StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Advantages of Multitouch Technology Information Technology Case Study
3 pages (825 words) , Download 2 , Case Study
Free
The use of a multitouch interface is at an early stage.  There are certain issues related to the implementation of multitouch interfaces which are required to be addressed effectively in order to avail the advantages of the multitouch interfaces (New To The Touch, “Interactive Session: Technology”).
Preview sample
IP Networking - Cisco onfigurations Information Technology Report
6 pages (1524 words) , Download 2 , Report
Free
Company X wants to connect its corporate headquarters to three regional branches (Region 1, Region 2, and Region 3). This will be made possible by developing the Cisco configurations and IP addressing scheme. Previously, the company contracted a consultant to carry out the activity but it was poorly done.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Vint Cerf as the Father of the Internet Information Technology Essay
9 pages (2417 words) , Download 2 , Essay
Free
The data transfer rate in hard drives is actually another feature that is a crucial component to discuss. Generally speaking, a typical 7,200 rpm desktop HDD contains a high data transfer rate in which it depends on the track location. This particular platter in contemporary HDDs is spun at speeds that are in the realm of around 4,200 rpm.
Preview sample
Team member encouragement Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
A project manager has the mandate to plan, manage, and ensure the success and timely completion of a given project. However, this proves to be a daunting task for most project managers. In my case as a project manager on the large multidisciplinary product testing team, I am having problems with two team members who are consistently late turning in weekly reports.
Preview sample
Social Media and Security Issues Information Technology Term Paper
4 pages (1218 words) , Download 2 , Term Paper
Free
The cost-effective and instant communication over digitized networks has left other technologies far too behind, thanks to social networking which enable humans to communicate in a surprising and innovative way. An idea is available (Facinelli, 2009) that states it as “user-generated content or consumer-generated media”.
Preview sample
Project Part 4: Challenges - Regulations, Ethics, and Security Information Technology Research Paper
3 pages (750 words) , Download 4 , Research Paper
Free
This paper therefore will reflect on the various general risk challenges associated with projects including the regulatory, ethical and security challenges affecting the projects. Again, the paper will discuss some of the federal state regulations and the changes to the local regulations, which can cause challenges to the project.
Preview sample
Intellectual Property Information Technology Essay
3 pages (750 words) , Download 2 , Essay
A creative piece of work (i.e. music, art, writing, film, or computer software) always belongs to its creator. Additionally, these creative works, ideas, expressions and inventions are very precious for their inventors and must be protected however these ideas or thoughts are not known as intellectual property.
Preview sample
Categories of Cloud Computing Information Technology Research Paper
4 pages (1098 words) , Download 6 , Research Paper
Free
Users do not need to install those applications in their computer systems rather they can access those applications through the internet. Schauland (2011) states, “Surfacing in late 2007, cloud computing is used to allow services used in everyday practice to be moved onto the Internet rather than stored on a local computer”.
Preview sample
CB Hart Law Firm: An Information Security Information Technology Report
11 pages (3153 words) , Download 2 , Report
Free
Through developing and integrating a database to collect and incorporate information into a program; software that can sort, store, and display the content when demanded. Depending on the database sight owners' requirements, the database in order software displayed in a number of styles. With attributes like primary and secondary keys, the chances of data redundancy are reduced.
Preview sample
E-learning: Benefits and Barriers for Primary School Education Information Technology Article
10 pages (2500 words) , Download 4 , Article
Free
As the Internet and mobile communication tools become popular among adults and children alike, e-learning becomes increasingly applied in the educational sector too. Education scholars and teachers, however, are divided on the benefits and limitations of e-learning.
Preview sample
Workplace Ethics: Decision Making Information Technology Essay
2 pages (500 words) , Download 3 , Essay
Free
Ethical Decision Making: According to the virtue ethics approach, the co-worker needs to be dealt with humanity and kindness because they are good traits to have in my personality. “Virtue ethics is an approach that deemphasizes rules, consequences and particular acts and places the focus on the kind of person who is acting (Garrett, 2005).
Preview sample
Network Organization, Addressing, and Routing Protocols Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Likewise, the interior gateway protocol that is utilized between routers represents a part of a single (AS) Autonomous System. OSPF also has a functionality of link state technology that exchange router information associated with routing information. Moreover, a database demonstrating the Autonomous system’s topology is maintained in each OSPF router ("Open Shortest Path First." 353-353).
Preview sample
Challenges of Knowledge Transfer in Organisations Information Technology Literature review
3 pages (750 words) , Download 4 , Literature review
Furthermore, organizations today are struggling hard in order to make sure that the right kind of knowledge is being transferred among the employees. This concept has become particularly important because of the increased competition in the market. Therefore, it is immensely important for all the organizational members to have the right set of knowledge.
Preview sample
Efficiency of Clustering Algorithms in Mining Biological Databases Information Technology Research Paper
5 pages (1250 words) , Download 3 , Research Paper
Free
With regard to the number of samples, most clustering algorithms tend to perform poorly with the increase in the number of samples. KM algorithms are known to be efficient even in large samples. As earlier been noted, dimension is another important factor that significantly affects the efficiency of various types of clustering algorithms.
Preview sample
IT Systems Planning and Acquisition Information Technology Essay
3 pages (750 words) , Download 2 , Essay
The scope of a project determines what is in and out of the project? It identifies all the deliverables and defines a boundary of a project. The scope of a project has to be identified in an early phase of a project, documented accordingly and all the stakeholders should be agreed on the scope document.
Preview sample
Business Needs Assessment Information Technology Essay
4 pages (1137 words) , Download 2 , Essay
Free
Audience prerequisites refer to the primary requirements or knowledge required to operate or do certain processes or tasks. With due consideration to this aspect, employees of the organization should have basic knowledge about the usage of the computer so that an employee can easily comprehend the provided terminologies in the user manual. 
Preview sample
Computing and Information Technology Information Technology Essay
4 pages (1727 words) , Download 2 , Essay
Free
This development has not only enabled innovation but also opened avenues for growth and economic prosperity. However, as technology advances, the risks involved also increase. It has therefore been important in today’s world to ensure that technology systems are secured with the latest computer security software available.
Preview sample
The Rate of Crime on the Internet Information Technology Research Paper
4 pages (1276 words) , Download 2 , Research Paper
Free
The number of e-threats facing consumers and e-commerce providers using the internet is innumerable (Chou, 2012). Today, many customers are at risk of losing personally-identifying information to criminals who use sophisticated technology to steal data from consumers and use them for criminal activities.
Preview sample
The Successes of Social Media Information Technology Essay
3 pages (970 words) , Download 2 , Essay
Free
Although online marketing has numerous advantages, compared to the usual marketing channels, it faces various challenges that a marketer needs to scale out if revenues have to be realized. The above-discussed issues affecting social media marketing, classified into technological and ethical issues would help a marketer to realize increased revenues.
Preview sample
Goals and Objectives of Advertising Information Technology Term Paper
6 pages (1500 words) , Download 2 , Term Paper
Free
Advertising is a practice common among organizations aimed at informing, educating, convincing and swaying consumers into having favorable tastes and preference for the products or services that they offer. In essence, advertisements are driven by different goals and objectives; some to improve the purchase of products or services.
Preview sample
Creating a Database Management System: Mountain Bike Rentals Information Technology Research Paper
6 pages (1590 words) , Download 3 , Research Paper
Free
Moreover, as this demand for more trails has increased, so has the demand of mountain rental bikes. For that Smart Rent is a commercial mountain bike service that is offered by Smart Rent Corporation. The program is designed for one-way mountaineering. The bikes are not bound to a rack, however, they can be left at the adjoining crossing in a defined core area, as they have a lock devices instated at the bicycles themselves.
Preview sample
Advancements in Communications The Use of Cloud Computing Information Technology Research Paper
8 pages (2000 words) , Download 4 , Research Paper
Free
This paper discusses the use of the cloud computing in communication. Basically, the term ‘cloud computing’ refers to the application of a cloud image to correspond to the internet or some huge networked setting. In other words, cloud computing is a standard term for anything that engages offering hosted tools and services on the internet.
Preview sample
Specification and Design Information Technology Dissertation
6 pages (1500 words) , Download 4 , Dissertation
Free
This essay discusses that with the current paces in technology where there is an increasing number of service that is available over the wire and wireless connections, the technology is changing from narrowband such as telephones over wires to the wideband where the services that previously used the narrowband would migrate and use the wideband.
Preview sample
Complex Computer Systems Information Technology Research Paper
5 pages (1559 words) , Download 2 , Research Paper
Free
The Smart Meter System used higher-level languages like Java, which are independent of hardware combined with assembly-level languages that are specialized and dependent on the hardware. The higher layer depended on the facilities of the lower layers for proper functionality (Rajaraman & Radhakrishnan, 2007). 
Preview sample
Ethics of Artificial Intelligence & Machine Learning Information Technology Essay
1 pages (449 words) , Download 11 , Essay
Free
Currently, machines owing to their complex advancements over years have resulted in tackling varied and even intricate tasks challenging to human beings. However, this breakthrough has not prompted professionals especially in the field of machines rest but even work more to rectify significant shortcomings evident in robots and similar devices.
Preview sample
Cloud Computing Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
For an organization that is adopting cloud computing for the first time, I would recommend that they take the following steps into consideration. The first step should be infrastructure evaluation, which involves looking at things like data transmission and storage, legal activities, authorization, auditing and monitoring capabilities, and disaster recovery issues among others.
Preview sample
Clifford Stoll: The call to learn Information Technology Essay
3 pages (750 words) , Download 3 , Essay
He is also an astronomer; in fact, some of the things that he mentioned during his TED speed referred to as “Clifford Stoll: The call to learn” were fascinating. There are several interesting ideas that he mentioned at the beginning of his speech such as his view about computer in schools; though, he does not present a detailed discussion.
Preview sample
Cyber Ethics and the Use of Technology Laws Information Technology Essay
6 pages (1684 words) , Download 2 , Essay
Free
The moral issues surrounding copyright issues and the internet downloading of material copyrighted to individuals have been under great debate over a long period of time. The focus of this essay will be centered on the argumentative approaches that support the fact that ethics regarding to matters has both its pros and cons when viewed from the educative and economical paradigms.
Preview sample
National Programme for Information Technology Information Technology Essay
7 pages (1750 words) , Download 4 , Essay
Free
The implementation of the NPfIT is a huge undertaking because of its size and complexity as compared to previous large scale health service IT projects in the UK and other countries, such as Australia and the USA, that proved very difficult or have failed because of organisational, sociocultural and technical factors.
Preview sample
Centralized PC Security Information Technology Essay
6 pages (1651 words) , Download 2 , Essay
Free
The employees will access the data files from the head office to the regional office via File Transfer Protocol (FTP). WAN will connect the database from the regional office to the head office. DSL will be used for the Internet connection. DSL connection works with a modem for transmitting and receiving data from the Internet.
Preview sample
Control Objectives for Information and Relation Technology Information Technology Assignment
10 pages (2606 words) , Download 2 , Assignment
Free
The project risk management for the Dreamliner Project is defined in stages. The stages are Identity, Analyze, Plan Response. The identification stage addresses all members of the Dreamliner project to contribute to the responsibility of classifying potential risks. One of the examples includes the role of the project execution officer.
Preview sample
The Benetfits of Outsourcing Your Call Center to India Information Technology Term Paper
6 pages (1815 words) , Download 3 , Term Paper
Free
The process gets greatly facilitated through major advancements in the fields of transportation, communication and information technology. The concept of production sharing has not remained limited to the trade-in goods and commodities but has increasingly fragmented and dispersed into other functions and services across the world to enjoy the advantages of the marginal differences in resources, costs and markets.
Preview sample
Ethical and Social Issues in Information System Information Technology Report
7 pages (2397 words) , Download 2 , Report
Free
Keeping in view the above discussion we can clearly conclude that the technology is not the actual problem, but the issue is with the implementation of the technology, procedure, and the structure of the organization. Companies who cannot afford to implement Green information technology (IT) should opt for less expensive technology as there are several other substitutes available.
Preview sample
Electronic Monitoring and Employee Productivity Information Technology Assignment
4 pages (1000 words) , Download 3 , Assignment
Free
Electronic Monitoring and Employee Productivity. Recent technological advancements have played a great role in the work place because they have enhanced the employers’ ability to monitor virtually every aspect of an employee’s activities. Approximately two thirds of managers in America are reported to be engaged some form electronic monitoring or surveillance of their employees.
Preview sample
Developments in Social Networking Sites Information Technology Literature review
7 pages (1977 words) , Download 2 , Literature review
Free
As society proceeds and creeps into a vastly technological age with people becoming more mobile and more global, it is only fitting that new developments take place is social fields along with all others. In this way, social networking sites and their constant development are only fitting to the needs of society and we ought to milk their benefits to the maximum for the sake of progress.
Preview sample
Strengths and Weaknesses of Wireless Networking Information Technology Essay
11 pages (2750 words) , Download 3 , Essay
Free
When the number of users increases they also need to increase number of computers. In many cases, organizations need to process a large amount of data entered by different users simultaneously. In this scenario, the implementation of a network becomes essential.
Preview sample
Organizational Dynamics of Implementing Business Intelligence Information Technology Essay
5 pages (1533 words) , Download 2 , Essay
Free
Power structure dynamics; refers to the power struggles found at different levels of an organization or a business enterprise. Each person employed by a company always wants to be on the best available project and be better than other employees. This results in conflicts, which affects the positions available regarding business intelligence.
Preview sample
Inheritance Information Technology Assignment Information Technology Assignment
3 pages (750 words) , Download 3 , Assignment
Free
In object-oriented program a good design practice calls for creation of fairly generic version of a class. The programmer then uses these generic classes to build up specialized classes. This is achieved through inheritance. Oracle (2012) defines inheritance as that ability of a class to inherit commonly used structure and behavior from another class.
Preview sample
Information Systems in Healthcare Information Technology Literature review
6 pages (1752 words) , Download 5 , Literature review
Free
The aspect of Information Technology (IT) is considered to be quite imperative for healthcare units as it helps to detect or identify the problems being witnessed by a particular patient. This definite aspect also helps the healthcare units to serve the patients with appropriate form of treatments (Bose, 2003).
Preview sample
Sarbanes Oxley legislation Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Free
Due to this, the congress in the country enforced the Sarbanes-Oxley legislation of 2002. The legislation is very vital in the US corporate world. The law was passed to make the public trust and have confidence in the financial status of companies. The legislation is only applicable to the public held companies.
Preview sample
Fuzzy Logic with Data Mining with respect to Prediction and Clustering Information Technology Research Proposal
8 pages (2390 words) , Download 3 , Research Proposal
Free
Fuzzy logic is an approach of data mining which involves computing the data based on the probable predictions and clustering as opposed to “true or false”. One of the potential applications of Fuzzy logic algorithms is the clustering of breast cancer data to enable oncologists detect and evaluate breast cancer risks such as malignant tumors.
Preview sample
Re-Engineering Computer and Electrical Engineering at Cleveland State University Information Technology Research Proposal
5 pages (1504 words) , Download 2 , Research Proposal
Free
Today the technology is accelerating at a very high note implicating that the machines used in operations are changing with time and the labor-intensive part of it is needed to have the expertise in operating it. This research aims at articulating and designing the computer and electrical engineering department to have the credential in offering the best and indefectible units.
Preview sample
Introduction to Cryptography Using CrypTool Information Technology Coursework
4 pages (1248 words) , Download 2 , Coursework
Free
Which tool or technique from the above list would be most effective for a cryptanalyst to decipher a text encrypted with the Caesar cipher, and why? The text used for the purpose of this lab is the first few paragraphs of Douglas Adam’s Hitchhiker’s Guide to the Galaxy, along with additional text stating this is where the sample text was pulled from.
Preview sample
The Primary Goal of the Military Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
From this paper, it is clear that the use of human features, biometrics comes in handy in the identification of individuals while keeping their privacy intact. These features may be physical or biological and may include characteristics such as skin color, height, eye color and weight. These features are unique to individuals and readily available.
Preview sample
Applications of FPGA Information Technology Case Study
10 pages (2600 words) , Download 4 , Case Study
Free
A digital system is a combination of various devices that are designed to manipulate the logical information or the physical quantities which have been represented in digital form. This signifies that the quantities can only take discrete values. The digital devices are mostly electronic. Though, they can also be mechanical, pneumatic, or even magnetic.
Preview sample
The Role of Stand Up Meetings in Agile Software Development Information Technology Essay
9 pages (2501 words) , Download 2 , Essay
Free
According to Kathleen (2007), agile Software Development Methods are highly iterative and incremental thereby providing a suitable platform for both stakeholders and developers to communicate and working together with a broader understanding of concepts and processes. This study investigated one of the most important elements of the Agile approach, daily stand-up meetings.
Preview sample
Cyber Attacks on America Information Technology Literature review
10 pages (2798 words) , Download 3 , Literature review
Free
The 11 September 2011 terrorist attack on the US exposed the vulnerability of the country to foreign attack in a way not witnessed in a long time. Since then, the public, media and even the federal government have been on alert to avert any future attacks by undertaking appropriate precautionary measures.
Preview sample
Wired Equivalent Privacy Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
Wired Equivalent Privacy. During the setting up of a wireless network for business or home establishments, most people overlook the configuration of prerequisite wireless security feature. For this reason, malicious users are allowed to access the established network and pose a risk of compromising the confidentiality of information in the network.
Preview sample
How to Build Your Own Computer Information Technology Essay
7 pages (1894 words) , Download 4 , Essay
Free
Custom built computers are essential in determining the usage of a person and to provide user satisfaction. Hardware components that are used to build a PC must be selected according to use. Hardware components like processor, motherboard, memory, and hard disk drive are the most significant parts of a PC.
Preview sample
Failed IT Project Information Technology Research Paper
5 pages (1250 words) , Download 5 , Research Paper
Free
Project implementation faces many hurdles. For the ultimate success of a project, implementation should be systematic. The decisions taken at various stages of the project may aid in the success of the project or lead to the failure of the project.
Preview sample
8951 - 9000 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us