StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The impact of tobacco smoking on the academic performance Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
The impact of tobacco smoking on the academic performance of the students from Queen Mary University 1st Author Name Affiliation Address e-mail address ABSTRACT This study investigates the role that smoking of tobacco plays in poor performance of students in Queen Mary University.
Preview sample
Fundamentals of Cryptology Information Technology Research Proposal
8 pages (2544 words) , Download 3 , Research Proposal
Free
An adaptive chosen-plaintext attack is a specialized form of chosen plain text attack. The intercepted and encrypted special plain text offers specific properties of the message, encryption tool, and the encryption tool. This way the attacker knows the exact weakness and therefore takes a shorter time decrypting future intercepted messages.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Compstat: Predictive Policing Information Technology Essay
4 pages (1000 words) , Download 4 , Essay
Free
 Finally, the feedback function refers to a critical evaluation of the strategy deployment in order to analyze the effects of the tactics developed on the final outcomes realized. This evaluation would assist department officials to identify pitfalls in the tactics development and deployment (if any) and to perform better in the future.    
Preview sample
Software Development Life Cycle Information Technology Assignment
5 pages (1250 words) , Download 2 , Assignment
Free
The planned web-server and database server hosting protocol needs to operate on the basis of certain requirements which entail a common browser which invokes a particular URL that can be operated through a PC or a notebook or even a mobile device.
Preview sample
Success with Agile Project Management in General Dynamics Information Technology Essay
5 pages (1456 words) , Download 4 , Essay
Free
According to Cockburn (2007), agile project management has been termed and proven effective in software development. Agile project management involves stand-up meetings that bring together the development team, in addition to facilitating the spirit of teamwork that is core in software development. The stand-up meetings help in the undertaking of constant reviews and the performance of project assessments.
Preview sample
Governance in the Cloud Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
With this increased attention directed towards IT (Information Technology) the cost of IT has also been noticed by management. As a cost cutting strategy many organizations have decided to utilize cloud computer to reduce their IT budgets, but with this change comes some risk.
Preview sample
Death March Project Information Technology Essay
3 pages (750 words) , Download 2 , Essay
50 %. Without doubt, a project without an appropriate timetable, loyal and qualified team members, suitable budget, or functionality limitations could face several issues and risks of breakdown, for example, because of argumentative politics between the information technology department and workers.
Preview sample
IT Architectural Considerations Information Technology Case Study
6 pages (1697 words) , Download 2 , Case Study
Free
Enterprise Resource Planning (ERP) is most applicable for SUH’s three business units as it will allow for the integration of the financial systems of the three businesses.  Themistocleous et al (n.d.) indicate that ERP systems were introduced in businesses as a means of solving different types of problems and integrating their IT infrastructure.
Preview sample
Operation Ghost Click Information Technology Essay
3 pages (959 words) , Download 2 , Essay
Free
By making use of computer forensics, authorities such as the United States Federal Bureau of Investigations (FBI) have in some cases managed to trap and convict the cybercriminals. This essay is a review of three cybercrime. Operation Ghost Click was an international cybercrime investigated by the FBI.
Preview sample
Virtual Reality Information Technology Literature review
7 pages (2213 words) , Download 2 , Literature review
Free
Virtual Reality is the emerging trend that makes use of the growing power of computers to demonstrate real-world and artificial situations and environments with extensive practicality and interaction. The primary cause of attraction of virtual reality is its capability to generate tests near to everyday life with wonderful investigational power.
Preview sample
Protecting Personally Identifiable Information and other ethical issues Information Technology Research Paper
3 pages (750 words) , Download 4 , Research Paper
Ethics defines concepts of morality for identification of rights and wrongs for regulation of behavior among individuals or groups of people. Protection of personally identifiable information, ensuring safety of involved stakeholders, benefiting stakeholders, respecting autonomy, acting with integrity are some of the ethical issues, and this paper explores them subject to ethical theories.
Preview sample
CommunicationsSummative Assessment Information Technology Essay
14 pages (3840 words) , Download 3 , Essay
Free
The food and drink sectors have been the highest contributor to Gross Value Added in the year 2012. Moreover, the UK economy has also witnessed the presence of too many small, medium, and large food and drinks setups in the last few years. This is mainly beach at an average UK resident spends 11.3% of his income on food and drinks.
Preview sample
How Technology Has Made Lives Easier Information Technology Literature review
6 pages (1589 words) , Download 3 , Literature review
Free
Lifestyle has undergone an altogether change since the evolution of technology. Technology has changed the world in a way that there is more networking, more traveling, more business, more facilities, and more opportunities, though everything has been more on the negative side as well. There have been more sufferings, more violence, etc.
Preview sample
Advantages and Disadvantages of using Open Source Software Information Technology Research Paper
5 pages (1250 words) , Download 3 , Research Paper
Free
An Open Source Software has certain properties that distinct it from proprietary software. In order to discuss the advantages and disadvantages of open source software it is necessary that the core idea behind open source software is discussed first. Proprietary software can be defined as the opposite of open source software.
Preview sample
The Role of Computer Technology in the Human Race Information Technology Thesis
8 pages (2150 words) , Download 2 , Thesis
Free
Computer technology has been a source of numerous changes that could not have been thought of before it. With the help of this new horizon man was able to compute large calculations and thus realize the meanings of the most of the data that was present around him.
Preview sample
Database Inventory Computer Sciences Research Paper Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
On the other hand, a database management system refers to the computer software used ot provide interfacing to users when they access databases and database systems on computers. A database management system is the shell that surrounds databases and allows for interactions to the databases.
Preview sample
PRJ1 Security Tool Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
(Ethereal. 2007) Likewise, the tool enables a security professional to view all the traffic that is currently being passed on and from the network by configuring the Ethernet adapter in promiscuous mode. Moreover, even a non-technical user can also operate effectively on Wire shark (Scalisi 2010).
Preview sample
The Role of Interfaces in GUI Applications Information Technology Research Paper
4 pages (1268 words) , Download 2 , Research Paper
Free
An interface of user interface is a set of tools that facilitate the interaction of computer users with computer systems. There are both hardware and software types of user interfaces with different functionalities. GUI is a form of interface which is designed and developed to have graphical icons and menus for ease of use of computers and computer applications.
Preview sample
Evocative Object Issues Information Technology Essay
4 pages (1256 words) , Download 2 , Essay
Free
Among such changes are information and communication technologies (ICT). ICT refers to technologies that guarantee the passage of information through telecommunications. The effects of information and communication technologies reflect how humans do things in present-day life as compared to how they used to in the agrarian economy.
Preview sample
Wi-Fi as a Type of Internet Network Information Technology Assignment
4 pages (1199 words) , Download 3 , Assignment
Free
A Wi-Fi is a type of internet network whose nodes are interconnected without any wires, and the remote transmission of information takes place by means of radio waves at the physical level (Wysocki 2005). Since all current high-speed wireless networks are using IEEE standards, especially 802.11g, the term Wi-Fi is used to distinguish wireless networks from other traditional wired networks.
Preview sample
NPS Deploying Network Policy Server Information Technology Report
8 pages (2216 words) , Download 2 , Report
Free
The integrity is breached when anybody who is not an exam coordinator makes amendments. Authenticity means that particular information that is used for a certain purpose is genuine. The validity of individuals that get access to some data is ensured by using authentication methods for example he uses of passwords.
Preview sample
The Website of the Caf Cuisine: Goals and Objectives Information Technology Assignment
7 pages (1929 words) , Download 2 , Assignment
Free
The targeted audience of the website is the people used to have a restaurant’s food regularly or frequently. The age of these people lies between 16 - 45 years. The audience can be professional as well as a novice web user who understands email and how to use a web browser. The targeted audience is the people who can access the internet every day.
Preview sample
Legal Issues in Cyberstalking Information Technology Term Paper
5 pages (1333 words) , Download 2 , Term Paper
Free
Cyberstalking can be termed as the execution of the internet and its associated components to harass or stalk a person or certain groups. The components might embrace instant messaging (IM) and Internet Protocols (IPs) among others. The practice of cyberstalking can be regarded as one of the critical aspects.
Preview sample
Network Security Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised.
Preview sample
Business Intelligence Dashboards in a Learning Organization Information Technology Research Proposal
7 pages (1750 words) , Download 3 , Research Proposal
Free
The author states that dashboards help determine if an organization is currently falling short of, meeting or exceeding the key performance indicators which drive the business towards success. Dashboards must have a simple, clear and usable presentation. Their design must be flexible enough to adapt to the evolving nature of a learning organization.
Preview sample
Advanced Information Systems Management Information Technology Essay
7 pages (1750 words) , Download 3 , Essay
Free
Ku (2010, p. 1085) explains that advancement in information and communication technology has led to increased adoption and implementation of information systems within business organizations, institutions, public agencies, companies and small businesses. The implementation of information system is basically motivated by the efficiency and effectiveness which is provides in the management of data and information and the enhancement of communication processes (Khodakarami and Chan, 2011, p.
Preview sample
Web Mining and Social Multimedia Information Technology Research Paper
7 pages (1750 words) , Download 2 , Research Paper
Free
Web Mining and Social Multimedia. Web mining is the use of data mining techniques to extract data from web documents. Data mining allows for analysis of data in order to make rational decision based on the data report collected. When such data is being analyzed based on the web documents, especially with a wide spread of social multimedia, the information gathered can benefit research institutions, businesses and economy overall.
Preview sample
Usability testing and implementation Information Technology Essay
2 pages (500 words) , Download 2 , Essay
Free
His popularity can be estimated from the highly respectable comments various renowned magazines have passed on him and his work as mentioned in the website. In the end, the site has provided his complete address and contact information that facilitates readers in accessing Dr. Jakob Nielsen.
Preview sample
Google Unveils App for Paying with Phone Information Technology Personal Statement
2 pages (500 words) , Download 5 , Personal Statement
Free
The author states that as the technology engaged by Google suggests, it would be safer carrying your money in mobile phones, than carrying your plastic cards. “Mobile Wallet” as called by Google is an app for the Android phones, which when waved at retailer’s terminals, would let the payment through avoiding the usage of a credit card.
Preview sample
Telecommunications companies' risks Information Technology Essay
3 pages (750 words) , Download 2 , Essay
White Paper (Risks). With increased digitization, telecommunications companies are becoming global and do business across borders. There customer is demanding integrated solutions for data communications, voice and multimedia. Competition is intense, and hence the need to minimize risks and bring down costs.
Preview sample
Business case for the new IT system at SUH Information Technology Case Study
3 pages (750 words) , Download 3 , Case Study
Free
The availability of such information is essential in facilitating useful operational decisions for the lager enterprise profitability. This proposal recommends the adoption of Information Technology system that will centralize product sales as well as create a customer relationship management network at SUH.
Preview sample
Cultural Homogenization and the Internet Information Technology Essay
4 pages (1216 words) , Download 2 , Essay
Free
We can notice certain cases when one has products from a specific country but manufactured in another part of the world and transported through a third country. This just shows how our world has gone GLOCAL! This term is a combination of both globalization and local ideas. It corresponds to the combination of the local economies with the global one 
Preview sample
A Technical Proposal for Equipment and Software Information Technology Report
8 pages (2124 words) , Download 2 , Report
Free
With daily worldwide changing of the global technology the requirements analysis, definition and management become crucial, prior to acquisition. Hardware and software specification, as well as the effective implementation in the architectural field, has a tremendous impact on the eventual results in this field.
Preview sample
Abstract Data Structures Information Technology Essay
4 pages (1000 words) , Download 3 , Essay
Free
ABSTRACT DATA STRUCTURES Introduction A data type is acknowledged as an abstract data type when it is expressed in terms of processes on it, and its implementation is concealed (with the intention that it can be replaced with another application such as effectiveness purposes, as well as this will not change anything in the existing computer program).
Preview sample
A Report on Quantum Computing Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Additionally, the quantum theory refers to the performance and environment of material and energy on the quantum, both at the atomic and subatomic level. It is an admitted fact that the quantum computing is not a new idea as it was first emerged in the 1970s.
Preview sample
The Internet: Change for the Better Information Technology Essay
4 pages (1293 words) , Download 2 , Essay
Free
The Internet is indisputably one of the greatest transformational inventions in the history of mankind. It permeates every aspect of life. It is such an integral part of daily routine that it is difficult to conceive of a time when barriers of time and space limited communication. It is an invention that serves as a combined medium for broadcasting, information dissemination and interaction, without regard to geographical barriers.
Preview sample
Aspectual Evaluation of IS in Use Information Technology Report
7 pages (2031 words) , Download 2 , Report
Free
In the beginning, I will start with the introduction of the discussion of several elements. Time is always a limiting factor and therefore looking for information on how basketball goes on on the internet can be time-consuming and thus it is easy when using this champion basketball flash since it is only by a single click and all information is displayed.
Preview sample
Telecommuting, aka Tele-working Information Technology Research Paper
10 pages (2694 words) , Download 5 , Research Paper
Free
In American workplaces, telecommuting has accomplished a significant attention. Telecommuting is demarcated as a substitute method of finishing tasks and at the same time providing a range of benefits to the organizations, companions, societies and the environment.
Preview sample
Software System in Different Cultural Environment Information Technology Research Paper
16 pages (4340 words) , Download 2 , Research Paper
Free
Regarding the issue of importance that customers from different cultural environments attach to each of the listed requirements of the software system, the researcher can conclude that Europe and Asia attach much importance to the listed requirements as against America and Africa. However, the American level of importance could be explained as being more proactive than that which exists in Africa.
Preview sample
Human Computer Interface Information Technology Essay
4 pages (1390 words) , Download 2 , Essay
Free
 Generally, sensor-based human-computer interactions can be listed in chronological order of technology advancement as follows; Pen-Based Interaction, mouse & keyboard, joysticks, motion tracking sensors & digitizers, haptic sensors, pressure sensors, and taste/smell sensors (Mehrotra & Deore, 2012).
Preview sample
Data Mining and Behavior of Customers Information Technology Essay
4 pages (1282 words) , Download 4 , Essay
Free
The use of predictive analytics helps in the determination of a predictive score for the elements associated with the organization. The major organizational element, in this case, is the customers. The predictive scores inform the business about the most probable action by the customer. The production of predictive scores occurs when the subject organization designs a predictive model.
Preview sample
Green IT Strategies and Applications Information Technology Essay
4 pages (1172 words) , Download 2 , Essay
Free
The author has taken a very balanced approach to the implementation of green IT technologies in today’s corporate world. The green technologies and improvements needed in the IT sector like cloud computing, power management, paperless environment and data center optimization are very much related to positivity in cost efficiency but they are still not being implemented by the top corporations in the world.
Preview sample
Mobile Cybersecurity Information Technology Literature review
14 pages (3886 words) , Download 4 , Literature review
Free
With the advent of the third generation and now even fourth-generation a whole new realm of opportunities has opened. To top that cloud-computing has served as an icing to the cake. There is now a whole new and refined market place for mobile devices and their data-sharing. There are different kinds of threats that a user of these devices face.
Preview sample
Ethical Predicaments Information Technology Essay
6 pages (1677 words) , Download 2 , Essay
Free
The effectiveness and speediness related to the electronic information technology systems that consist of limited and international networks, databases, and processing programs for information technology. These systems also force consumers to tackle new rights and responsibilities to use the data and re-evaluate principles of advent computers.        
Preview sample
Secure Internal Network and Entrepreneurshipp Information Technology Essay
5 pages (1361 words) , Download 3 , Essay
Free
Managers from Alstom, a French engineering firm that manufactured and designed the French high-speed train used the concept to map out the important technologies of the train and their independence. This is to allow them to identify which train to release to a strategic client with respect to a technology transfer project.
Preview sample
Information Technology and Human Resource Information Technology Research Paper
4 pages (1255 words) , Download 3 , Research Paper
Free
The rapid development in technology has made the world become so competitive that companies across the world are trying hard to get over each other by being distinctive in their respective field. Today, technology has both positive and negative impacts on different disciplines across the world including society, schools, and organizations.
Preview sample
Oman Toward Delivery of Effective Mobile Government Information Technology Dissertation
55 pages (10105 words) , Download 2 , Dissertation
The scope and purpose of the research have been presented in the first chapter along with stating the aims, objectives, and questions. The literature review revealed the fact that mobile government has been emerging as the latest trend in the majority of developing nations and Oman has been no more an exception. With some social, cultural, and political issues, the level of awareness has been a bit low.
Preview sample
The Project Charter and Business Case Document Information Technology Assignment
14 pages (3768 words) , Download 3 , Assignment
Free
The computers used in the development room should be strong enough to support the development process. During the development period, a bandwidth of between 50 to 100 Mbps will be availed in the development room. Enterprise and DMZ firewalls will be used to block the employees in the company from accessing the data in the development room.
Preview sample
Prototyping Article Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
BPM is a standard framework used in developing information systems (IS). There are four stages involved in the BPM process and these are create components, implement processes, assess results, and model processes. The first stage involves the assessment of existing business models or work processes, studying the business requirements and adjusting the models to achieve pre-defined business goals and objectives.
Preview sample
The Role of the Chief Information Officer Information Technology Research Paper
3 pages (1034 words) , Download 2 , Research Paper
Free
The CIO was time and again defined as the corporate savior to support the business and technology globally (CIOs aren't CIOs for long - Computerworld). In the field of information technology, the CIOs were defined as a new variety that includes businessmen, managers, and technologists as information system managers in any organization.
Preview sample
9601 - 9650 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us