StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Adaptive Mobile Learning Using Multiple Intelligence Theory Information Technology Dissertation
7 pages (2762 words) , Download 2 , Dissertation
Free
User preferences need highly customized content to be delivered along with the unique format for mobile viewing, and this requires the use of multiple intelligences that aid in adapting the learning environment according to the user learning styles or preferences (Spaniol, et al., 2009; Bull and McCormick, 2011; Hwang and Tsai, 2011).
Preview sample
Comparative Discourse: Three Scripting Languages Information Technology Research Paper
5 pages (1571 words) , Download 2 , Research Paper
Free
Active Server Pages (ASP) is defined by Yank (2001) as “a proven, well-established technology for building dynamic Web applications, which provides the power and flexibility you need to create anything from a personal, Web-based photo gallery to a complete catalog and shopping cart system for your next eCommerce project. 
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Make a research paper about two different types of application softare (exclude microsoft office softwares) Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
These applications allow users to truly maximize the functions of a computer. An application software (also known as “application” or “app”) is a computer software that allows a user to perform a specific task (Miller, Vandome and McBrewster 2). As such, applications are designed to perform a specific task.
Preview sample
Business Intelligence Technology Issues Information Technology Assignment
3 pages (992 words) , Download 5 , Assignment
Free
Data is a mere collection of raw figures and facts, e.g., a company’s daily inventory records, etc. Information: The data is made meaningful by the performance of the organization and its analysis of it. Knowledge: Experience, Analysis, Context, and reflections combined together with information produce a result that is termed knowledge. This resultant form of information is termed knowledge.
Preview sample
Compare and Contrast 2 Distributions of Linux: Fedora versus Ubuntu Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
However, organizations having a Windows based server environment are reliant on using Microsoft products on workstations. Although, Linux is gaining popularity for home users, as it is an open source and distributions are downloadable from the Internet. As per requirements, we will compare and discuss Fedora and Ubuntu, as they are one of the two distributions from several others.
Preview sample
Potential Benefits and Problems of Using Internet for Business and Education Information Technology Essay
3 pages (750 words) , Download 4 , Essay
Free
There are huge potential benefits of the Internet but problems can be immense if the medium is misused. Internet can provide many benefits to spread the cause of education. It offers the possibility of using the world-wide-web flexibly and in distinct mode and look.
Preview sample
MySQL Information Technology Research Paper Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Systems of database management like MySQL Server help the users to add, reach and compute the information entered into a computer database. MySQL plays a cardinal role in the computation and processing of data because of the computer’s ability to deal with large amounts of data.
Preview sample
Telecommunication in the Healthcare Industry Information Technology Speech or Presentation
8 pages (2093 words) , Download 2 , Speech or Presentation
Free
Over time, communication methods have evolved; from smoke signals and Morse code to cellular phones and email, people will find ways to hear from their friends and family even if they are separated by great distances. Our communication technology or telecommunication has helped greatly in this human need. 
Preview sample
Benchmark Analysis: Comparing the AMD 910e and Intel 2400s Processors Information Technology Essay
5 pages (1360 words) , Download 2 , Essay
Free
In the power management efficiency, the stats are almost even for the two processors, with Intel at a slight advantage over the other. There is too much inexplicable gap between the floating point math test and therefore there must be quite a difference between the methods used in the respective test software. 
Preview sample
Information Security in Supply Chain Security Information Technology Research Proposal
4 pages (1314 words) , Download 3 , Research Proposal
Free
Supply chains are known to be especially important in terms of information sharing across several players which can vary from an organization to a nation. They play a crucial part in determining the relationships among the various actors that are involved in the chains. Security in a supply chain has always been an important aspect. 
Preview sample
The Importance of Linux Creator Linus Torvalds Contribution to Computing Information Technology Term Paper
5 pages (1348 words) , Download 2 , Term Paper
Free
In light of the developmental process and the multiple successes Torvalds achieved by creating Linux as discussed in this paper, his importance in the world of computing becomes quite obvious. It has been over 20 years since Linux was founded in the year 1991 and the lines of code have increased from 10000 at the start to more than 7 million recently
Preview sample
Traditional and Wireless IDS/IPS Techniques Information Technology Research Paper
5 pages (1250 words) , Download 2 , Research Paper
Free
Security in terms of computer networks has marked its significance. Senior management address security issues to an optimal level and enforces strict security procedures in order to protect strategic and financial assets. Firewall and other related monitoring tools were not sufficient to cater to the needs for efficient security architecture.
Preview sample
SQL Training Course Experience Information Technology Research Paper
4 pages (1162 words) , Download 2 , Research Paper
Free
It is essential to state that according to (SQLCourse, 2011), structured query language (SQL) is a very important data manipulation language. It is used for developing different kinds of database management systems (DBMSs) such as MySQL, Oracle, DB2, Microsoft SQL Server, and Microsoft Access (SQLCourse, 2011).
Preview sample
Hardware and Software Information Technology Assignment Information Technology Assignment
3 pages (750 words) , Download 4 , Assignment
Free
It is also important to remember to reference your work - including images taken from somewhere else. ALL answers you provide must be composed in a majority of your own words and interpretation of ideas (for more details please re-read carefully your Academic Honesty Declaration).
Preview sample
Computer and Information Technology Ethics in Saudi Arabian Business Organizations: Attitudes and Approaches Information Technology Report
8 pages (2478 words) , Download 2 , Report
Free
Be it in the education system or the organizational cultures, the information technology is one of the most flexible applications to provide huge benefits to its users. However, the concern of ethical issues is a crucial matter in the modern world where piracy, corruption and unethical measures have become very common among individuals.
Preview sample
The Affects of Technology on the U.S. Economy Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Free
There is wide recognition that science and technology are fundamental to the economic growth, and the U.S. economy is turning in an excellent performance at the macro level – solid growth and low inflation. However, the introduction of technology has played a major role in the widening the income gaps as technological advances leads to higher returns to education and experienced.
Preview sample
Internet Tools as Dirt Bikes Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
A good level of communication is key for the success of every company. This information is very instrumental in strategizing the business operations and products. Internet tools are one powerful way of achieving a good level of communication in an organization.
Preview sample
Work Products in Software Requirements Analysis Information Technology Report
6 pages (1739 words) , Download 3 , Report
Free
The work products in this process are critical because errors in this process can get magnified in the subsequent processes leading to significant deviations in the plans. It was observed that Plan, Goals, Record, Template, Requirement Specification, Process Description, and User Documentation were some of the most significant work products of the Requirements analysis process.
Preview sample
Types of Technology in a Business Environment Information Technology Literature review
5 pages (1442 words) , Download 3 , Literature review
Free
Many of the technology are inexpensive and, yet, they are capable of multiplying the capacities and potential of an organization. Some of the technologies for business include the mobile computer, scanners/barcode/RFID devices, IP video systems, and Voice over Internet Protocol.
Preview sample
An Open Source Network Intrusion Detection System Information Technology Article
2 pages (788 words) , Download 2 , Article
Free
Initially, Snort was used as a packet sniffer tool, in order to analyze and detect data packets on the network. However, as the tool matures, it was transformed as an Intrusion detection system. Moreover, the architecture of Snort comprises of four components i.e. packet decoder, preprocessor, detection engine and module with the features of logging and alerts. 
Preview sample
Computer Sciences and Information Technology Information Technology Personal Statement
4 pages (982 words) , Download 3 , Personal Statement
Free
It is essential to state that “Computing is not about computers anymore.  It is about living.”  ~Nicholas Negroponte A job in the field of computing had been my ambition ever since I had the fortunate chance of being exposed to this most modern equipment that science has put into the hands of mankind.
Preview sample
Hand-In Assignment on Information Technology Information Technology Assignment
3 pages (750 words) , Download 4 , Assignment
Free
Ultimately, this can help to find out such processes which are not giving the required result and are consuming useful resources. By using metrics to determine such processes which are consuming many resources can help to work on that particular portion of software.
Preview sample
Hashing Algorithms Destination Information Technology Essay
8 pages (2167 words) , Download 4 , Essay
Free
Hashing algorithms are used for several purposes like encoding, decoding a particular text or a file, to provide key access to a database, to convert the specified value into another format. Hashing algorithms are generally categorized based on the type of data in which they are used. The most popular hashing algorithms include SHA algorithms.
Preview sample
Similarities and Differences between IPv4 and IPv6 Information Technology Literature review
8 pages (2173 words) , Download 3 , Literature review
Free
The internet protocol (IP) is the main communication protocol used for relaying packets or datagrams across an internetwork through the use of Internet Protocol Suite. Since it is responsible for routing datagrams across network boundaries, the IP is the principal protocol that establishes the internet.
Preview sample
Electronic Commerce - ElecTeesElct Me Website Information Technology Dissertation
50 pages (10420 words) , Download 2 , Dissertation
The introduction of the internet has revolutionised the way in which business is conducted. Electronic commerce has emerged as a potent methodology for doing business in the online domains. More and more businesses are gradually shifting over to the internet in a bid to reach greater audiences and reduce the cost of operations.
Preview sample
SAP ERP Implementation - Nestle USA Information Technology Research Paper
7 pages (1907 words) , Download 8 , Research Paper
Free
Generally, to most people, Enterprise Resource planning looks like one sure-shot solution to solving all the issues a firm faces. This perception proves to be true a lot of times, though not always. Adopting an ERP system for a company helps the firm transform itself by business process reengineering.
Preview sample
Business Process management as a real , meaningful change strategy Information Technology Essay
3 pages (750 words) , Download 2 , Essay
After this point a critical discussion will be conducted arguing both the merits and disadvantages of BPM as a meaningful change strategy. According to Benitez (2006) it is the case that broadly speaking one could define a business process as the work that is required to be done by an organization through it systems for external or internal clients.
Preview sample
Google and the decision-making process Information Technology Essay
3 pages (750 words) , Download 6 , Essay
Free
Along with enhanced communication, business transactions also blossomed. Surfing the net is facilitated by search engines such as Google. Google is a large-scale search engine that crawls and indexes millions of websites and web pages in the internet (Brin & Page n.d.).
Preview sample
Near Field Communication Information Technology Report
6 pages (1744 words) , Download 4 , Report
Free
This new revolutionary technology will contribute towards electronic commerce and may become a big player for businesses to earn revenue.  As per the standards we have discusses the semantics in terms of technical, positive, and negative factors. One example of a typical NFC reader is also demonstrated along with its specifications, features, and support for NFC technology.
Preview sample
Preventing the Distribution and Downloading of Copyrighted Material Information Technology Essay
5 pages (1449 words) , Download 2 , Essay
Free
In the contemporary world, the concept of internet piracy which is in other words known as file sharing has become widely discussed in relation to copyrighted information/material. This topic has generated controversial discussions globally. Many people may view it as being risk-free although its impacts are detrimental to companies mainly in the entertainment sector. File sharing has negative economic impacts.
Preview sample
Problems and Opportunities created by having too much data, and what to do about them Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Massive collection of data is also effective for business decision support. In this scenario the huge business data collections are used through some OLAP, data mining and data warehousing based tools. These all tools and capabilities lead to better business data management and issues handling.
Preview sample
Effects of Information Systems on Decision-Making Process Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
The influence of information technology or internet in business, economy, politics, culture, communication, education etc is well known to the current generation. Even in the day to day decision making process, internet influences the people very much. This paper analyses how the information technology such as internet is influencing and affecting people's decision making process.
Preview sample
Business Environment Analysis Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
1.1: Five Forces Analysis The five force analysis looks at some of the factors that affect the marketplace, or as Porter refers it, ‘the microenvironment’ around the business (Oxford University Press, 2007) Threat to business from new competitors A business operating in a profitable market will attract the eyes of competitors who want a ‘piece of the cake’.
Preview sample
Observation of User Experience of Samsung Galaxy Phones Information Technology Case Study
9 pages (2250 words) , Download 2 , Case Study
Free
Galaxy can introduce it in a new form with more advanced facilities. We knew that with the introduction of new technologies the older versions become obsolete and need to be thrown which may cause some kind of pollution to the environment. The introduction of this virtual keypad can somewhat lower the rate of this waste.
Preview sample
How Computerisation and Information Technology Increases Worker Productivity Information Technology Literature review
8 pages (2112 words) , Download 2 , Literature review
Free
Due to the application of these new technologies, many manufacturing industries have been able to record an overall improvement in the performance of their organization as well as a reduction in costs of production. These technologies are able, to sum up, tasks that could have been done by many people or do for many hours.
Preview sample
Social Networking and Employment Information Technology Literature review
10 pages (2573 words) , Download 4 , Literature review
Free
Traditional means of communication such as telephone calls, letter writing, and the advanced channel emails, have been given way for the new concept of communication through social networking. The potentials of social networking have been increasing day by day.
Preview sample
Lack of Minorities in the Information Technology Field Information Technology Research Paper
15 pages (4368 words) , Download 2 , Research Paper
Free
If it is the I.T. field that will lead this world into the future they need to do so as an example to all other companies of how important diversity is. The Scandinavian Journal of Management reported that it is only through an organization actively seeking to create a culturally diverse workforce that they will accomplish this goal.
Preview sample
RFID Tracking Advantages Information Technology Dissertation
5 pages (1762 words) , Download 4 , Dissertation
Free
It started in the 1800s with many of our new technologies having begun then, such as the earliest motorbikes, cars, and phones. Much of this development takes many years to come to fruition; one such technology is the Radio Frequency Identification (RFID) tag tracking system. Originally developed in 1969, it was patented in 1973.
Preview sample
Differences in Design Objectives Information Technology Research Paper
5 pages (1457 words) , Download 2 , Research Paper
Free
C++ and Java possess differing heritages largely due to different design objectives. C++ is an extension of C and was aimed at systems and application programming. It provided added support for statically typed OOP (Object Oriented Programming), handling exceptions, generic programming, and scoped resource management.
Preview sample
Post Mortem Forensic Analysis Information Technology Research Paper
4 pages (1000 words) , Download 3 , Research Paper
Free
In the current advancements of the computing world, an attacker initiates prevalent attacks that are vivid and intense in order to compromise or destroy the target. Researchers have studied these attacks in order to provide a secure mechanism that may effectively detect and fight against these vivid attacks.
Preview sample
Network and Operating System Investigation Information Technology Research Paper
4 pages (1000 words) , Download 2 , Research Paper
Free
The usage of the Internet is increasing with pace. Even small companies are integrating their business process with a small computer network. Every now and then, a new business wants its presence on the web. Moreover, services provided on the web are considered the value added, in terms of customer satisfaction and feasibility.
Preview sample
Green IT for Services Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
 As businesses throughout the world are going green, IT has to become green in order to maintain the overall sustainability. It starts with a proper introduction which is followed by a section where the basic concepts of Green IT are portrayed. 
Preview sample
Incompatibility of the PlayStation III (PS3) with Newer Systems/Software/External Drives Information Technology Literature review
6 pages (1829 words) , Download 2 , Literature review
Free
In other words, it is a system which reads PS3 video playing games. A lot of models of PS3 platform have been released by Sony (that is a popular PlayStation production company). These models are developed on the basis of different levels of memory power and diverse models for different nations around the world.
Preview sample
Implementation Case on Information Technology Information Technology Coursework
5 pages (1382 words) , Download 3 , Coursework
Free
Implementing the project involved managing change which was not conducted properly. As a result, there was employee resistance. Because the management had not communicated with the employees about the importance of the project, the employees did not perceive the need for change.
Preview sample
The Role of Technology for Big Business Information Technology Coursework
4 pages (1262 words) , Download 3 , Coursework
Free
Just take a look at Google who have mastered “Customer Self Service’. Their customers, like Hydro-Quebec, are corporations, households and individuals. They earn earned nearly $30 billion in 2010. Yet anyone can set up a global multi-media full marketing, sales and advertising campaign with no human contact seamlessly in less than an hour.
Preview sample
IT Risk managment Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Free
The enterprise carries all the data to hot site in case of inoperable functioning .Hot site is a backup and carbon copy with real time synchronization intact. In case of any disruption the hot site serves for relocation. Hot sites are more useful and widely in use in organizations dealing with financial handling, E-commerce facility providers.
Preview sample
Connectivity and Security Issues - RADIUS Server Information Technology Research Paper
4 pages (1087 words) , Download 2 , Research Paper
Free
RADIUS server provides a mechanism that is based on distributed security. It consists of two components i.e. an authentication server and client protocols that are configured at the client end. The authentication server operates from a single standalone workstation located at the client end. The core objective is to separate the communication channel from the security channel.
Preview sample
Network Technology Specification Information Technology Essay
4 pages (1150 words) , Download 2 , Essay
Free
Business communication and data management have become essential business activities in this new age of technology. Additionally, proper data recording and its effective management lead to better business management in form of excellent business decision support, budget planning, resource management, etc.
Preview sample
Taxonomy of Bloom at the Senior-Level College Information Technology Essay
5 pages (1250 words) , Download 4 , Essay
Free
It details in easy-to-understand, numerous phases how man’s intelligence should evolve from the initial stages of acquisition of knowledge up to his more complex capacities to analyze and develop critical thinking, thereby enabling him to arrive at conclusions and create new products and alternatives that will eventually add up to the facts and data.
Preview sample
Analyses of the Website Gutteridge Haskins and Davey Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
Business websites need to have some goals defined that are in line with the purpose of the business itself. Before building a website, web developers naturally ask the company their purpose to launch the website. Some websites’ sole purpose is to sell. Others gather information from visitors to analyze it and then bring something to market.
Preview sample
9501 - 9550 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us