StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Introduction to Computing - Building Information Systems Information Technology Essay
6 pages (2341 words) , Download 0 , Essay
Free
Building information systems is a very difficult task partly due to the exertion of ascertaining the intended users’ requirements, but majorly because of the complexity that arises from a large number of interactions between humans and machines. In modern computing, “every actant acts on or is acted upon by at least one other actant, in order to fulfill the aims of the assemblage”.
Preview sample
Introduction to Computing - Actor Network and Assemblage Theory Information Technology Essay
6 pages (1626 words) , Download 0 , Essay
Free
Actor-Network Theory is a social type of theory developed in the 1980s by French scholars of Science and Technology Studies; Michel Callon, Bruno Latour, and John Law. ANT argues that for the existence of a network, it has to have both social and technical parts. These parts are the entities and are referred to as either actants or actors. Actants refer to either non-human or human actors.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
UML Models and User Interface Information Technology Assignment
4 pages (1042 words) , Download 0 , Assignment
Free
The paper "UML Models and User Interface" is a good example of an assignment on information technology. A use case diagram is a UML component that shows the interaction of the user with the system. The figure below shows how the users interact with the class attendance system. It is used to in analysis phase in clarification and organization of system requirements.
Preview sample
NFCPowered Mobile Application for Taking Students Attendance in Class Information Technology Report
19 pages (5055 words) , Download 0 , Report
Free
The information is classified by the operator, which will be provided by the teacher for a specified class. The system will, therefore, aid in appraising the attendance eligibility criterion of a student. The objective of developing and the need for an NFC-powered mobile application for student attendance into automating the old approach of taking attendance (Alan Dennis, 2014).
Preview sample
Development Of A Data Logging System Information Technology Lab Report
6 pages (1717 words) , Download 0 , Lab Report
Free
The process of gathering information for future applications is known as logging. Any data acquisition system is meant for gathering information from a sensor, storing and analyzing it to ensure the environment of the sensor is maintained as per the given set points in the control system.
Preview sample
Professional IT Culture Information Technology Essay
6 pages (1824 words) , Download 0 , Essay
Free
Leadership is among the most important aspects that separate success from unsuccessful businesses. Although most organizations concentrate on the importance of operational success, it is impossible to realize better and efficient results through pioneering such activities under the supervision of leaders.
Preview sample
Understanding Data Communications Information Technology Assignment
8 pages (2161 words) , Download 1 , Assignment
Free
The securing of the company's wireless network will protect the company from unwanted security concerns and will control the individuals who can access the wireless network. Depending on the functions of each channel allocation, the company would like to exclude the other channels from access this network, therefore, security will be necessary.
Preview sample
Green Data Center and Best Practices Recommendations Information Technology Case Study
8 pages (2058 words) , Download 2 , Case Study
Free
The data center and server rooms concentrate on the storage, management, and dissemination of data. The nature of the energy utilized in the data center and server rooms is supposed to be maximally utilized efficiently. These practices include power usage effectiveness, management of airflow, free cooling, and adjusting the thermostat.
Preview sample
Definition Data Communications Information Technology Assignment
6 pages (1719 words) , Download 0 , Assignment
Free
These are the differences between the TCP and the UDP. The TCP is connected based, the data makes its way across from source to destination. The UDP is not connected based meaning that one system can send a load of data to another and the relationship ends (Kumar & Rai, 2012). The other important feature of TCP IS reliability that implies all data is acknowledged. On the other hand, UDP is unreliable and there is no data acknowledgment.
Preview sample
Data Communications and Network Information Technology Assignment
7 pages (1950 words) , Download 0 , Assignment
Free
The paper “Data Communications and Network”  is a worthy example of an assignment on information technology. As we have seen, the Internet layer of TCP/IP has two protocols – IPv4 and IPv6. The transport layer provides two main protocols TCP and UDP (along with some special-purpose, minor protocols). But these are for very different reasons. 
Preview sample
Networking Essential Plan for Coal Corporation Information Technology Report
10 pages (2838 words) , Download 0 , Report
Free
In the network media, this plan has proposed the use of Radio Frequency wireless network media to facilitate the communication between the CBD office and the site. This was also facilitated by the fact that the company could not dig within the town. The subnet of the network and the IP address for every system was provided as was shown.
Preview sample
The Impact of Information Systems at Sultan Qaboos University Information Technology Term Paper
13 pages (4149 words) , Download 0 , Term Paper
Free
The higher learning instituting has been on a positive trajectory for a long time, and the author of the following paper seeks to determine and discuss how job performance, communication, and administrative performance have been influenced by the introduction of the integrated systems of information systems.
Preview sample
The Rule of Networks Sensors on Smart Cities Information Technology Research Paper
15 pages (4422 words) , Download 0 , Research Paper
Free
The experiments include network sensing devices to collect data in different areas of the city. Thus, this will require the renting of some of the network sensors centre hubs and using their devices to perform the experiment. Thus, one of the main constraints of the project would be the costs of renting the centre hub and the devices since they are largely expensive.
Preview sample
Softwares Management and the Configuration Process Information Technology Essay
12 pages (3396 words) , Download 0 , Essay
Free
One important role played by the human factor in the process of change required is the testing function. Human factors play a role in ensuring the quality of the product is upheld, finding and fixing problems and usability gaps that may be present in the product. They are in other words end-users, and so they provide the perspective of an end-user.
Preview sample
5th Generation Mobile Networks Implementation and Applicability to the Internet of Things Information Technology Literature review
33 pages (8940 words) , Download 2 , Literature review
The development of mobile technology from the analog to the LTE has been motivated by the demand to meet the requirements identified between that technology and the predecessor. The evolution of the advancement from the 2G to 3G was facilitated by the need to enable mobile internet on consumer devices to allow the transmission of data within the network. It was not until the 3.5G was developed.
Preview sample
Influence of Information Technology on Library Practices in Schools Information Technology Research Proposal
5 pages (1574 words) , Download 1 , Research Proposal
Free
The paper "Influence of Information Technology on Library Practices in Schools' is a perfect example of a research proposal on information technology. The invention and innovation of computers and internet facilities have caused great changes in the practice of librarianship. Most of the libraries in the world have initiated the integration of computers in their systems (Vijayakumar and Vijayan, 2011).
Preview sample
Data Communications and Network Information Technology Report
8 pages (2290 words) , Download 0 , Report
Free
Distributed systems, as well as network systems, only function if the interconnection between the networked devices is reliable. This means the network must be fault-tolerant and resilient. Therefore, the power or strength of a reliable network includes resiliency, and the backbone being the availability of the cost-effective redundancy of good design.
Preview sample
Implementing an Information Classification Scheme Information Technology Essay
11 pages (3199 words) , Download 1 , Essay
Free
The field of information security is a sensitive area considering the growing importance of organizational data throughout the years (Bishop, 2016). Information has become a crucial asset for companies. As such, its protection should be guaranteed as access to unauthorized parties could cripple an organization. 
Preview sample
Current Trends in Networking Information Technology Essay
12 pages (3310 words) , Download 0 , Essay
Free
Some of the most important transmission technologies that can help make this area internet-accessible include the Satellite and 3G and 4G technologies. In addition, there are certain wired transmission technologies, including Fibre Optic Broadband, DSL, Broadband over Power Line (BPL), and Broadband over Cable (BoC).
Preview sample
Key Information Security Issues Information Technology Case Study
8 pages (2098 words) , Download 1 , Case Study
Free
In a society as well as companies, information is the tool that enlightens, and therefore people can make sound decisions. More so, some people analyze data to find meaningful patterns that aid in creating strategies in business. As seen in this case scenario, the protection of information starts with small steps and then advances. It is more of a routine rather than a one-time thing.
Preview sample
Decision Support Systems Information Technology Report
18 pages (5570 words) , Download 1 , Report
Free
STEM is a software that is used by scientists and those who work in the public health sector to develop and use spatial and temporal models of emerging diseases that may be infectious to populations. The HotSpot Health Physics codes provide a quick means for approximating the effects associated with radiation emitted from a radioactive substance.
Preview sample
Hospitality Information Technology in InterContinental Hotels Group Information Technology Case Study
11 pages (3635 words) , Download 0 , Case Study
Free
The increased usage of the internet in e-commerce has greatly impacted the hospitality industry. Today, the internet has become a platform for brand imaging and reputation enhancement (Ozdipciner et al 2016). This report takes InterContinental Hotels Group (IHG) as a case study to evaluate the strength and weaknesses of a website in the hospitality industry.
Preview sample
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers by Carrier Information Technology Literature review
8 pages (2169 words) , Download 0 , Literature review
Free
The objective of this paper is to examine the research conducted by Carrier (2003). The author's central purpose and methods utilized to achieve this purpose will be examined. This will be achieved by systematically reviewing the observations and assessing the theories used. Besides that, the techniques used will be reviewed and how they were performed.
Preview sample
Global Connection through Technology in Etihad Airline Information Technology Case Study
6 pages (1787 words) , Download 0 , Case Study
Free
The Etihad Airline commenced its operation in November 2003.  Currently, the Etihad Airline operates more than 1000 flights every week with over 120 destinations for both passengers and cargo. These destinations include Middle East, Africa, Australia, and America among other regions. The Airline has a fleet of 122 both Airbus and Boeing aircraft as of July year 2016.
Preview sample
Cloud Computing and Virtualisation Information Technology Assignment
7 pages (1868 words) , Download 1 , Assignment
Free
In essence, multi-tenancy entails the implementation of resource-sharing and virtualization in the cloud computing environment. Even though several contradicting arguments have emerged from software developers and security experts, cloud service providers (CSPs) continue to use multi-tenancy in certain cases.
Preview sample
Information System in Information Technology Information Technology Assignment
9 pages (2559 words) , Download 0 , Assignment
Free
Attaining operational efficiency of the registration system suffices to be the main objective of the CIT system (Fahmy 2007). One of the benefits of the system is to eliminate the need for students to form long queues in halls during the registration process. The system uses few menus thereby guaranteeing its simplicity and flexibility.
Preview sample
Access to Technology and Economic Development Information Technology Literature review
6 pages (1713 words) , Download 0 , Literature review
Free
Technological growth and advancement play a great role in economic development in Australia and other parts of the world. It is clear that the Internet and world-wide-web technologies are key drivers for economic growth and prosperity. Enhanced communication and connectivity is a positive aspect of technology.
Preview sample
The New Era of Terrorism Information Technology Case Study
26 pages (6500 words) , Case Study
Nobody downloaded yet
From the realist theory, cyberspace has become a modern battlefield in which war is designed and propagated to the physical arena. This theory is seen in the manner in which the attacks are structured to represent the terrorism categories of simple unstructured, advanced structured, and complex coordinated attacks (Jarvis, Nouri & Whiting 2015).
Preview sample
The Internet Create More Serious Problems than it Solve Information Technology Case Study
6 pages (1833 words) , Download 0 , Case Study
Free
The internet has been used by every generation, and the results have been both negative and positive. On the evaluation of the effects of internet use, we should reduce using the internet because it has negative aspects than benefits. Science and technology have gone high making human beings be fully dependent on machine use.
Preview sample
Commercial OLAP Tools Functions And Limitation Information Technology Essay
6 pages (1730 words) , Download 0 , Essay
Free
To make any management decision, you must have the information necessary for this, usually quantitative. To do this, it is necessary to collect this data from all information systems of the enterprise, bring it to a common format and only then analyze it. For this, data warehouses are created.
Preview sample
US Laws Cannot Prevent Cyber-Bullying Information Technology Essay
6 pages (1796 words) , Download 0 , Essay
Free
Cyberbullying can be described as defaming, insulting, threatening, or deliberately harassing other individuals via contemporary communication techniques. Such harassment is, in general, for protracted periods. Cyberbullying transpires on the Internet or over the telephone. In the majority of the instances, the offender, who is termed the bully, acts anonymously, and the victim fails to realize the source of such attacks.
Preview sample
Modeling Security Risk Information Technology Literature review
6 pages (1500 words) , Download 0 , Literature review
Free
The goal-oriented threat model shows the relationship between assets that should be assessed when determining the risk. Assets are assessed during the process of threat modeling to determine how they impact confidentiality, integrity, and availability. This paper concentrates on the identification of the risks, evaluation of the risks, risk vulnerabilities, and possible solutions.
Preview sample
Cyber Attack on King Saud University Official Website Information Technology Case Study
6 pages (1500 words) , Download 0 , Case Study
Free
The use of computers has played a vital role in facilitating access to government services. During the beginning times of the 21st century, there were fast improvements in computer technology; this was facilitated by the availability of more powerful and cheap computers which were rapidly interlinked through the social network.
Preview sample
Threat Detection Systems Information Technology Term Paper
8 pages (2000 words) , Download 0 , Term Paper
Free
The intrusion detection system is beneficial since it is flexible to the requirements and needs of a customer. In that case, the detection system will be armed with numerous sensors and detectors with advanced capabilities of processing signals and control options that assist in managing threats prior to their occurrences. 
Preview sample
Current Networking Trends and Poor Network Connectivity in the Orkney Islands Information Technology Case Study
11 pages (3028 words) , Download 0 , Case Study
Free
Networking has been one of the areas in IT where innovation has seen high growth in more advanced technologies. Resulting in high speed, more reliable, and highly available Internet. Also, the technological advancement in networking has also seen the realization of technologies that overcome the physical hindrances to the infrastructural developments.
Preview sample
Parental Perspectives on Internet Technology Use by Emirati Children Information Technology Research Proposal
10 pages (2766 words) , Download 1 , Research Proposal
Free
The region of UAE has been hailed by many as a hub of technology in the Islamic world. So, by studying Internet adoption and use beginning with children aged 0-10 years, the researcher was sure about getting the entire picture and spectrum of parents' and adults' perception of the Internet and technology devices as well.
Preview sample
Data Classification Using Weka Software Information Technology Lab Report
6 pages (1646 words) , Download 2 , Lab Report
Free
The data may be obtained as free texts from websites or other social sites, also, the data can be structured data existing within a given structured data repository. There exist tools for data mining, and these are the tools that are used to derive sense from a given set of data. Data mining is a technique in addressing the existing complexities in data, more so the unstructured data.
Preview sample
Contact Locker Application Information Technology Case Study
5 pages (1438 words) , Download 0 , Case Study
Free
The paper “Contact Locker Application” is an intriguing example of a case study on information technology. Phone privacy has been a major challenge for most users. Mobile phone manufacturers and the operating systems developers always have every phone feature accessible once the phone is on.
Preview sample
A Geographic Information System: Icloud Information Technology Essay
6 pages (1590 words) , Download 1 , Essay
Free
Most software services are already on the cloud while many others are also headed for the cloud. Desktop applications are soon to become a thing of the future as most applications move to the cloud. Today, you can store documents, images, presentations, calendars, articles, and many other file types on the cloud.
Preview sample
Advantages and Disadvantages of Using UDP, TCP Protocol Information Technology Assignment
5 pages (1506 words) , Download 0 , Assignment
Free
The paper “Advantages and Disadvantages of Using UDP, TCP Protocol” is a  potent variant of assignment on information technology. Network administrators can enjoy several benefits if they decide to make use of the TCP protocol. Chief among these is its sophisticated security features that include a three-way handshake.
Preview sample
Computer Networks Problem Solving Information Technology Assignment
8 pages (2216 words) , Download 1 , Assignment
Free
The control mechanism of how the application receives and sends data is left to the customized designed. More methodologies can be defined by the application on how the flow and control of being data are designed to be, adding on top of the existing UDP protocol. The open platform offered by the UDP protocol can accommodate as many protocols as the application can have.
Preview sample
The Challenges in the Internet of Things Information Technology Research Paper
16 pages (4653 words) , Download 4 , Research Paper
Free
In the IoT context, security should focus on both the needed security services and how the services would be achieved in the entire system as well as how to execute the security functionalities. Even though security considerations have been there in the IT context, the features of various IoT executions bring about unique and new security challenges.
Preview sample
Computer Networks -Development of Ethernet Information Technology Assignment
10 pages (2689 words) , Download 1 , Assignment
Free
In modern switched Ethernet networks, it is not unusual for a router to receive more traffic than it is able to forward due to the relative speeds of the Ethernet network versus the links from the router to other networks or the Internet. In such circumstances, packets would be randomly dropped either by the router or by the interconnecting switch when buffers are filled.
Preview sample
Advantages and Disadvantages of Mikrotik Extreme Protocols in Wireless Networks Information Technology Assignment
5 pages (1473 words) , Download 0 , Assignment
Free
The paper "Advantages and Disadvantages of Mikrotik Extreme Protocols in Wireless Networks” is a  cogent variant of assignment on information technology. Polling is a method used to check the readiness of a terminal device. In a network, a central controlling device sends a poll message to a specific device connected to that network, all terminals receive the message.
Preview sample
Application of Polling Models to Computer Networks Information Technology Assignment
7 pages (1883 words) , Download 1 , Assignment
Free
Polling can be used with busy-wait polling where when the receiving device is ready, the router then forwards packets to it otherwise the router performs other tasks. Polling in networks has its own advantage in that it is efficient in applications where the inbound data is a lot as in the case of a router receiving more traffic than it is able to forward.
Preview sample
Local and Wide Area Network Information Technology Essay
7 pages (1991 words) , Download 1 , Essay
Free
The Local area Network illustrated uses Ethernet technology and the switch to interconnect devices on the network to facilitate communication through forwarding of data. The network qualifies as a LAN because of the switch which acts as a server to the clients, and the router which is connected to another network usually through the internet.
Preview sample
Gold Storage Facility Surveillance Design Information Technology Case Study
8 pages (2420 words) , Download 0 , Case Study
Free
Although so many installed CCTV systems do not deliver the role of identifying, deterring, and preventing security crimes; it can do a lot better if a good thought is put into its design, configuration, and installation. Albeit being a key security measure, CCTV surveillance is complemented by other security systems such as access control, intruder alarms, and proper mechanical protection.
Preview sample
Serious Games in the Field of Military and Defense Information Technology Essay
9 pages (2742 words) , Download 0 , Essay
Free
Serious games have different features which make them useful in the industry. The military and defense are one of the industries that utilize serious gaming for their activities. In the military serious games were developed about 30 years ago (Raybourn, 2014).  In most cases, it is specifically used for simulations and training of the personnel.
Preview sample
Cloud Computing and Virtualization in S-mart Information Technology Case Study
6 pages (1635 words) , Download 1 , Case Study
Free
Cloud computing is associated with risks such as inability to access the internet leaving data out of reach, lack of room for negotiation, reliance on the third party, business data at risk, and automatic updates risk. As a result, the company decided to design its own model to mitigate some of the risks associates with cloud computing. 
Preview sample
Effect of Gender on Responses to Negative Experience on Facebook Information Technology Research Paper
6 pages (1682 words) , Download 0 , Research Paper
Free
Modern advancements in technology have resulted in changes in all social dimensions. It was common to see another child grab another’s hair in the playground, or another shoving a smaller boy to the ground. It continues at the dinner table and family picnics. Advancements in technology have enabled bullying to creep into every aspect of social life unlike before.
Preview sample
851 - 900 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us