is not connected based meaning that one system can send a load of data to another and the relationship ends (Kumar & Rai, 2012). The other important feature of TCP IS reliability that implies all data is acknowledged. On the other hand, UDP is unreliable and there is no data acknowledgment.
The paper “Data Communications and Network” is a worthy example of an assignment on information technology. As we have seen, the Internet layer of TCP/IP has two protocols – IPv4 and IPv6. The transport layer provides two main protocols TCP and UDP (along with some special-purpose, minor protocols). But these are for very different reasons.
In the network media, this plan has proposed the use of Radio Frequency wireless network media to facilitate the communication between the CBD office and the site. This was also facilitated by the fact that the company could not dig within the town. The subnet of the network and the IP address for every system was provided as was shown.
The higher learning instituting has been on a positive trajectory for a long time, and the author of the following paper seeks to determine and discuss how job performance, communication, and administrative performance have been influenced by the introduction of the integrated systems of information systems.
15 pages (4422 words)
, Download 0
, Research Paper
Free
The experiments include network sensing devices to collect data in different areas of the city. Thus, this will require the renting of some of the network sensors centre hubs and using their devices to perform the experiment. Thus, one of the main constraints of the project would be the costs of renting the centre hub and the devices since they are largely expensive.
One important role played by the human factor in the process of change required is the testing function. Human factors play a role in ensuring the quality of the product is upheld, finding and fixing problems and usability gaps that may be present in the product. They are in other words end-users, and so they provide the perspective of an end-user.
33 pages (8940 words)
, Download 2
, Literature review
The development of mobile technology from the analog to the LTE has been motivated by the demand to meet the requirements identified between that technology and the predecessor. The evolution of the advancement from the 2G to 3G was facilitated by the need to enable mobile internet on consumer devices to allow the transmission of data within the network. It was not until the 3.5G was developed.
5 pages (1574 words)
, Download 1
, Research Proposal
Free
The paper "Influence of Information Technology on Library Practices in Schools' is a perfect example of a research proposal on information technology. The invention and innovation of computers and internet facilities have caused great changes in the practice of librarianship. Most of the libraries in the world have initiated the integration of computers in their systems (Vijayakumar and Vijayan, 2011).
Distributed systems, as well as network systems, only function if the interconnection between the networked devices is reliable. This means the network must be fault-tolerant and resilient. Therefore, the power or strength of a reliable network includes resiliency, and the backbone being the availability of the cost-effective redundancy of good design.
The field of information security is a sensitive area considering the growing importance of organizational data throughout the years (Bishop, 2016). Information has become a crucial asset for companies. As such, its protection should be guaranteed as access to unauthorized parties could cripple an organization.
Some of the most important transmission technologies that can help make this area internet-accessible include the Satellite and 3G and 4G technologies. In addition, there are certain wired transmission technologies, including Fibre Optic Broadband, DSL, Broadband over Power Line (BPL), and Broadband over Cable (BoC).
In a society as well as companies, information is the tool that enlightens, and therefore people can make sound decisions. More so, some people analyze data to find meaningful patterns that aid in creating strategies in business. As seen in this case scenario, the protection of information starts with small steps and then advances. It is more of a routine rather than a one-time thing.
STEM is a software that is used by scientists and those who work in the public health sector to develop and use spatial and temporal models of emerging diseases that may be infectious to populations. The HotSpot Health Physics codes provide a quick means for approximating the effects associated with radiation emitted from a radioactive substance.
The increased usage of the internet in e-commerce has greatly impacted the hospitality industry. Today, the internet has become a platform for brand imaging and reputation enhancement (Ozdipciner et al 2016). This report takes InterContinental Hotels Group (IHG) as a case study to evaluate the strength and weaknesses of a website in the hospitality industry.
8 pages (2169 words)
, Download 0
, Literature review
Free
The objective of this paper is to examine the research conducted by Carrier (2003). The author's central purpose and methods utilized to achieve this purpose will be examined. This will be achieved by systematically reviewing the observations and assessing the theories used. Besides that, the techniques used will be reviewed and how they were performed.
The Etihad Airline commenced its operation in November 2003. Currently, the Etihad Airline operates more than 1000 flights every week with over 120 destinations for both passengers and cargo. These destinations include Middle East, Africa, Australia, and America among other regions. The Airline has a fleet of 122 both Airbus and Boeing aircraft as of July year 2016.
In essence, multi-tenancy entails the implementation of resource-sharing and virtualization in the cloud computing environment. Even though several contradicting arguments have emerged from software developers and security experts, cloud service providers (CSPs) continue to use multi-tenancy in certain cases.
Attaining operational efficiency of the registration system suffices to be the main objective of the CIT system (Fahmy 2007). One of the benefits of the system is to eliminate the need for students to form long queues in halls during the registration process. The system uses few menus thereby guaranteeing its simplicity and flexibility.
6 pages (1713 words)
, Download 0
, Literature review
Free
Technological growth and advancement play a great role in economic development in Australia and other parts of the world. It is clear that the Internet and world-wide-web technologies are key drivers for economic growth and prosperity. Enhanced communication and connectivity is a positive aspect of technology.
From the realist theory, cyberspace has become a modern battlefield in which war is designed and propagated to the physical arena. This theory is seen in the manner in which the attacks are structured to represent the terrorism categories of simple unstructured, advanced structured, and complex coordinated attacks (Jarvis, Nouri & Whiting 2015).
The internet has been used by every generation, and the results have been both negative and positive. On the evaluation of the effects of internet use, we should reduce using the internet because it has negative aspects than benefits. Science and technology have gone high making human beings be fully dependent on machine use.
To make any management decision, you must have the information necessary for this, usually quantitative. To do this, it is necessary to collect this data from all information systems of the enterprise, bring it to a common format and only then analyze it. For this, data warehouses are created.
Cyberbullying can be described as defaming, insulting, threatening, or deliberately harassing other individuals via contemporary communication techniques. Such harassment is, in general, for protracted periods. Cyberbullying transpires on the Internet or over the telephone. In the majority of the instances, the offender, who is termed the bully, acts anonymously, and the victim fails to realize the source of such attacks.
6 pages (1500 words)
, Download 0
, Literature review
Free
The goal-oriented threat model shows the relationship between assets that should be assessed when determining the risk. Assets are assessed during the process of threat modeling to determine how they impact confidentiality, integrity, and availability. This paper concentrates on the identification of the risks, evaluation of the risks, risk vulnerabilities, and possible solutions.
The use of computers has played a vital role in facilitating access to government services. During the beginning times of the 21st century, there were fast improvements in computer technology; this was facilitated by the availability of more powerful and cheap computers which were rapidly interlinked through the social network.
The intrusion detection system is beneficial since it is flexible to the requirements and needs of a customer. In that case, the detection system will be armed with numerous sensors and detectors with advanced capabilities of processing signals and control options that assist in managing threats prior to their occurrences.
Networking has been one of the areas in IT where innovation has seen high growth in more advanced technologies. Resulting in high speed, more reliable, and highly available Internet. Also, the technological advancement in networking has also seen the realization of technologies that overcome the physical hindrances to the infrastructural developments.
10 pages (2766 words)
, Download 1
, Research Proposal
Free
The region of UAE has been hailed by many as a hub of technology in the Islamic world. So, by studying Internet adoption and use beginning with children aged 0-10 years, the researcher was sure about getting the entire picture and spectrum of parents' and adults' perception of the Internet and technology devices as well.
The data may be obtained as free texts from websites or other social sites, also, the data can be structured data existing within a given structured data repository. There exist tools for data mining, and these are the tools that are used to derive sense from a given set of data. Data mining is a technique in addressing the existing complexities in data, more so the unstructured data.
The paper “Contact Locker Application” is an intriguing example of a case study on information technology. Phone privacy has been a major challenge for most users. Mobile phone manufacturers and the operating systems developers always have every phone feature accessible once the phone is on.
Most software services are already on the cloud while many others are also headed for the cloud. Desktop applications are soon to become a thing of the future as most applications move to the cloud. Today, you can store documents, images, presentations, calendars, articles, and many other file types on the cloud.
The paper “Advantages and Disadvantages of Using UDP, TCP Protocol” is a potent variant of assignment on information technology. Network administrators can enjoy several benefits if they decide to make use of the TCP protocol. Chief among these is its sophisticated security features that include a three-way handshake.
The control mechanism of how the application receives and sends data is left to the customized designed. More methodologies can be defined by the application on how the flow and control of being data are designed to be, adding on top of the existing UDP protocol. The open platform offered by the UDP protocol can accommodate as many protocols as the application can have.
16 pages (4653 words)
, Download 4
, Research Paper
Free
In the IoT context, security should focus on both the needed security services and how the services would be achieved in the entire system as well as how to execute the security functionalities. Even though security considerations have been there in the IT context, the features of various IoT executions bring about unique and new security challenges.
In modern switched Ethernet networks, it is not unusual for a router to receive more traffic than it is able to forward due to the relative speeds of the Ethernet network versus the
links from the router to other networks or the Internet. In such circumstances, packets would be randomly dropped either by the router or by the interconnecting switch when
buffers are filled.
The paper "Advantages and Disadvantages of Mikrotik Extreme Protocols in Wireless Networks” is a cogent variant of assignment on information technology. Polling is a method used to check the readiness of a terminal device. In a network, a central controlling device sends a poll message to a specific device connected to that network, all terminals receive the message.
Polling can be used with busy-wait polling where when the receiving device is ready, the router then forwards packets to it otherwise the router performs other tasks. Polling in networks has its own advantage in that it is efficient in applications where the inbound data is a lot as in the case of a router receiving more traffic than it is able to forward.
The Local area Network illustrated uses Ethernet technology and the switch to interconnect devices on the network to facilitate communication through forwarding of data. The network qualifies as a LAN because of the switch which acts as a server to the clients, and the router which is connected to another network usually through the internet.
Although so many installed CCTV systems do not deliver the role of identifying, deterring, and preventing security crimes; it can do a lot better if a good thought is put into its design, configuration, and installation. Albeit being a key security measure, CCTV surveillance is complemented by other security systems such as access control, intruder alarms, and proper mechanical protection.
Serious games have different features which make them useful in the industry. The military and defense are one of the industries that utilize serious gaming for their activities. In the military serious games were developed about 30 years ago (Raybourn, 2014). In most cases, it is specifically used for simulations and training of the personnel.
Cloud computing is associated with risks such as inability to access the internet leaving data out of reach, lack of room for negotiation, reliance on the third party, business data at risk, and automatic updates risk. As a result, the company decided to design its own model to mitigate some of the risks associates with cloud computing.
6 pages (1682 words)
, Download 0
, Research Paper
Free
Modern advancements in technology have resulted in changes in all social dimensions. It was common to see another child grab another’s hair in the playground, or another shoving a smaller boy to the ground. It continues at the dinner table and family picnics. Advancements in technology have enabled bullying to creep into every aspect of social life unlike before.