Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The impact of tobacco smoking on the academic performance of the students from Queen Mary University 1st Author Name Affiliation Address e-mail address ABSTRACT This study investigates the role that smoking of tobacco plays in poor performance of students in Queen Mary University.
8 pages (2544 words)
, Download 3
, Research Proposal
Free
An adaptive chosen-plaintext attack is a specialized form of chosen plain text attack. The intercepted and encrypted special plain text offers specific properties of the message, encryption tool, and the encryption tool. This way the attacker knows the exact weakness and therefore takes a shorter time decrypting future intercepted messages.
Preview sample
sponsored ads
Hire a pro to write a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Finally, the feedback function refers to a critical evaluation of the strategy deployment in order to analyze the effects of the tactics developed on the final outcomes realized. This evaluation would assist department officials to identify pitfalls in the tactics development and deployment (if any) and to perform better in the future.
The planned web-server and database server hosting protocol needs to operate on the basis of certain requirements which entail a common browser which invokes a particular URL that can be operated through a PC or a notebook or even a mobile device.
According to Cockburn (2007), agile project management has been termed and proven effective in software development. Agile project management involves stand-up meetings that bring together the development team, in addition to facilitating the spirit of teamwork that is core in software development. The stand-up meetings help in the undertaking of constant reviews and the performance of project assessments.
With this increased attention directed towards IT (Information Technology) the cost of IT has also been noticed by management. As a cost cutting strategy many organizations have decided to utilize cloud computer to reduce their IT budgets, but with this change comes some risk.
50 %. Without doubt, a project without an appropriate timetable, loyal and qualified team members, suitable budget, or functionality limitations could face several issues and risks of breakdown, for example, because of argumentative politics between the information technology department and workers.
Enterprise Resource Planning (ERP) is most applicable for SUH’s three business units as it will allow for the integration of the financial systems of the three businesses. Themistocleous et al (n.d.) indicate that ERP systems were introduced in businesses as a means of solving different types of problems and integrating their IT infrastructure.
By making use of computer forensics, authorities such as the United States Federal Bureau of Investigations (FBI) have in some cases managed to trap and convict the cybercriminals. This essay is a review of three cybercrime. Operation Ghost Click was an international cybercrime investigated by the FBI.
7 pages (2213 words)
, Download 2
, Literature review
Free
Virtual Reality is the emerging trend that makes use of the growing power of computers to demonstrate real-world and artificial situations and environments with extensive practicality and interaction. The primary cause of attraction of virtual reality is its capability to generate tests near to everyday life with wonderful investigational power.
Ethics defines concepts of morality for identification of rights and wrongs for regulation of behavior among individuals or groups of people. Protection of personally identifiable information, ensuring safety of involved stakeholders, benefiting stakeholders, respecting autonomy, acting with integrity are some of the ethical issues, and this paper explores them subject to ethical theories.
The food and drink sectors have been the highest contributor to Gross Value Added in the year 2012. Moreover, the UK economy has also witnessed the presence of too many small, medium, and large food and drinks setups in the last few years. This is mainly beach at an average UK resident spends 11.3% of his income on food and drinks.
6 pages (1589 words)
, Download 3
, Literature review
Free
Lifestyle has undergone an altogether change since the evolution of technology. Technology has changed the world in a way that there is more networking, more traveling, more business, more facilities, and more opportunities, though everything has been more on the negative side as well. There have been more sufferings, more violence, etc.
5 pages (1250 words)
, Download 3
, Research Paper
Free
An Open Source Software has certain properties that distinct it from proprietary software. In order to discuss the advantages and disadvantages of open source software it is necessary that the core idea behind open source software is discussed first. Proprietary software can be defined as the opposite of open source software.
Computer technology has been a source of numerous changes that could not have been thought of before it. With the help of this new horizon man was able to compute large calculations and thus realize the meanings of the most of the data that was present around him.
On the other hand, a database management system refers to the computer software used ot provide interfacing to users when they access databases and database systems on computers. A database management system is the shell that surrounds databases and allows for interactions to the databases.
(Ethereal. 2007) Likewise, the tool enables a security professional to view all the traffic that is currently being passed on and from the network by configuring the Ethernet adapter in promiscuous mode. Moreover, even a non-technical user can also operate effectively on Wire shark (Scalisi 2010).
4 pages (1268 words)
, Download 2
, Research Paper
Free
An interface of user interface is a set of tools that facilitate the interaction of computer users with computer systems. There are both hardware and software types of user interfaces with different functionalities. GUI is a form of interface which is designed and developed to have graphical icons and menus for ease of use of computers and computer applications.
Among such changes are information and communication technologies (ICT). ICT refers to technologies that guarantee the passage of information through telecommunications. The effects of information and communication technologies reflect how humans do things in present-day life as compared to how they used to in the agrarian economy.
A Wi-Fi is a type of internet network whose nodes are interconnected without any wires, and the remote transmission of information takes place by means of radio waves at the physical level (Wysocki 2005). Since all current high-speed wireless networks are using IEEE standards, especially 802.11g, the term Wi-Fi is used to distinguish wireless networks from other traditional wired networks.
The integrity is breached when anybody who is not an exam coordinator makes amendments. Authenticity means that particular information that is used for a certain purpose is genuine. The validity of individuals that get access to some data is ensured by using authentication methods for example he uses of passwords.
The targeted audience of the website is the people used to have a restaurant’s food regularly or frequently. The age of these people lies between 16 - 45 years. The audience can be professional as well as a novice web user who understands email and how to use a web browser. The targeted audience is the people who can access the internet every day.
Cyberstalking can be termed as the execution of the internet and its associated components to harass or stalk a person or certain groups. The components might embrace instant messaging (IM) and Internet Protocols (IPs) among others. The practice of cyberstalking can be regarded as one of the critical aspects.
With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised.
7 pages (1750 words)
, Download 3
, Research Proposal
Free
The author states that dashboards help determine if an organization is currently falling short of, meeting or exceeding the key performance indicators which drive the business towards success. Dashboards must have a simple, clear and usable presentation. Their design must be flexible enough to adapt to the evolving nature of a learning organization.
Ku (2010, p. 1085) explains that advancement in information and communication technology has led to increased adoption and implementation of information systems within business organizations, institutions, public agencies, companies and small businesses. The implementation of information system is basically motivated by the efficiency and effectiveness which is provides in the management of data and information and the enhancement of communication processes (Khodakarami and Chan, 2011, p.
7 pages (1750 words)
, Download 2
, Research Paper
Free
Web Mining and Social Multimedia.
Web mining is the use of data mining techniques to extract data from web documents. Data mining allows for analysis of data in order to make rational decision based on the data report collected. When such data is being analyzed based on the web documents, especially with a wide spread of social multimedia, the information gathered can benefit research institutions, businesses and economy overall.
His popularity can be estimated from the highly respectable comments various renowned magazines have passed on him and his work as mentioned in the website. In the end, the site has provided his complete address and contact information that facilitates readers in accessing Dr. Jakob Nielsen.
2 pages (500 words)
, Download 5
, Personal Statement
Free
The author states that as the technology engaged by Google suggests, it would be safer carrying your money in mobile phones, than carrying your plastic cards. “Mobile Wallet” as called by Google is an app for the Android phones, which when waved at retailer’s terminals, would let the payment through avoiding the usage of a credit card.
White Paper (Risks). With increased digitization, telecommunications companies are becoming global and do business across borders. There customer is demanding integrated solutions for data communications, voice and multimedia. Competition is intense, and hence the need to minimize risks and bring down costs.
The availability of such information is essential in facilitating useful operational decisions for the lager enterprise profitability. This proposal recommends the adoption of Information Technology system that will centralize product sales as well as create a customer relationship management network at SUH.
We can notice certain cases when one has products from a specific country but manufactured in another part of the world and transported through a third country. This just shows how our world has gone GLOCAL! This term is a combination of both globalization and local ideas. It corresponds to the combination of the local economies with the global one
With daily worldwide changing of the global technology the requirements analysis, definition and management become crucial, prior to acquisition. Hardware and software specification, as well as the effective implementation in the architectural field, has a tremendous impact on the eventual results in this field.
ABSTRACT DATA STRUCTURES Introduction A data type is acknowledged as an abstract data type when it is expressed in terms of processes on it, and its implementation is concealed (with the intention that it can be replaced with another application such as effectiveness purposes, as well as this will not change anything in the existing computer program).
Additionally, the quantum theory refers to the performance and environment of material and energy on the quantum, both at the atomic and subatomic level. It is an admitted fact that the quantum computing is not a new idea as it was first emerged in the 1970s.
The Internet is indisputably one of the greatest transformational inventions in the history of mankind. It permeates every aspect of life. It is such an integral part of daily routine that it is difficult to conceive of a time when barriers of time and space limited communication. It is an invention that serves as a combined medium for broadcasting, information dissemination and interaction, without regard to geographical barriers.
In the beginning, I will start with the introduction of the discussion of several elements. Time is always a limiting factor and therefore looking for information on how basketball goes on on the internet can be time-consuming and thus it is easy when using this champion basketball flash since it is only by a single click and all information is displayed.
10 pages (2694 words)
, Download 5
, Research Paper
Free
In American workplaces, telecommuting has accomplished a significant attention. Telecommuting is demarcated as a substitute method of finishing tasks and at the same time providing a range of benefits to the organizations, companions, societies and the environment.
16 pages (4340 words)
, Download 2
, Research Paper
Free
Regarding the issue of importance that customers from different cultural environments attach to each of the listed requirements of the software system, the researcher can conclude that Europe and Asia attach much importance to the listed requirements as against America and Africa. However, the American level of importance could be explained as being more proactive than that which exists in Africa.
The use of predictive analytics helps in the determination of a predictive score for the elements associated with the organization. The major organizational element, in this case, is the customers. The predictive scores inform the business about the most probable action by the customer. The production of predictive scores occurs when the subject organization designs a predictive model.
The author has taken a very balanced approach to the implementation of green IT technologies in today’s corporate world. The green technologies and improvements needed in the IT sector like cloud computing, power management, paperless environment and data center optimization are very much related to positivity in cost efficiency but they are still not being implemented by the top corporations in the world.
14 pages (3886 words)
, Download 4
, Literature review
Free
With the advent of the third generation and now even fourth-generation a whole new realm of opportunities has opened. To top that cloud-computing has served as an icing to the cake. There is now a whole new and refined market place for mobile devices and their data-sharing. There are different kinds of threats that a user of these devices face.
The effectiveness and speediness related to the electronic information technology systems that consist of limited and international networks, databases, and processing programs for information technology. These systems also force consumers to tackle new rights and responsibilities to use the data and re-evaluate principles of advent computers.
Managers from Alstom, a French engineering firm that manufactured and designed the French high-speed train used the concept to map out the important technologies of the train and their independence. This is to allow them to identify which train to release to a strategic client with respect to a technology transfer project.
4 pages (1255 words)
, Download 3
, Research Paper
Free
The rapid development in technology has made the world become so competitive that companies across the world are trying hard to get over each other by being distinctive in their respective field. Today, technology has both positive and negative impacts on different disciplines across the world including society, schools, and organizations.
The scope and purpose of the research have been presented in the first chapter along with stating the aims, objectives, and questions. The literature review revealed the fact that mobile government has been emerging as the latest trend in the majority of developing nations and Oman has been no more an exception. With some social, cultural, and political issues, the level of awareness has been a bit low.
The computers used in the development room should be strong enough to support the development process. During the development period, a bandwidth of between 50 to 100 Mbps will be availed in the development room. Enterprise and DMZ firewalls will be used to block the employees in the company from accessing the data in the development room.
BPM is a standard framework used in developing information systems (IS). There are four stages involved in the BPM process and these are create components, implement processes, assess results, and model processes. The first stage involves the assessment of existing business models or work processes, studying the business requirements and adjusting the models to achieve pre-defined business goals and objectives.
3 pages (1034 words)
, Download 2
, Research Paper
Free
The CIO was time and again defined as the corporate savior to support the business and technology globally (CIOs aren't CIOs for long - Computerworld). In the field of information technology, the CIOs were defined as a new variety that includes businessmen, managers, and technologists as information system managers in any organization.