StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Transformation of a Korean Kwangju Bank Information Technology Case Study
4 pages (1068 words) , Download 3 , Case Study
Free
The Bank had problems with its computer systems that made it fail to operate appropriately in the market. The system was too rigid and could not work effectively to respond to the changes that were taking place in the market. The bank’s information system could not allow the bank to set its own strategies since it could not support them.
Preview sample
Phenomenon of Ethical Hacking Information Technology Report
7 pages (2062 words) , Download 2 , Report
Free
Another definition of hacker states that a hacker is an individual who is continuously involved in the part of creating programs and conducting tasks recognized as programming and does not only theorize about these tasks. As computer systems came into existence, the number of users even increased period after period.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
New York Computer Forensics Information Technology Essay
3 pages (750 words) , Download 4 , Essay
The author states that computer forensics can be defined in many ways. Though, normally, computer forensics is recognized as a method utilized for the analytical analysis and investigative methods to identify, gather, inspect and preserve information and evidence which is magnetically encoded or stored.
Preview sample
Buying a Computer Information Technology Term Paper
4 pages (1126 words) , Download 2 , Term Paper
Free
A computer is one of the most vital requirements of human beings in the modern-day scenario. It has been observed that the computer has become an important part of the day-to-day activities of people all over the world. However, buying a computer needs certain knowledge and research which will guide an individual to obtain the best possible devices for them.
Preview sample
Reasons behind the Quantitative Easing Information Technology Research Paper
4 pages (1134 words) , Download 2 , Research Paper
Free
The increase in basic food prices has severe impacts on the vast population worldwide.  Shortages of grain due to adverse weather, increasing meat consumption in China and India, and conversion of corn to ethanol in the US are responsible for hiking the food price. Economic and finance ministers from the G20 nations conducted a meeting in Argentina to discuss the increasing volatility in food and commodity prices.
Preview sample
Purchasing Concepts and Organization in SAP Information Technology Essay
7 pages (2036 words) , Download 3 , Essay
Free
Generally speaking, due to the development of enterprise systems and their functionalities, all the market analysts and correspondents join together to give new names for enterprise systems. The names that are suggested mainly are “enterprise commerce management” or “ERP II” (Fingar, Kumar, and Sharma).
Preview sample
Negative Impacts of Technology Information Technology Essay
28 pages (7365 words) , Download 7 , Essay
Technology has made human life easy, fast, and worth living. This is because of its integration in numerous parts of human daily lives. People today have, therefore, become more dependent on technology compared to centuries ago. For some, it is not possible to imagine how life would be without technology as part of it.
Preview sample
Password Cracking Systems Information Technology Research Paper
20 pages (5000 words) , Download 2 , Research Paper
Free
Password cracking is a way of trying to access or crack passwords in an attempt to enter into a computer system or a communication network. Crackers usually make use of a range of scripts, tools or cracking software to break a communication system password. The prime objective is to perfectly get the password of server or other system.
Preview sample
Improving Web Security Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Passwords are essential part of a person’s life these days. From checking e-mails to managing online bank accounts people use passwords almost all the time. Being a lucrative incentive for the hackers and criminals, the risk of password theft has grown manifold over the past few years.
Preview sample
Cyberstalking, Cyber-Harassment and Cyberbullying Information Technology Essay
3 pages (907 words) , Download 3 , Essay
The internet offers a plethora of knowledge and experiences for the students of this generation.  However, coupled with this amazing advancement in technology are the various threats that it also tenders.  A lot of our parents, educators and legislators are alarmed at the emerging phenomena of cyberstalking, cyber-harassment and cyberbullying.
Preview sample
Outsourcing IT Servises Information Technology Essay
3 pages (750 words) , Download 2 , Essay
The reasons for this type of outsourcing or contracting can be that the services required are minimal, irregular, or specialized so that it is better to pay an outside company for the work rather than to employ, train, and maintain a salary with benefits package for a local worker.
Preview sample
Relationship between IT and a Companys Competitive Advantage Information Technology Essay
5 pages (1330 words) , Download 2 , Essay
Free
Michael E. Porter’s article “How Competitive Forces Shape [Business] Strategy” was first published by Harvard Review in 1979 and the economist and associate professor’s article revolutionized the strategy field. The article explains how the five main competitive forces include: Customers, suppliers, entrants, established competitors/rivals and substitute offerings/products.
Preview sample
One of the Major EA Frameworks Information Technology Essay
3 pages (750 words) , Download 2 , Essay
An enterprise architecture framework, also known as EA framework, refers to an architecture framework which describes the way of organizing the views and structures connected to enterprise architecture. Such frameworks build the views in a means that helps guarantee the accuracy, integrity and completeness.
Preview sample
The Use Case Diagram Information Technology Coursework
4 pages (1034 words) , Download 2 , Coursework
Free
The main actors within the system shall include the donors, activity coordinators, employees, the database system and the storage facility. The activity coordinators shall be linking with the human actors within the use case diagram. The people coordinating the company activities shall become central to the entire operation of the company. This diagram shall present a breakdown of the various activities involved in the entire operation.
Preview sample
Current and Future Applications of Mobile and Wireless Networks Information Technology Report
9 pages (2672 words) , Download 2 , Report
Free
These systems provide excellent support for inventory and accounting related matters. On the other hand, in the second part, I have discussed a communication system. In this section, I mainly focused on the working of these systems. I have also presented a diagram to demonstrate how this communication system works. Both these systems offer a number of advantages to their users.
Preview sample
Principles of Detail Design Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Detailed design as explained by IEEE is is the act of making improvements on already designed software so as to make it suit the intended purpose (34). In the process of detailed design, designers thoroughly explore each element in order to define the core structure and behavioural capabilities of the software that would result in the construction of efficient and natural software.
Preview sample
The Argument for Net Neutrality Information Technology Literature review
8 pages (2184 words) , Download 3 , Literature review
Free
The Internet is the largest publicly accessible network in the world. Connecting to this network is done through service providers called Internet Service Providers, or ISPs. Providers typically provide multiple tiered connection schemes which give a user the ability to take in and send out more information at the same time.
Preview sample
The Systems Development Life Cycle Methodology Information Technology Essay
3 pages (750 words) , Download 3 , Essay
In this scenario, a comprehensive and in-depth requirement analysis is performed in an attempt to determine the system needs and requirements to form a Software Requirements Specification (SRS) document. In addition, clients are forced to "sign-off" on the requirement specification document before system development proceeds to the next step.
Preview sample
Health informatics: Mobile Computing and Social Networking Information Technology Essay
4 pages (1000 words) , Download 3 , Essay
Free
The author discusses the topic of the effective monitoring mechanism that will transfer information related to vital signs, resulting in an instant transfer of medical information and response time from a caregiver or doctor. The solution is Mobile Health Monitoring, which is the integration of social networking sites empowered with mobile computing.
Preview sample
Impacts of Technology on Human Creativity Information Technology Research Paper
4 pages (1066 words) , Download 3 , Research Paper
Free
Creativity entails finding out ways to repair damage or improve old paraphernalia other than replacing them. On the other hand, technology is the systematic management of art, thus considered a result of creativity. Additionally, technology encourages coming up with novel things to replace the old and impaired ones.
Preview sample
Floating point IEEE754 Information Technology Coursework
3 pages (750 words) , Download 2 , Coursework
There is therefore an exponent and mantissa when representing these numbers. The significant bits section makes up the mantissa while the representation of the point values makes the exponent. This method is referred to float because the radix part of the number, that is, the binary/radical/decimal point can be located anywhere.
Preview sample
Determinants and Implications of Academic Integrity Information Technology Coursework
5 pages (1857 words) , Download 2 , Coursework
Free
The report focuses on academic integrity and on what factors either strengthen or weaken it. Approaches to prevent or address academic dishonesty are drawn from the pool of existing literature. The aim of the study is to discover how academic integrity may be effectively and efficiently ascertained.
Preview sample
Current Trends in Business Intelligence Information Technology Term Paper
5 pages (1598 words) , Download 3 , Term Paper
Free
The sources of such technologies include the internet, the supply chains, automated business process, and sensor-equipped devices among others which are collectively tagged under Radio-Frequency Identification (RFID). Through this method, the information can be captured in a superior granularity as compared to previous times (Hanna, 2010).
Preview sample
Hacking of Computer Systems and Cyber Crimes Information Technology Essay
5 pages (1342 words) , Download 2 , Essay
Free
The writers have comprehensively dealt with the topic to greater depths, with a crispy clear understanding of the subject matter, providing sufficient statistical evidence to back up the information; elaborate examples and relevant case studies have been offered to help present the information of the articles to the readers.
Preview sample
Illegal Downloading of Music Information Technology Essay
9 pages (2440 words) , Download 2 , Essay
Free
This category definitely would encompass the problem of illegally downloading. There is a multitude of victims involved in this crime, and the victims are all recording artists and all record companies. There are so many victims that it would be difficult to tell exactly who is being harmed. In fact, it would be impossible to tell this.
Preview sample
Moores Law in the Computer Companies Information Technology Research Paper
4 pages (1131 words) , Download 2 , Research Paper
Free
Moore’s Law is a term that was introduced in the year 1970 in the field of computing. The law says that the processor speeds or even the overall power of processing for the computers will double in every two years. This law is still accepted in many computer companies by various technicians despite it being unpopular.
Preview sample
Factors that Contribute to IT Project Success Information Technology Essay
12 pages (3311 words) , Download 3 , Essay
Free
Guido and Clements contend that “helping these individuals develop and grow into a cohesive, effective team takes effort on the part of the project manager and each member of the project team” (2009, p. 360).  Effective project teams clearly understand the objectives of a project, have a high degree of collaboration, cooperation, and trust, are results-oriented, and clearly understand their roles and responsibilities.
Preview sample
Cloud Computing - Wizni Incorporated Information Technology Case Study
11 pages (2843 words) , Download 3 , Case Study
Free
Cloud computing storage and associated risks with respect to information security were discussed. Likewise, the open-source cloud concept is also discussed in detail. Moreover, the total cost of ownership, management and configuration of computing devices is not required and most importantly, critical business applications can be accessed anywhere.
Preview sample
Developing Potentially Highly Profitable New Systems Technologies Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Your Name Lecturer Name Subject Code Date How would you make a business case for developing potentially highly profitable new systems technologies that are based primarily on intangible benefits? How would you justify funding such a project and convince senior management to proceed with it?
Preview sample
Data Mining: Concepts and Techniques Information Technology Report
12 pages (3000 words) , Download 6 , Report
Free
Data mining can be defined as a class of database applications which seek for hidden patterns within a collection of data that can be used to effectively predict future behaviors. Therefore it is scientific that a true data mining software application or technique must be able to change data presentation criterion and also discover the previously unknown relationships amongst the data types.
Preview sample
DQ: Content Validation Paper Information Technology Essay
3 pages (750 words) , Download 2 , Essay
It is also important to remember to reference your work - including images taken from somewhere else. 4. ALL answers you provide must be composed in a majority of your own words and interpretation of ideas (for more details please re-read carefully your Academic Honesty Declaration).
Preview sample
Pervasive Computiong Information Technology Research Paper
5 pages (1250 words) , Download 2 , Research Paper
Free
According to the report latest mobile phones and PDAs are some of the well known examples of pervasive computing. The basic objective of pervasive computing is to combine all the features and services in a single application. So it can help the people to use it conveniently. Pervasive computing is the rising trend, which is aimed at offering visibility for the users.
Preview sample
Information Technology Audit of Adams Brick Communications Company Information Technology Report
8 pages (2211 words) , Download 2 , Report
Free
Given that Information Technology (IT) exists to support business, understanding the impact of IT on the business and the risks introduced into the business process are vital for an effective audit process which ensures a thorough evaluation and assessment of the internal control environment.
Preview sample
Computerized Clinical Decision Support Systems in Healthcare: Pros, Cons & Liabilities Information Technology Literature review
8 pages (2340 words) , Download 4 , Literature review
Free
The health care industry has come a long way in terms of delivering essential medical services and facilities to the communities they serve. Technology and innovation are the driving forces shaping the quality of health care services. Medical practitioners use technology-based tools to treat patients and provide them with high-quality services.
Preview sample
Mobile Health Applications Information Technology Dissertation
18 pages (5246 words) , Download 4 , Dissertation
Free
Low distribution is due partly to the complication of IT venture, which goes further than acquiring technology to altering work processes and customs and making sure that nurses, physicians, and other staff apply it. Moreover, certain features of the market such as disbursement policies that recompense volume and not quality, and the disintegration of care delivery do not encourage IT investment, and might hinder it.
Preview sample
An analysis of Palm Malls Management Information System Information Technology Term Paper
6 pages (1500 words) , Download 3 , Term Paper
Free
This basic purpose of this project is to develop an MIS for Palm Mall which will automate some of the important business functions. This system will be used for the management of Palm Mall’s working and operations. This application will make use of an automated BAR-Code detection system to detect the product details.
Preview sample
The European Union Health Monitoring Programme Information Technology Literature review
6 pages (1559 words) , Download 2 , Literature review
Free
According to the Hospital Data Project, “hospital data are now required to serve a variety of purposes including supporting activity monitoring, performance measurement, case-mix-based funding, service planning, and epidemiological analysis” (HDP, 2003). The data provided this way has become the hub of health information for all its beneficiaries.
Preview sample
Wireless Technology Information Technology Assignment
4 pages (1000 words) , Download 4 , Assignment
Free
Wireless technology Wireless technology refers to the transmission of data from one person to another in a field network, regardless the distance, without using wires or cables. It facilitates transmission of information and services and instant communication at any time.
Preview sample
Different Cost Management Factors in an IT Project Information Technology Assignment
5 pages (1447 words) , Download 3 , Assignment
Free
Communication management involves making sure that there is a proper flow of ideas and information throughout the organization. This may help to ensure there is a seamless flow of information and ideas throughout the company. Procurement management involves the acquisition and purchasing of necessary materials for project execution.
Preview sample
The Biometric Facial Recognition Process Information Technology Term Paper
5 pages (1483 words) , Download 2 , Term Paper
Free
There are various kinds of biometrics one of the most common being facial recognition. In facial recognition, the spatial geometry of facial biometrics is recorded. There are various ways of facial recognition but the common feature for all of them is the fact that they all rely on measurement of the distinguishable facial features. 
Preview sample
Ethics in an Information Age Information Technology Admission/Application Essay
6 pages (1500 words) , Download 2 , Admission/Application Essay
Free
The alibi device works through GPS (Global Positioning System) and captures the location of the device holder. The GPS tracking system holds some ethical and legal issues. From the framework that is designed for ethical issues, four major concerns came out. These are known as the “four ethical issues of the information age".
Preview sample
Cloud Computing Security Models Information Technology Essay
5 pages (1568 words) , Download 4 , Essay
Free
Cloud computing is known for its efficiency and flexibility in producing services that are able to meet escalating business needs. Cloud computing has a wide range of benefits but it also encounters issues regarding security such as application security, access control, virtualization security, identity management and authentication.
Preview sample
Evaluating the problem Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
To start with, the user is to follow up a set of potential sponsors, tracking and updating the follow ups based on its outcome and notifying the user about next follow up until the sponsor for the project is decided. The system should be innovatively devised enabling the user to add new sponsors and update the characteristics and other requisite details of existing ones.
Preview sample
Essential Components of a Wireless Security Policy, the Difference of Wireless and Wired LAN Security Policy Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
The policy governing wireless communication in a local area network is different in that sense. Wireless devices that can attach to a network are mobile or can be taken out of the premises of the organization while devices that are wired to the Local Area Network of the organization cannot be taken out of the office without arousing any suspicion.
Preview sample
Methods for Resolving Small Scale Systems Problems Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Free
A system can also be large when it has large dimensions that lead to different techniques being involved in modeling and designing, failing to come up with an appropriate solution. Most of the large-scale methods for example, the multifunctional systems have many tasks that they perform, but before they perform these many functions they need different functions or activities.
Preview sample
System Information System Planning & Management Information Technology Report
9 pages (2581 words) , Download 4 , Report
Free
The report attained the objectives demanded at the beginning of the exercise. The report has focused on different aspects of the business and offers explicit elaborations in each case. However, this report has been presented in a manner of suggestion. This implies that it should not be regarded as final but can be amended to attain excellence in implementation.
Preview sample
Computer Sciences and Information Technology Information Technology Case Study
3 pages (750 words) , Download 3 , Case Study
Free
However, the software is regarded as a small operation but this can be expanded to make it applicable in the entire organization. The management of the organization is not pleased with the ongoing support levels it is receiving from the Microsoft Dynamics GP ERP system usage and its IT operations across its branches as they have all proved to be cost ineffective.
Preview sample
Implementing QoS Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Software can be used in to either improve the quality of communication. It is used to ensure an equal distribution of available resources in a network like the internet service provider. It is used for inputting standards and mechanisms to improve the quality of the company and used in reducing data loss making it reliable Cruz (1995).
Preview sample
Business Intelligence System modeling Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
The business model, which takes into account change processes in business environment, applies decision analysis, monte carlo simulation, data envelopment, exponential smoothing, and non linear programming.
Preview sample
Operating System: Ubuntu Information Technology Term Paper
9 pages (2350 words) , Download 2 , Term Paper
Free
Introduction The Ubuntu is an Operating system that works on the Linux platform which is rapidly gaining popularity and is the choice of many, who want a substitute for Windows. The majority of people want efficient and economical ways to interact digitally through the array of contemporary applications available, and Ubuntu has proven to have been very successful by catering to this and other computer related yearnings.
Preview sample
9501 - 9550 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us