StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
How YouTube Can Affect Media and Society Information Technology Essay
5 pages (1250 words) , Download 3 , Essay
Free
In the paper, the author quoted NBC Executive Vice President Rick Cotton when he said, “This medium is at the cutting edge. ‘The Office’ and ‘Saturday Night Live’ benefit from the significant attention we’ve gotten online”. In line with this statement, Cotton revealed that around 1,000 clips were removed from YouTube in 2006.
Preview sample
Disaster Recovery Plan: NetApp and Microsoft Information Technology Essay
4 pages (1235 words) , Download 4 , Essay
Free
The company's software and systems assets are based on commercial off-the-shelf software or COTS coming from Microsoft and NetApp, together with products that are tailored for the government. Storage for the company's data is via NetApp Storage, making use of SnapMirror as the technology to partly enable the process of disaster recovery. 
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Reflections on Learning Information Technology Essay
3 pages (750 words) , Download 3 , Essay
During the whole course and through the semesters, the experience of learning new things has been amazing. The amount of information that I have acquired through the whole period has equipped me with skills to perform a variety of tasks that I could not achieve before.
Preview sample
Enterprise Application Architecture Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Enterprise information systems architectures are a very important in software development because of the way it is shaping the way software are being developed. The professions that have developed this discipline are varied. This paper will evaluate the role that computer science, information systems and library science have contributed to the development of enterprise information systems architectures.
Preview sample
EISA: Knowing the Alternatives Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
The architecture mostly involves the better dissemination and management of data. Organizations that have adopted the EISA approach have experienced better performance and faster progression and growth in the market. This has improved their market status highly.
Preview sample
Benchmarking Micro-architecture Using Software Information Technology Research Paper
4 pages (1053 words) , Download 2 , Research Paper
Free
The Microprocessor without Interlocked Pipeline Stages (MIPS) is common in the programming of microsystems. These microsystems include microprocessors and microcontrollers, which are used to achieve certain tasks. The performance of these systems greatly depends on the design of the hardware and the firmware used as well. The development stages should be monitored carefully.  
Preview sample
Cloud Computing Security Information Technology Dissertation
6 pages (1851 words) , Download 8 , Dissertation
Free
Cloud computing is an attractive information technology (IT) trend that ensures the implementation of the utility computing model broadly using Virtualization technologies. Keeping in mind the numerous advantages of cloud computing, an increasing number of business organizations have begun offering and making use of cloud-enabled architectures and services to support their business operations.
Preview sample
How E-Commerce Has Changed the Way to Do Business Information Technology Research Paper
5 pages (1318 words) , Download 2 , Research Paper
Free
Mechanical failures arise in E-Commerce. These failures can lead to unpredictable effects on the total processes. Moreover, there is also a restricted opportunity for the customer to interact directly with the company offering goods and services (Reynolds, 2009). This originates from factors associated with the location. 
Preview sample
From The History Of PC Monitor Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Free
In the course, of a decade, IBM made substantial changes to monitors and in 1981; the company introduced the first color graphics adapter (CGA). This monitor had the capacity to display four colors and a maximum resolution of 320 pixels that entailed 120 pixels on the horizontal display and 200 pixels on the vertical display.
Preview sample
Data Communication: 4G Technologies Information Technology Essay
4 pages (1285 words) , Download 2 , Essay
Free
While Wimax extended the journey from the point where 3G standards capacity ended, L.T.E is considered as the torch bearer towards 4G and beyond. It is being dubbed the cover-up for Wimax; it addresses all those areas and weaknesses that can be found in Wimax. It provides higher data rates, increased mobility, and improved encryption techniques. 
Preview sample
EISA: Knowing What The Related Disciplines Bring to the Table Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Free
It is a structural design that provides a platform to integrate multiple disciplines and information systems for information interchange among scattered organizational units and business partners. However, the disciplines of information science, library science and computer science offer particular areas of interest to Enterprise Information Systems Architects.
Preview sample
Data Communications Bluetooth Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
Premium+
Historically, “The word "Bluetooth" is taken from the 10th century Danish King Harald Bluetooth.”
Preview sample
Knowing The Alternatives to Doing EISA Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Free
Today, Enterprises not only require operating around the globe but most of the communication and information interchange depends on the availability and viability of Information & Communication Technologies (ICT) infrastructure within organization. However, “Architecture is one of the most used (and abused) terms in the areas of software and systems engineering” (Axelord, 2012) and implementation of Enterprise Information Systems Architecture (EISA), either through Data Driven or Application Driven like CRMs, ERPs approach (TOGAF, 2011), remains an intensely debatable phenomenon, especially in terms of its cost and business value.
Preview sample
The Regulation of the Internet Information Technology Essay
14 pages (3500 words) , Download 2 , Essay
Free
With the widespread use and growth of the internet, its impact – both negative and positive – has also been inevitable. For which reason, various governments have considered the imposition of regulations and censorship on internet use and internet content.
Preview sample
Application Development and Technology Tools Information Technology Research Proposal
5 pages (1250 words) , Download 4 , Research Proposal
Free
The project requires cooperation from three key players; a refrigerator manufacturer, Wi-Fi Service provider and our team. The app will require windows 5 PDA (Palm OS) and Web platforms. The IDE includes Sencha touch/www.sencha.com/products/touch (HTML 5 based mobile app development framework) and JavaScript language.
Preview sample
Technological Innovation Approaches Information Technology Report
7 pages (1854 words) , Download 2 , Report
Free
Information systems, therefore, are economical and uneconomical. However, the economic benefits exceed the costs accrued to them. Though the cost, of managing, is relevantly higher, the benefits obtained from them are significant as the speed of operations in the organization increases. There is efficiency in terms of reduced cost in running the business as the number of workers reduces.
Preview sample
Wireless IP Using Foreign Agent Information Information Technology Assignment
2 pages (654 words) , Download 2 , Assignment
Free
A common SSID is used to configure both the WLAN, access point (AP), and all the clients on the wireless network when the wireless networking is in infrastructure mode. Wireless clients on the network are able to access resources on the wired network such as printers and internet connections. Many wireless clients can be supported in this mode of operation because more AP can be added to the WLAN.
Preview sample
Enterprise Resource Planning System Information Technology Case Study
9 pages (2628 words) , Download 2 , Case Study
Free
Apart from that some of the companies like Rolls Royce, they fully understood the risks that came with inadequate employee training. The soft drink bottlers, in a bid to cut down the costs, they had few IT personnel who could not manage their work. They did not end up adequately training the end-users who would be operating the system.
Preview sample
Charles Babbages Contribution to Development of Computer Technology Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
The study illustrates that the coming of age of modern computers was a process that began quite a while ago. The determination and persistence of the inventors was a major contribution to the computers since it is such traits that saw them proceed with their work even under circumstances of hopelessness.
Preview sample
Advancement in Technology in Different Sectors and Problems Associated With Advancement in Technology Information Technology Essay
6 pages (1844 words) , Download 5 , Essay
Free
Since the origin of life, people have been concerned about gadgets that help them improve their living standards. In fact, since the invention of the wheel, developments and inventions are still continued. However, the wheel became a little rounder with each development, and the inventors made use of different materials for different developments.
Preview sample
Change Management and the Use of Appropriate Tools and Techniques Information Technology Coursework
3 pages (917 words) , Download 2 , Coursework
Free
A common saying is often used about change and it states that the only constant in this world is changing (Brown & Don, 2006). Without change, life and all its activities would come to a stagnant point. Change is a natural phenomenon and applies to all worldly bodies and affairs. Hence change is subjective. The Phenomena of change are equally applicable to the field of enterprises and management organizations.
Preview sample
Physical Architecture Layer Design Information Technology Coursework
3 pages (750 words) , Download 2 , Coursework
The paper explores on the different components of physical architecture design, network models, various architecture designs and the factors that affect the design of the physical layer architecture. Introduction The physical layer architecture design is used to specify how the system is distributed across the computers constituting the network of an organization.
Preview sample
Data Management Layer Design Information Technology Coursework
3 pages (750 words) , Download 6 , Coursework
Free
Files Below are types of files Sequential and random access files These are the file access modes that are supported by many programming languages such as istream and ostream. Sequential access files These is the type of access mode that if efficient where data is stored according to given attributes which are then used in retrieving the files.
Preview sample
Cursework on Behavioral Modeling Information Technology Coursework
2 pages (500 words) , Download 2 , Coursework
Free
Behavioral state machine diagram is a model that reflects and show this dynamic state of any single class as it pass through its course of life and is influenced by certain events. The response to these events and actions taken by that class is also highlighted in the behavioral state machine diagram.
Preview sample
Functional and Structural Modeling Information Technology Coursework
3 pages (750 words) , Download 2 , Coursework
Functional and structural modeling is an important stage of system analysis and design. This paper gives an overview of functional and structural modeling as part of the design process of a system. It presents various concepts of system design like the design elements and processes.
Preview sample
Post Project Implementation Audit; Office Move Scenario Information Technology Coursework
3 pages (750 words) , Download 3 , Coursework
Change management: The relocation did not consider increased employee numbers over time. The new space should have provided for additional employee numbers.  
Preview sample
Operational and Implementation Problems Information Technology Coursework
8 pages (2000 words) , Download 3 , Coursework
Free
According to the paper modern business concepts necessitate the use of information systems to improve work efficiency and improve performance assessment process. Children healthcare services are not exempt to these challenges and issues. This paper discusses problems in referral and assessment services in children’s healthcare facilities and makes recommendations for smoother running of the systems.
Preview sample
The Role of Lightweight Directory Access Protocol Information Technology Speech or Presentation
7 pages (1641 words) , Download 2 , Speech or Presentation
Free
Microsoft Active Directory operates in a client/server centralized environment, where administration and configuration are managed from a single point. The secure Lightweight Directory Access Protocol ensures data encryption by Kerberos and other popular encryption algorithms. The Light Weight Directory Access Protocol is a communication standard.
Preview sample
Forensic Technology Information Technology Essay
7 pages (2120 words) , Download 4 , Essay
Free
Forensic technology assists in investigating domestic crime, fraud, cybercrime, murder, war crimes, crimes against humanity, recovery of mass disaster victims, and repatriation of war dead (Hunter & Cox, 2005). Forensic technology helps to discover and solve the events about a specific crime scene or disposal site. Generally, each crime scene brings its own unique set of questions requiring answers to unveil the truth as the circumstances of each investigation differ considerably. 
Preview sample
Information Technology: Helpdesk Concepts Information Technology Essay
4 pages (1093 words) , Download 3 , Essay
Free
Interaction with the help desk can determine whether the customer will leave satisfied or they will be frustrated. The sequence of prompts and the amount of wait time allocated between prompts is also big factor in the user experience. Most users will easily discontinue a service if they have a bad experience with the help desk.
Preview sample
Enterprise Target Status Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Thus each user will have an account to access the network with. Furthermore, Antivirus and personal firewall software should also be installed on each PC. Each of the three networks is also protected by installation of Firewall which controls the access to and from the external network.
Preview sample
The Importance of Studying Information Systems for a Marketing Student Information Technology Research Paper
5 pages (1250 words) , Download 3 , Research Paper
Free
Most often than not, students and professionals do not understand or underestimate the importance of Information Systems as far as business functions are concerned. Students question the reason as to why they need to study Information systems and yet they are not Computer Science or IT majors.
Preview sample
The Adobe Dreamweaver Software Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
Over the years, Prive has developed good relations with and repute among the customers as well as with the owners of premium accommodations so as to make exclusive deals with them. Now, that Prive has earned a name for offering 5-star holiday packages all across the UK, Prive wants to expand the business to reach a point where customers can access the information.
Preview sample
Link Layer Protocol Services to the Network Layer Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
The data link layer (layer 2) majorly deals with the transformation of the logical communication channel provided by the physical layer (layer 1) into a more reliable mode of communication by splitting the data into frames allowing error and flow control.
Preview sample
Information Technology Revolution Impact on the Third World Countries Information Technology Research Paper
5 pages (1250 words) , Download 3 , Research Paper
Free
According to the report people can state that the information technology revolution brings “up to the minute” knowledge. It makes individuals reason as “one”. This “one” relates closely to Averroes' idea of "Virtual Mind". Virtual with regards to the Internet falls under the term digital. Though present, it fails to be located in some places.
Preview sample
Molestation of Children Information Technology Essay
3 pages (912 words) , Download 5 , Essay
Free
The author examines moral and ethical problems that arise when someone shares other people’s personal information or intellectual property, without their authorization. On a personal level, he believes every individual must have the freedom to live their life the way they want within the broadly accepted legal and social parameters.
Preview sample
What is on the Horizon for Apple Information Technology Research Paper
5 pages (1250 words) , Download 2 , Research Paper
Free
What is on the Horizon for Apple? Apple has been at the forefront and is leading the post PC revolution. The late Apple CEO Steve Jobs pulled the company from near bankruptcy to the most valuable public company (Dilger, 2011). The company revolutionized the music industry with the introduction of iPod in 2001 and introduced digital media distribution with mp3 compressed audio files available in iTunes.
Preview sample
Human Performance Modeling Information Technology Essay
5 pages (1249 words) , Download 2 , Essay
Free
In CogTool, tasks demonstrated on the storyboard are producing valid cognitive models after pressing a button. A prediction is made based on the duration taken by a skilled user to complete the task.  The challenges faced by the software are its speed and accuracy. Several models created vary depending on the modelers involved in making human performance models.
Preview sample
Spyware and Adware Information Technology Essay
4 pages (1122 words) , Download 3 , Essay
Free
Spyware is malicious software that gets installed on a computer without the prior knowledge of the owner. This software gets access to all the personal information about the user without his knowledge. The presence of spyware on the computer cannot be detected by the user and is installed on the computer secretly.
Preview sample
Cyber Threat Analysis Information Technology Term Paper
6 pages (1833 words) , Download 3 , Term Paper
Free
Cyber crimes have had very serious implications on the economic and data security of various organizations and world in general. In attempts to reduce cyber mayhem, the following paper will discuss the concepts of cyber threat analysis and technologies involved in accomplishing the task.
Preview sample
Computer Information Security Certification Information Technology Research Paper
8 pages (2324 words) , Download 3 , Research Paper
Free
It will discuss the requirements for one to be certified and areas that one can receive certification. In addition the paper will evaluate the employment opportunities available after receiving certifications. Introduction Computers systems and networks face many security threats such as unauthorized access and intrusion.
Preview sample
Drupal Open Source Information Technology Research Paper
9 pages (2250 words) , Download 2 , Research Paper
Free
Some of the areas with identifiable opportunities for improvements that Drupal has are: Obscure terminologies; Lack of an easy visually way to insert on the page; Lack of realistic previews which makes building a site in Drupal very challenging; Limited functionality; Inability of users to make connection between module’s version number and modules listed on Drupal.org.
Preview sample
The Links on the Internet Information Technology Essay
2 pages (715 words) , Download 2 , Essay
Free
Transmission Control Protocol that is considered as a transport layer protocol of the TCP/IP model ensures virtual connections and stream delivery for applications via sequenced acknowledgments on required packets in data transmission (Transmission Control Protocol. 2007). 
Preview sample
Communicating in an IT Environment Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
Learning the information sources may help us to distinguish between useful and irrelevant sources of information. A Literature Review may leverage the final selection of sources to be employed for future research or to fill the gaps found in the knowledge domain under consideration.
Preview sample
Is Internet Addiction Real Information Technology Essay
3 pages (750 words) , Download 2 , Essay
The social networks the entertainment sites all made possible through the internet connection. Baur states that in the United States, people use up an average of 6 hours 9 minutes on social networks Countries like China America Japan Germany United Kingdom is among the highest users of the internet.
Preview sample
Abstract Data Structures Information Technology Essay
4 pages (1000 words) , Download 3 , Essay
Free
ABSTRACT DATA STRUCTURES Introduction A data type is acknowledged as an abstract data type when it is expressed in terms of processes on it, and its implementation is concealed (with the intention that it can be replaced with another application such as effectiveness purposes, as well as this will not change anything in the existing computer program).
Preview sample
Energy Efficient Middleware for Networking Protocols Information Technology Essay
4 pages (1573 words) , Download 3 , Essay
Free
The study has ascertained the relevance of power consumption concerning enhanced technology that calls for more energy consumption. Charlet et al. support this argument with the context that wireless technologies development has posed a challenge with respect toconcerningoyment of the applications over several heterogeneous radio networks. 
Preview sample
Improving Perioperative Care through IT Information Technology Research Paper
6 pages (1619 words) , Download 2 , Research Paper
Free
The challenges involved with preoperative care are difficult since technological approaches have not been sufficient despite the fact they are promising. In order to achieve the promises of new informatics and technology, it is important that changes have to be made in how technology is designed and maintained within the perioperative setting. 
Preview sample
Effects of Quantitative Easing on Food Prices Information Technology Research Paper
4 pages (1033 words) , Download 2 , Research Paper
Free
Generally, the government employs quantitative easing through the central bank where it buys more securities to solve economic crises. In most cases, the central bank tends to employ this form of policy in a situation where the interest rates do not show any probability of making the expected results.
Preview sample
Employee Monitoring Paper Information Technology Research Paper
3 pages (750 words) , Download 5 , Research Paper
Free
Employee monitoring could be defined as the practice of observing employee’s activities with their working equipment during the intended work hours in a work environment. Many employees would argue that it could be an infringement of their privacy by the employer if at all any employee monitoring tools were used.
Preview sample
9051 - 9100 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us