StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Downside of Computer and Video Monitoring in the Workplace Information Technology Research Paper
5 pages (1458 words) , Download 2 , Research Paper
Free
The least security is given to company properties that are used by several workers like e-mail, documents, and an office (Peters, 1999). Since e-mail is one of the least secured of employee privacy rights and there are many monitoring systems available to companies and employers, a worker’s greatest workplace issue should be improper e-mail.
Preview sample
Routing Protocols Of Cisco Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
A routing protocol is defined as a procedure, which stipulates the mode of communication between two or more routers within a computer network. In addition, routing protocols provide rules through which routers in a network environment choose the paths to be followed between nodes through application of various routing algorithms.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Forensic Software Testing Support Tools (FS- TST) Information Technology Research Proposal
10 pages (2733 words) , Download 2 , Research Proposal
Free
Summary of the types of quality tests that should be conducted.………....4 V. Summary of the areas of the application to be tasted………………………5 VI. Summary of the artifacts required for the testing process………………….6 a. Test case………………………………………………….…………6 b.
Preview sample
Security Technologies for Online Payments Information Technology Literature review
5 pages (1413 words) , Download 2 , Literature review
Free
Maintaining the user’s public key enables the merchants to identify the existence of the customer such that the man in the middle attacks can be avoided during the transactions. PKI, encryption, and digital signatures are other technologies to ensure the provision of a secure platform for merchants and clients.
Preview sample
Hierarchical Database Models Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
The child segments can have only one parent to maintain the restriction of one-many relationship. The hierarchy is established on the basis of natural record or data relationship. For example an employee usually has its personal data i.e. age, date of birth and joining date etc.
Preview sample
Telecommunications companies' risks Information Technology Essay
3 pages (750 words) , Download 2 , Essay
White Paper (Risks). With increased digitization, telecommunications companies are becoming global and do business across borders. There customer is demanding integrated solutions for data communications, voice and multimedia. Competition is intense, and hence the need to minimize risks and bring down costs.
Preview sample
IT Architectural Considerations Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
The technicality involved in this technology is the wide area networking of all sales and products offices of the company to ensure that one single officer in charge of sales and product has an oversight monitoring of sales input in the company. The second component of the technology requires that the company develops its own social network that will focus on expansion of customer base through customer involvement.
Preview sample
Overview and Objectives of the Network Technology Information Technology Term Paper
5 pages (1250 words) , Download 4 , Term Paper
Free
There are many internet applications available to organizations that can help build reliable networks. However, there is need for careful analysis of the benefits and the costs of adopting such systems into medical facilities, that include logging in of patient details, keeping track of the treatment process and recording of prescriptions.
Preview sample
Help Desk/Technical Support Software Tools Information Technology Research Paper
6 pages (1500 words) , Download 3 , Research Paper
Free
At the present, help desks have become a very important part of high-quality business service. This paper will outline different help desk or technical support software. The basic aim of this research is to discuss the different aspects of these applications and comparing their working and efficiency.
Preview sample
Networking in Telecommunication Field Information Technology Term Paper
5 pages (1457 words) , Download 2 , Term Paper
Free
In the packet switching, the data is broken down into pieces which are then wrapped into structures known as packets. Every packet has the data, the information of the address of the source as well as the destination nodes, sequence numbers in addition to other control information. A packet is also called a segment or datagram. 
Preview sample
Differences and Similarities between Existing Security Standards Information Technology Essay
4 pages (1295 words) , Download 3 , Essay
Free
Information security is essential for saving the data and assets of a business. Thus, businesses require being completely responsive for devoting additional resources to save data and information assets, as well as information security has to be a top concern for both governments and businesses (Government of the HKSAR, 2008).
Preview sample
How Should Organizational Information Systems Be Audited for Security Information Technology Essay
4 pages (1344 words) , Download 2 , Essay
Free
COBIT is an information technology governance structure and toolset that facilitates managers to bridge the gap between control needs, technical issues, and company risks. In addition, COBIT allows organizations to build and implement an apparent policy and high-quality practice for IT control all through business.
Preview sample
System Architecture & Design Information Technology Research Paper
7 pages (1750 words) , Download 3 , Research Paper
Free
The traditional design and techniques used by the hard drives has a negative impact on their performance. The techniques cause a slow performance of the drives. For instance the drives operate at a very low speed and also power. Thus, this becomes hard in retrieving vital information from the drives.
Preview sample
Investigation in Cybercrime (Banking Sector) Information Technology Literature review
8 pages (2125 words) , Download 3 , Literature review
Free
Although cyber crimes pose threat to every individual, however the banking sector is at great threat from these crimes. The banks serve as ideal spot where deposits and assets of many people are collected, these are the soft targets because the criminals do not have to go on the spot and steal the valuables, rather simple use of internet and data base tracking system can help them get to their objectives.
Preview sample
Information Levels among Organizations Information Technology Research Proposal
5 pages (1394 words) , Download 2 , Research Proposal
Free
As a result, sustaining competition, addressing consumer needs, and remaining relevant in the dynamic market and business environment requires strategic information technology procedures and strategies. Technology in its basic terms has evolved to be the avenue and platform upon which modern businesses possess the ability to succeed or fail (Anonymous, 2006).
Preview sample
The USA Patriot Act Information Technology Thesis
6 pages (1709 words) , Download 4 , Thesis
Free
This Act enhances law enforcement by providing a number of investigatory tools. It aims to punish the perpetrators of terrorism at home and the world. This Act fortifies measures to prevent, detect, and prosecute the perpetrators of international money laundering and financing to terrorist activities (USA PATRIOT Act).
Preview sample
Network Security setup Information Technology Research Paper
7 pages (1985 words) , Download 2 , Research Paper
Free
The necessary security measure here is installation of updated anti-spyware and antivirus. Other useful installation at this point includes a software patch management that ensures minimal vulnerability and hence maintaining data integrity.
Preview sample
Enterprise Information Security Information Technology Essay
7 pages (2075 words) , Download 2 , Essay
Free
One should also be able to know the challenges that are very crucial and potential to the engineering section of the system. This probably improves the nature of security controls. Engineering is one sensitive requirement because it’s what determines the overall functioning of the whole system of authentication and login process.
Preview sample
Overview and Applications of Flexography Information Technology Essay
5 pages (1304 words) , Download 2 , Essay
Free
It is a thing of the past when printing was done by means of blocks and stencils. Technological advancement has brought about advanced printing processes and flexography is one of them. The reason behind the wide acceptance and adoption of this technology is that it caters to a massive market of printing packaging materials.
Preview sample
The Past, Present and Future of RFID Information Technology Research Paper
7 pages (1996 words) , Download 2 , Research Paper
Free
Everything about our lives happens at a faster pace than ever before and there are no signs of things slowing down. That is why we now need a more accurate yet faster way of doing transactions that would normally take hours to do. We need a piece of technology that will allow us to carry vital information with us wherever we go.
Preview sample
Clinical System Design Requirement Information Technology Essay
4 pages (1060 words) , Download 3 , Essay
Free
Clinical providers- Clinical providers include Doctors, nurses and pharmacists. The doctors will be involved in providing prescriptions to patients after diagnosis. The prescription will also be billed by the doctor. The pharmacist dispenses the medication which makes him part of the system. The nurse can be involved in providing check-up services to the patients.
Preview sample
Exploring Information Leakage in Third-Party Compute Clouds Information Technology Essay
3 pages (750 words) , Download 2 , Essay
When the providers allow virtualization by multiplexing many customers’ Virtual Machines (VM) across the same physical infrastructure, it leads to security related vulnerabilities for the customers. The vulnerabilities could arise because it is possible to map the internal cloud infrastructure, then instantiate new VMs, so one could be placed as a co-resident with the target, and then finally such placement could be used to initiate cross-VM side-channel attacks to steal or extract information from a target VM on the same physical machine or infrastructure.
Preview sample
Defining the Subliminal Reality: Virtualization Information Technology Report
7 pages (1913 words) , Download 2 , Report
Free
The problem that majority of companies faced with the traditional IT infrastructure consists of several problems. One of the critical problems is the fact that it takes high energy costs. In addition, the traditional mainframe networks take too much space. Furthermore, the heat that is generated through these servers must be cooled.
Preview sample
Outsourcing and Risks.Outsourced Software Products Information Technology Essay
5 pages (1250 words) , Download 3 , Essay
Free
Outsourcing and Risks Whether small or large, software development companies have started to embrace the practice of outsourcing the production of software in any phase of its lifecycle. Outsourcing is a process of one company seeking the services of another for carrying out its processes.
Preview sample
Software Risk and Risk management Failure Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Common risks. Every project; be it an industrial, architectural, organizational, technological etc. pose risks of various nature. These risks can be categorized of various types or ranked onto various levels depending upon the type of threat damage or loss they can cause if not mitigated or eliminated at the right time.
Preview sample
Ethics In Information Technology Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Today, computers have been applied in varied disciplines including medicine in the field of embryonic stem cell research. Stem cell research has been the most remarkable latest advances in medical research. There have been a great debate relating to the ethical perspective of carrying out the stem cell research.
Preview sample
Project Management Tools Information Technology Report
12 pages (3417 words) , Download 3 , Report
Free
Possible steps that may be taken in order to enhance the expected results of the project include the gathering of as much information as possible prior to the start of the project, such as an inventory of the various computers and their status in order to prepare the team.  Prior to the start of the upgrading process, the necessary training should be undertaken by the technical staff as mentioned. 
Preview sample
Launching the Professor of Plumbing Application Information Technology Case Study
7 pages (1750 words) , Download 2 , Case Study
Free
The Professor of Plumbing will perform the above functions efficiently, effectively and comes with versatile features. The application integrates books, tables, calculators that exist in the market separately to make an interactive user interface that presents all these features rapidly and at the click of a button. 
Preview sample
Science Developments and Computers Information Technology Coursework
4 pages (1062 words) , Download 2 , Coursework
Free
The following thesis is a measure of the factual data that enables us to determine all there is to material science and its developments regarding the use of computers and how the field of information technology has been revolutionized through periodic material enhancements. We would essentially highlight the matter of silicon-based migration.
Preview sample
The Difference between Office Automation System and Knowledge System Information Technology Research Paper
3 pages (750 words) , Download 4 , Research Paper
The author states that at the present, latest information technology-based systems allow business organizations to update their actions 'in-house'. In this scenario, web development is not essential. In other words, anybody who knows how to use Microsoft Windows and can browse the internet will have no problem with this system.
Preview sample
Evolution of the Cellphone and How it Changed our Lives Information Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
The cellphone technology is already 38 years old. It started in 1973 when Dr. Martin Cooper, Motorola’s researcher and executive, made a first call on the first cellphone that was made. The call was made to Dr. Joel S. Engel of Bell labs and was patented under his name on October 17, 1973 under the name “Radio Telephone System”.
Preview sample
Information Systems Ethics in Triad Information Technology Coursework
5 pages (1250 words) , Download 2 , Coursework
Free
The author states that in order to observe and study the effects of different cultures on the information handling the world is divided into a triad. The three regions selected comprise of the Americas, The EMEA, and Asia. Three countries, one from each of the triad regions were selected for the study.
Preview sample
The Milgram Experiment Method Information Technology Research Paper
4 pages (1171 words) , Download 2 , Research Paper
Free
One of the most well-known experiments in psychology the Milgram experiment took place in 1961-1962. Stanley Milgram who was a psychologist at Yale University wanted to study how willing a person is, to obey instructions to perform acts that conflicted with the person’s conscience from an authority figure.
Preview sample
Named data networking Information Technology Term Paper
5 pages (1250 words) , Download 2 , Term Paper
Free
Indeed, current networks have many innovations that have transformed how data are shared between various computers connected to the internet. Despite these, the same network is characterized by many challenges that have hindered the transfer of data between different endpoints.
Preview sample
Local Area Networks and Wide Area Networks Hardware Technology Information Technology Essay
3 pages (1050 words) , Download 3 , Essay
The competitiveness of nations and the quality of life of their citizens could well depend upon the state of their indigenous information and communication networks.” (Bendis, 191). The need to keep pace with the advancements introduced in computer networks have opened even more horizons for research and development in this domain.
Preview sample
Internet Security IT Research Paper Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
This paper briefly explains various types of interne security threats and the possible preventive measures. Virus attack is one of the major security issues of internet. Different types of viruses, spyware, malware etc can attack the computers through internet.
Preview sample
Types of Wireless Network Information Technology Research Paper
3 pages (750 words) , Download 4 , Research Paper
Free
the network can be accessed from different places in a given range. Information compression, portability and access to multiplexing have made wireless networks extremely reliable and easy to use in today’s world ( Wireless Technologies). There are different kinds of networks available at different bandwidths.
Preview sample
Geographic Information Systems Information Technology Term Paper
6 pages (1989 words) , Download 3 , Term Paper
Free
Information systems are often termed as a means of acting as an intermediary between the output processes and backend computer systems. Specific information systems are often designed for specific information processing. For example a payroll system may be embedded in a business environment that would take care of all the pay generation requirements of the business.
Preview sample
Overcoming Barriers to Adopting and Implementing Computerized Physician Order Entry Systems in U.S. Hospitals Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
Poon et al. (2004) conducted a semi-structured interview with the senior management of several hospitals in the U.S. (26 in total) to understand the potential problems that are being faced with the CPOE implementation. Further, he divided the barriers into three types and has provided solutions for each barrier based on evidence-based literature and experiences.
Preview sample
Human-Computer Interaction Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Back in the 80’s, when human-computer interfaces were born, the factors of ergonomics and user-friendly design were mostly ignored, which led to dissatisfied users and threatened the life of the interface. But as the computer software and hardware industry developed, so did the methods of evaluation of these products.
Preview sample
Challenges Presented by Implementing IPv6 concurrently with IPv4 Information Technology Term Paper
5 pages (1335 words) , Download 2 , Term Paper
Free
NAT allows different devices on a local network to share private addresses within the network while sharing one global IPv4 address for external communication with other computers and devices. While this strategy has delayed the exhaustion of IPv4, it has increased the complexities of bi-directional communication.
Preview sample
Information Technology in Various Countries Information Technology Essay
7 pages (1830 words) , Download 4 , Essay
Free
Modern society has been extensively dependent on society and has a tremendous impact on every sector of the world economy. It has direct in fluencies the daily lives of the people. The collapse of information technology will endanger the existence of the etic. Implementation of technology has been to voted extent in different countries.
Preview sample
Seven Processes of the Open Systems Interconnection Information Technology Report
8 pages (2593 words) , Download 2 , Report
Free
To smooth the process of communication, the OSI model divides its tasks into seven layers. In other words, the open systems interconnection comprises seven processes, recognized as functional layers. Each layer of the OSI model performs some specific tasks. This report has discussed all the layers and their associated tasks.
Preview sample
Black Quarterbacks in the NFL Information Technology Research Paper
3 pages (881 words) , Download 3 , Research Paper
Quarterbacks are usually known for just standing in the pocket and throwing the ball but some black quarterbacks have become famous for rushing and moving around in the pocket making them a more formidable force to be reckoned with. By researching this topic, we can find out when the first black quarterback entered the NFL, the circumstances surrounding that entry, and the impact it has made on the game.
Preview sample
Googles Information Gathering Activities Information Technology Article
8 pages (2252 words) , Download 4 , Article
Free
Then log onto your Gmail account and e-mail a friend about borrowing shoes and shoe shopping and your favorite shoe store. Then check out the adds to your right. You will have ads for shoe stores, shoe magazines and shoe shopping sprees. This sort of targeted advertising is the basis for Google’s economic success.
Preview sample
Probability Distribution Method in Computer Networks Information Technology Research Proposal
3 pages (1319 words) , Download 7 , Research Proposal
Free
The typical distribution assumption and errors representing other error numerical faults with detection techniques have to be employed to lock a network (Singh and Kaur, 2007, p. 107). These correction techniques need to be initiated through diverse ways of detection and existing digital computation methods.
Preview sample
Effective IT Project Management Information Technology Case Study
6 pages (1772 words) , Download 4 , Case Study
Free
One project manager should be in charge of only one project to ensure the success of the projects. The company should provide outside formal training for project managers to ensure they carry out their duties effectively. Project managers should interact with customers to determine their needs and preferences and to carry out their duties in that manner.
Preview sample
Current and Fixed Assets Information Technology Essay
3 pages (750 words) , Download 2 , Essay
There are two main types of assets; fixed and current assets. There are other assets but these are the only two which are required in balance sheets to determine the growth of a company (Ingram & Albright, 2006.pp.292). Current assets are cash and other assets which are convertible to cash through selling or consuming but with no effect to the normal operations of the business.
Preview sample
Outsourcing And Project Valuation Information Technology Essay
3 pages (750 words) , Download 2 , Essay
  For each area currently in a shared services arrangement, how successful has the operation been? If your company does not outsource, tell us the reasons for that decision. Organizations can contract other organizations to do a particular task or function for them, outsourcing.
Preview sample
Malicious Software, Unknown Threats and Potential Solutions Information Technology Research Paper
6 pages (1824 words) , Download 2 , Research Paper
Free
Malicious software also gathers unauthorized information, thus leading to loss of privacy and confidentiality of information. Systems’ vulnerability to malicious software and unknown threats is the main cause of information and system attacks, destruction and interruption of normal system functioning and processing of information.
Preview sample
9351 - 9400 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us