StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Profits and Growth in Dell Computer Corporation Information Technology Report
8 pages (2115 words) , Download 3 , Report
Free
Because of the development of information technology, the world has been reduced to a village. Most importantly, computing technology has become an essential factor that offers many opportunities that can lead to technological advancement. Technology has ensured that various manufacturers get low-cost advantage goods with better quality.
Preview sample
Router and IP Addresses Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
Routers have at least two IP addresses since it has the function of deciding where to next send the packet. There exists another IP address for management purposes usually the router’s own address for convenient access to the router by the user. Routers are generally used for switching and directing packet in a network, for this reason it has to have at least one incoming interface and one outgoing interface each of which have different IP addresses.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Exempt Application for User Satisfaction and Its Implications to CPOE Implementation Information Technology Admission/Application Essay
4 pages (1000 words) , Download 2 , Admission/Application Essay
Approval Process Date Reviewed Review(er) Determination Signature Code Comments Faculty Advisor (student projects) ?????  Forwarded to next review  Returned to student ????? ????? School Proxy (student projects) ?????  Approved exempt study  Recommend student submit as expedited study  Recommend student submit for full board review ?
Preview sample
Death March Project Information Technology Essay
3 pages (750 words) , Download 2 , Essay
50 %. Without doubt, a project without an appropriate timetable, loyal and qualified team members, suitable budget, or functionality limitations could face several issues and risks of breakdown, for example, because of argumentative politics between the information technology department and workers.
Preview sample
The Technology behind MMOG or MMORPG Information Technology Lab Report
28 pages (7127 words) , Download 4 , Lab Report
When gaming began, games were single-units played by one person at a time. However, the rapid developments on the IT scene have scene gaming take a new stage with introduction of multiplayer platforms. In fact, there are now huge online role-player games with the capacity to supports millions of player from all over the world.
Preview sample
SAP HR Module Information Technology Research Paper
4 pages (1163 words) , Download 2 , Research Paper
Free
The SAP ERP Human Capital Management system is a comprehensive and integrated human resource management structure that offers the most excellent features and services. Basically, the SAP ERP Human Capital Management system provides all kinds of businesses and corporations with a wide variety of tools required to manage their most important asset ‘people’.
Preview sample
Challenges in Hiring Talent Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Every corporation or enterprise wishes that it had access to a highly skilled pool of human resources that can provide a template for current and future successes. Companies are realizing that talented workers and human resource personnel are very hard to come by.
Preview sample
Aligning Information Systems and Business Strategy Information Technology Research Paper
8 pages (2304 words) , Download 3 , Research Paper
Free
This paper provides a comprehensive analysis of the efforts by a large corporation in seeking to achieve and maintain a business and Information technology alignment. The paper analyzes the strategic IT and Business planning process as the vehicle for achieving the alignment, as well as analysis of the relationship between communications, strategic information technology planning, shared visions, and organization structure (Wyatt-Haines, 2007:275).
Preview sample
Technical Proposal for an Architectual Small ompany Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
Various aspects such as an office plan, a detailed report of the IT-based technological requirements, specifications of the hardware as well as software equipments along with their prices, and evidence of suppliers and a proper justification for the proposal will also be taken into concern in this discussion.
Preview sample
Evolution of Internet: TRENDNet, D-Link and Linksys Information Technology Essay
4 pages (1102 words) , Download 2 , Essay
Free
A dial-up modem with an Internet speed of about 28 kbps was extremely high in the early 1980s. Currently, there are various applications with faster speeds and greater bandwidth for the internet. There is video streaming, social networking, and downloading of immense files, as examples of what people can do over the internet.
Preview sample
Outsourcing in Electronics Manufacturing: Does It Work Information Technology Research Paper
5 pages (1611 words) , Download 2 , Research Paper
Free
In fact, the majority of organizations at the present contract or outsource their business services, for instance, call center services, electronic mail services, and payroll. The outsourcing manufacturing expansion is a great deal of a return to essential competencies as it is an attempt to reduce operating expenditures. 
Preview sample
A Detailed Analysis of the OpenOffice Information Technology Research Paper
5 pages (1250 words) , Download 4 , Research Paper
Free
Open source refers to a software application or program in which the source code is made available to the wide-ranging public use that can be reused or modified from its genuine design free of charge. In this scenario, the source code is an actual code of a program written in a programming language. 
Preview sample
Manage IT Security for the London Olympic 2012 Games Information Technology Case Study
6 pages (1955 words) , Download 3 , Case Study
Free
LOCOG may not manage to respond to all types of cybercrimes that could be perpetrated against the Olympics visitors. However, it has to work to stop people posing as itself and in effect, help to minimize ID theft among visitors and other people. To accomplish this, Technolight will install signature-based anti-spam filters in the LOCOG IT system.
Preview sample
Importance of Information Security Information Technology Essay
4 pages (1109 words) , Download 2 , Essay
Free
The internet is a global collection of networks accessible by various computer hosts in varied ways. Therefore, organizations and individuals alike could easily access any point of the internet irrespective of geographic or national boundaries or time. Nonetheless, with this convenience comes a myriad of risks including the risk of having valuable information misused, changed, stolen, or lost.
Preview sample
Expert Imaging and Sound Association: Evaluating the Tool Set Information Technology Essay
4 pages (1202 words) , Download 2 , Essay
Free
Enterprise information systems architecture refers to the processes involved in translating business missions, and strategies, to establish effective enterprise shifts. This is done by formulating, communicating, and enhancing the essential prerequisites, principle, and module that depict the enterprise’s potential state to facilitate its evolution
Preview sample
Priory Dental Surgery Appointment Booking System Information Technology Coursework
4 pages (1144 words) , Download 2 , Coursework
Free
The first step was to identify the actors. An actor is a person, device, or job role that interacts with the PDS. From the description below actors were identified who interacted with the system. They do carry out a given action about the procedure. The actors, in this case, were the Dentists, Patients, Receptionists, and Managers.
Preview sample
A Technical Proposal for Equipment and Software Information Technology Report
8 pages (2124 words) , Download 2 , Report
Free
With daily worldwide changing of the global technology the requirements analysis, definition and management become crucial, prior to acquisition. Hardware and software specification, as well as the effective implementation in the architectural field, has a tremendous impact on the eventual results in this field.
Preview sample
Dissemination of Health Data among Hospitals Information Technology Research Paper
4 pages (1055 words) , Download 3 , Research Paper
Free
The objective of the agency for healthcare research and quality is to obtain information that is evidence-based. This information must be of high quality at a reasonable cost while at the same time being readily available to the users. Based on the EISA requirement, there are four major issues that need to be addressed.
Preview sample
Address Potential Identity Theft Issues Information Technology Article
5 pages (1493 words) , Download 2 , Article
Free
The task Force categorized data security into two; the public and private sectors. This category was based on the purposes of the sectors when collecting information. The public sector uses personal information to look for viable programs and help deliver services efficiently. The private sector uses personal data for commercial purposes.
Preview sample
Evaluating and Meeting Security Needs Information Technology Research Paper
4 pages (1061 words) , Download 2 , Research Paper
Free
In information systems, data is an important aspect. The creation, manipulation, and control of data are crucial to the success of any organization. Owing to the highly valued data/ information that a system might be having; sensitivity to its access should be very high (Dhilon, 2006). If the system has information that might be of high value, which is always the case, some intruders might try to access it illegally.
Preview sample
The Computer Rootkits Information Technology Report
8 pages (2274 words) , Download 2 , Report
Free
However, invention and implementation of technology has resulted to spread of viruses and worms. Rootkits is a form of malware which pose threat to computer management and networks (Bidgoli 19). This paper precisely discusses in detail “the state of a current computer rootkits, how it spreads, its impacts, how people are fighting it, and how technology pertaining to networks works.” 
Preview sample
Mobile Technology in Organizations Information Technology Essay
6 pages (1609 words) , Download 3 , Essay
Free
Changes that arise in an individual’s life may either be socially, economically or politically allied. Change may either have an optimistic or pessimistic impact on an individual’s life. Technology change has diversely altered the way people converse and relay the message. Different ways have come up where an individual can have a discussion with another who is miles away (Huang, et al., 91).
Preview sample
Email Intelligence Analysis Information Technology Literature review
6 pages (1760 words) , Download 2 , Literature review
Free
Various email users do not follow the codes of conduct governing them as users something that leads to the hacking of other person passwords to be used as a get through to the email accounts and perform dirty acts like sabotage and many others due to the differences they have with each other (Granot & Sosic 2005).
Preview sample
Computer-Supported Cooperative Work Information Technology Term Paper
7 pages (1750 words) , Download 2 , Term Paper
Free
Information communication technology has gone a long way in enabling businesses to achieve effective communication in keeping their employees, clients, and other stakeholders well informed for higher productivity. Through effective communication, organizations and businesses are able to motivate and satisfy employees in their roles and functions.
Preview sample
Robotics: Types of Robots and Benefits Information Technology Literature review
6 pages (1975 words) , Download 4 , Literature review
Free
In the 80’s, when most people heard the word “robot”, an image of R2D2, the mechanical sidekick in the Steven Spielberg movie Star Wars, often came to mind. The character moved and sounded like a human being but was made of aluminum. Because of the advancement in technology, the word now triggers not only one but a variety of robots which have become so much a part of society they have even taken over some tasks only individuals traditionally do.
Preview sample
Open Source Software Information Technology Essay
4 pages (1136 words) , Download 3 , Essay
Free
The surge in technological advancements in software development has seen a need for better software solutions and utilities on which the end users can launch their program needs, it is against this background that Open Source Software (OSS) has developed too far more reaching heights and familiarity among software users.
Preview sample
Evaluation of New and Emerging Technologies Information Technology Essay
1 pages (504 words) , Download 3 , Essay
Free
To attain the target, the project will utilize the latest technology such as cloud computing where all the operations are done in the business, and data storage is based on the internet. The key tool that is used to achieve this is by use of iPads from the leading technologist Apple. The mission state to define the future of mobile media and computing devices with iPad.
Preview sample
Database Security for Electronics Ltd Information Technology Case Study
8 pages (2166 words) , Download 2 , Case Study
Free
Securities to some files in the organization should be considered. Authentications and authorization of users should be allowed, in that, only the authorized and authenticated members should be allowed the access of the files in the organization. SQL injection attacks alternatively should be highly avoided.
Preview sample
Computer Sciences - Assignment Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
Free
These layers all have different functions that help with the movement of packets. These layers are under the Open System Interconnection (OSI) model, and they are broken down into the following layers; physical, data link, network, transport, session, presentation and application.
Preview sample
Transformation of a Korean Kwangju Bank Information Technology Case Study
4 pages (1068 words) , Download 3 , Case Study
Free
The Bank had problems with its computer systems that made it fail to operate appropriately in the market. The system was too rigid and could not work effectively to respond to the changes that were taking place in the market. The bank’s information system could not allow the bank to set its own strategies since it could not support them.
Preview sample
Computer Sciences and Information Technology Information Technology Essay
5 pages (1250 words) , Download 3 , Essay
Free
As the report, Computer Sciences and Information Technology, stresses TCP is a basic transmission protocol, and forms a standard against which new non-TCP connections are gauged for network resource use efficiency. Various suppliers of multimedia products have preferences over the types of protocols they transmit they streaming products. 
Preview sample
Pervasive Computiong Information Technology Research Paper
5 pages (1250 words) , Download 2 , Research Paper
Free
According to the report latest mobile phones and PDAs are some of the well known examples of pervasive computing. The basic objective of pervasive computing is to combine all the features and services in a single application. So it can help the people to use it conveniently. Pervasive computing is the rising trend, which is aimed at offering visibility for the users.
Preview sample
Management of IT Systems and Projects Information Technology Essay
3 pages (750 words) , Download 2 , Essay
The persistence and intensity with which Information Technology has engulfed and taken over all the norms of the human race has much to say about its importance and its future existence. Inspired from latest emerging applications of the advancements in information technology have led to the pursuance of the said field for research and development even more.
Preview sample
Linux MUOS, Principle Features of a Multi-User Operating System Information Technology Essay
6 pages (1968 words) , Download 2 , Essay
Free
An operating system (OS) is a set of basic programming instructions to computer hardware, forming a layer of instructions on which other applications and functions of the computer are built. The programming code that is the core of the operating system is called the kernel. Code is a general term that refers to instructions written in a computer programming language.
Preview sample
The Client-Server-Based Architecture in the Organisation Information Technology Research Paper
4 pages (1235 words) , Download 2 , Research Paper
Free
Most companies opt to use the client-server based architecture in their organization. The web-based architecture, however, is still new, and most organizations are choosing to invest in this architecture. The scope of this paper is to investigate the advantages and disadvantages of using either of the systems and recommend the better option.
Preview sample
Group Meeting Minutes - Fitness Centre Information Technology Case Study
7 pages (1996 words) , Download 3 , Case Study
Free
The group divided the work to each member or as a team of two or more group members depending on the task to be carried out. UML was used to describe the current system of how it operates. Use cases were in this study used to demonstrate this below are the minutes of the group that took place while looking at this case study.
Preview sample
Data Warehouse, Data Mart and Business Intelligence Information Technology Essay
4 pages (1000 words) , Download 4 , Essay
Free
Many organizations are increasingly adopting data warehousing to enhance reporting and decision making. A data warehouse facilitates the integration of data from various sources, data sharing, and provides consistent, organized, relevant and timely information for decision-making.
Preview sample
Memory Management Information Technology Essay
6 pages (1691 words) , Download 4 , Essay
Free
Swapping generally means interchanging the contents of two different spaces using a third temporary empty content space. Swapping is used as a memory management technique for a multiprogramming environment. For a program to execute it is mandatory to acquire physical memory or main/primary memory.
Preview sample
The Convergence of Terrorism and Cyberspace Information Technology Case Study
4 pages (1320 words) , Download 3 , Case Study
Free
The emergence and widespread use of the Internet globally have made this medium vulnerable to various threats and acts of violations of both personal and organizational privacy and security. Termed cyber terrorism, the definition of which was revealed to have spurred difficulties in taxonomies, its meaning is hereby quoted by Gordon.
Preview sample
Analyzing WordPress Security Information Technology Case Study
7 pages (2140 words) , Download 3 , Case Study
Free
This report has discussed the ways hackers can hack WordPress blogs. This report has also discussed the basic intentions of hackers. Of course, WordPress is the most popular blogging platform that’s why it attracts many hackers and security attackers as well. They carry out negative tasks to harm or to get access to personal information of the people.
Preview sample
Client/Server Networking Technologies Information Technology Term Paper
3 pages (750 words) , Download 3 , Term Paper
The issues of interoperability, flexibility, scalability and usability were greatly improved with this new technology. Usability is the extent in which computer system architecture can be used to achieve many desired goals. Flexibility is the ease in which the architecture in existence can be changed to suit the current situation.
Preview sample
Healthcare Computer Network Architecture Information Technology Coursework
3 pages (750 words) , Download 2 , Coursework
Free
Likewise, this address demonstrates the address of a specific device on the network. For example, a computer that is configured on the network will possess an IP address: 192.168.1.2. However, for establishing connectivity, subnet mask, gateway and other relevant protocols contribute for successful data transmission.
Preview sample
Network Security: Opening to the World Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
Web conferencing involves the conducting of meetings and presentations live through the internet. They are able to see each other, talk to each other and transfer documents to each other while online. There are three types of web conferencing: Webinar: This is a type of web conferencing that allows for the conducting of seminars online.
Preview sample
Why Do We Distinguish Between Network Administration and System Administration Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Free
Why Do We Distinguish Between Network Administration And Systems Administration? System Administration and Network Administration have been mistaken to mean the same thing. Their practices draw a very thin line that makes it easy to confuse one for the other.
Preview sample
The Wireless Networks and Installations in Municipals Information Technology Essay
3 pages (750 words) , Download 2 , Essay
The Wireless Networks and Installations in Municipals. It is necessary for municipals to continue in pursing Wi-Fi connection. There are two key forces that are motivating the recent wave of Wi-Fi network installations in municipals. According to Fotheringham and Sharma (2008), Wi-Fi networks are comparatively cheap to install and operate, and they take advantage of existing city infrastructure and assets, for example, urban furniture and street lights, which make perfect antenna site.
Preview sample
Aviation Security Prerequisites Information Technology Essay
12 pages (3167 words) , Download 4 , Essay
Free
An enormous number of resources were utilized for mobilizing them in a very short period. These mobilized resources were aligned to counter apparent cyber threats from terrorist attacks. Likewise, in the entire hoax, there was a requirement of evaluating homeland security that also pertains to Information technology infrastructure.
Preview sample
The History of the Computer Information Technology Term Paper
5 pages (1487 words) , Download 2 , Term Paper
Free
PCs had the ability to operate at Gigabit due to numerous processors that were integrated (Onifade 14).  Different companies presented numerous programming languages and operating systems leading to major turnarounds, in computing. Microcontroller technology got prefaced leading to control of certain activities in an efficient manner. 
Preview sample
Human-Computer Interface Design Guidelines Information Technology Case Study
7 pages (2190 words) , Download 2 , Case Study
Free
The authors of the above techniques have advocated for them but there is little knowledge about in terms of how well they work by comparing each other. In which case is one better than the other and what types of problems does one technique perform better than the other. From the above-suggested interface for evaluation, I strongly recommend that a study be carried out to uncover these issues.
Preview sample
Open Source Software Information Technology Research Paper
4 pages (610 words) , Download 3 , Research Paper
Free
Open source software is defined as “software for which the human-readable source code is available for use, study, reuse, modification, enhancement, and redistribution by the users of that software”. Many organizations around the globe have adopted open source software after realizing optimal cost savings associated with information technology expenditures.
Preview sample
Business Continuity Planning Information Technology Research Paper
4 pages (1381 words) , Download 3 , Research Paper
Free
Jones (2011) argues that business continuity planning plays an essential role in reducing the consequences of significant disruption that an organization can face. This argument situates the importance of critical business continuity planning in helping organizations reduce or recover from critical disruptions that can affect their business operations.
Preview sample
9101 - 9150 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us