StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Should spam emails be banned Information Technology Essay
3 pages (750 words) , Download 2 , Essay
As the world of technology is expanding it brings along with it many other problems which were previously unheard of. One of the problems associated with internet and computers these days is of spam. Emails are sent on the internet which does not have a specific meaning or is sent for advertising purposes.
Preview sample
Network Security and the Demilitarized Zone Information Technology Coursework
4 pages (1000 words) , Download 2 , Coursework
Free
According to the research findings, it can, therefore, be said that the functionality of DMZ is similar to a proxy server, as the workstations configured in DMZ interact with the public networks. Furthermore, the most significant advantage of a DMZ is that it protects the local area network domains by segregating the network layer.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Advantages and disadvantages of social networking sites Information Technology Term Paper
4 pages (1000 words) , Download 4 , Term Paper
Free
Since the beginning, social networking sites (SNSs) such as Facebook, MySpace, Bebo, Cyworld, LinkedIn and others have fascinated millions of users, a number of whom have incorporated these networking sites into their every day life.
Preview sample
Database and Enterprise Application Security Information Technology Essay
7 pages (1750 words) , Download 3 , Essay
Free
The author claims that information security remains an extremely significant concern throughout system development life cycle. It is as imperative as the delivery of the overall system development according to the functional requirement. The operating system, the system architecture can be designed and integrated with security included features.
Preview sample
Firewall and Internet Security Information Technology Research Proposal
9 pages (2250 words) , Download 3 , Research Proposal
Free
The reason behind the choice of the research question has been articulated along with an explanation behind the selection of the objectives. Based on the research question, the current literature was reviewed to identify the results of the recent research and to understand the concepts better before proceeding with the research.
Preview sample
Software lability Information Technology Essay
2 pages (500 words) , Download 3 , Essay
Free
Advocates for software quality have argued that companies need to follow a development framework in software development.. In safeguarding software liability, companies manufacturing computers need to detail people to whom they market their software to.
Preview sample
Cloud Computing Information Technology Research Proposal
12 pages (3000 words) , Download 7 , Research Proposal
Free
The author states that ‘Cloud Computing’ matches a perception of an imaginary cloud that illustrates the Internet or most likely a corporate network environment that is represented by a cloud. The imaginary Internet cloud of a corporate network environment is trustworthy for data transportation. It is incorporated with advanced cloud generalization.
Preview sample
Laptop issuance to sales persons and return on investment Information Technology Research Paper
10 pages (2500 words) , Download 2 , Research Paper
Free
After all, business use of computers dates back to about 50 years ago. Could it really be possible that man has outgrown the need for the good old computer? However, what Atrostic and Nguyen (2006) actually meant was that the manner in which businesses use IT does matter.
Preview sample
Legal Issues in Online Business: A Case of Chocs Away Ltd Information Technology Essay
7 pages (1750 words) , Download 2 , Essay
Free
This research will begin with the statement that in this era of information technology, the implementation of web-based tools and technologies has facilitated a lot of small and medium-sized businesses to reduce their work-burden and compete with other large size companies. Additionally, the advantages of conducting business activities online are countless.
Preview sample
Combining Anomaly and Signature based Intrusion Detection Systems Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
To sum up, many studies and researches have been conducted to overcome issues related to the detection techniques, still, there were loopholes for threats and vulnerabilities to sneak in. Bayesian Algorithm with KDD99 was implemented for anomaly-based IDS and integrated multi-layer signature-based intrusion detection system using mobile agents were implemented.
Preview sample
The Malware Writers and Hackers Information Technology Article
5 pages (1250 words) , Download 3 , Article
Free
With the evolution in complexity, scale and span of computer technology it would be naive to expect that time has stood still for the hacker or malware content writer of the last century. It is a vast tract of technology and systems security that have gasped to keep pace with the enterprise and ingenuity of the present day cyber criminal.
Preview sample
The Employees Performance of Their Duties in Macrobox Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
Macro box alleged that it not only suffered actual damages but also damages on its customer goodwill due to several DNS attacks launched by activist groups to compel them to cease and desist from providing software services. According to Macro box, the actual perpetrators cannot be determined although a blogger has been traced.
Preview sample
Cyber Crime as opposed to Cyber warfare Information Technology Research Paper
11 pages (2750 words) , Download 2 , Research Paper
Free
The world has become a global village after rapid developments and advancements in information and communication technology, media resources, transportation, and networking. The interaction and coordination among people has improved tremendously in last 3 decades after the advent of internet and use of desktop PCs and laptop notebooks.  
Preview sample
Small Business Management Information Technology Scholarship Essay
8 pages (2200 words) , Download 2 , Scholarship Essay
Free
Despite the notion that starting up an entity is tedious people should know that with proper planning, endurance as well as passion, actual businesses can be set up. (ehow.com, 2011) This is going to be a study about the topic of small businesses in New Zealand and more specifically, there will be a comprehensive answer to be provided to the study question, “Which are the merits and demerits of setting up a small business in New Zealand?
Preview sample
Are cell phones really dangerous to people Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
Cell phones are part of this phenomenon as expanded in countries worldwide. However, the use of cell phones as a tool of communication has been extensively criticized. In fact, the above devices have been considered as being a threat for health – especially if used for a long term.
Preview sample
Electron Microscopy Information Technology Coursework
4 pages (750 words) , Download 3 , Coursework
Free
This essay analyzes that spherical aberration also occurs in the Electron Microscopes when electrons passing through the side of the lens are refracted greater than those passing along the axis.2 (Lam, 2009); while Diffractive aberrations are brought about by the deviations from geometrical optics caused by the wave nature of light.
Preview sample
Airline computer application Information Technology Essay
7 pages (1750 words) , Download 2 , Essay
Free
The computer application on reservation parameter has travelled a long way from its first introduction in the year 1950.Down the years with latest developments,modern technology implementation and change in laws the reservation system has also changed.
Preview sample
Infrastructures Of The Information Technology And Systems Information Technology Research Paper
8 pages (2000 words) , Download 3 , Research Paper
Free
Entering into the realm of Strategic Business Information Technology was never an easy decision because strategic studies in any field are supposed to be involved but when you study Information Technology in business perspective it requires expertise and mastery of both domains; the business and the Information Technology.
Preview sample
Criteria used in order to evaluate the suitability of web-based language learning Information Technology Essay
12 pages (3000 words) , Download 2 , Essay
Free
This phenomenon has also influenced second language teaching and learning. Therefore, in many aspects, technology, especially in language teaching, is developing continuously with many researchers claiming its value
Preview sample
Evaluation of Routing Protocols Information Technology Essay
8 pages (2000 words) , Download 3 , Essay
Free
In this scenario, we have a travel agency named as ECC. The company has different branches in different countries. A solution is designed to connect these offices with appropriate topology design, adequate routing protocols and bandwidth carrier that will save bandwidth cost.
Preview sample
Facebook as a gateway to marketing activities Information Technology Essay
3 pages (750 words) , Download 2 , Essay
This website is known to provide more than just entertainment because it is also used to disseminate information to each of the member of the site.In today’s world’s activities where information can become so confusing at some point or very helpful in a way,people may no longer have the time to determine how they are bombarded with diverse idea everyday.
Preview sample
Public-key cryptography and information security Information Technology Essay
2 pages (500 words) , Download 5 , Essay
Free
In this scenario, the public key part is used for encryption entirely at the receiver side, whose private key part is applied for decryption. However, in order to make this communication safe it is necessary to make sure that only the intended receiver is able to access the private part of the key.
Preview sample
The impact of technology on history and development Information Technology Coursework
2 pages (500 words) , Download 2 , Coursework
Free
One of these areas, which have seen the largest development in the field of education, has been through the use of mobile devices and the Internet (Beale, 2005). In my life, it has allowed me a great amount of flexibility in doing my assignments.
Preview sample
Techno-Sociological Needs of the Nation Information Technology Essay
8 pages (2131 words) , Download 2 , Essay
Free
ICT technology is evolving rapidly and the world has become a global village where voice communication and the transfer of data take place in the wink of an eye. Analog technologies have been replaced with more efficient digital signals and data storage. ICT networks are now relying more on packet switching instead of analog-based circuit switching.
Preview sample
Critique-Does the Internet strengthens Social Connections Information Technology Essay
3 pages (750 words) , Download 4 , Essay
[Professor’s Name] [Writer’s Name] [Course Title] [Date] Critique-Does the Internet strengthens Social Connections Internet is a network of networks growing at an exponential rate day by day. As with any invention, good and bad are associated with internet .A point blank statement that “Internet strengthens Social Connections “is debatable and does not appeal one’s mind.
Preview sample
Web 2.0 Security Information Technology Research Paper
10 pages (2500 words) , Download 3 , Research Paper
Free
Additionally,the web sites which encompass the features of Web 2.0 offer its users the free option to work together or cooperate with each other in the community media discussion as designers of user-produced information material in a virtual society
Preview sample
Use of IT in the Construction Industry Information Technology Research Paper
12 pages (3000 words) , Download 3 , Research Paper
Free
The advent of Information Technology has brought with it many revolutionary changes in the way human activity is carried on. The lightning speed of Internet communication has made it possible to compress time span required for collection, aggregation, and transfer of data from one end of the world to any other end. 
Preview sample
Change Management of People and Technology in an ERP Implementation Information Technology Assignment
5 pages (1250 words) , Download 3 , Assignment
Free
From the chart, it is obvious that 3rd party modified off-the-shelf solution’ was the acquisition strategy adopted by PowerIT. Prior to the adoption of this strategy, the company had employed a material resource planning system so as to enhance its production process. Anyhow, the new ERP approach gave great emphasis on software development and application domain.
Preview sample
Mobile phone uses & gratification Information Technology Literature review
12 pages (3000 words) , Download 4 , Literature review
Free
The popularity of mobile phones, however, was attributed to wireless technology as telephone applications empower peoples from all walks of lives to use it anywhere and anytime (Bates et al., 2002).
Preview sample
Cross-Border Cyber Terrorism and Internet Crimes Information Technology Term Paper
5 pages (1250 words) , Download 2 , Term Paper
Free
 Studies show that most people focus on protecting themselves against viruses, and by installing anti-virus and/or anti-spyware software they feel they have covered their risks pretty well. Few know or attempt to educate themselves about do’s and don’ts related to using the net and continue to make blunders, including accessing accounts through email links.
Preview sample
Enterprise systems management : Software Development Laboratories Information Technology Book Report/Review
12 pages (3000 words) , Download 2 , Book Report/Review
Free
In 1977 SDL implemented first commercial version of RDBMS for CIA. The code name for the project was Oracle. The unique product that the company offered was increasingly recognized in the market and company changed its name to Oracle Systems Corporation to identify itself with its flagship product Oracle.
Preview sample
Online Application Ning - the Platform Allowing Users to Create and Close Their Own Social Network Information Technology Coursework
5 pages (1250 words) , Download 2 , Coursework
Free
Many studies have analyzed the effects of social networking in various aspects of society. In these regards, everything from education to corporate environments and interpersonal communication has been analyzed within qualitative and quantitative frameworks in an effort to articulate the rapid progression of social networking technological advances.
Preview sample
Meaning of Web 2-0 Common Phrase Information Technology Essay
3 pages (973 words) , Download 2 , Essay
Free
Web 2.0 is one of the most common phrases that are used quite frequently in the current environment. But are all familiar with the actual meaning of it? Okay in simple words it is the improved version of the internet that allows people to also participate in the matter rather than just be a viewer. Now people have the opportunity to get information from a number of sources and also share information among groups of people.
Preview sample
Pedophilia and Credit Card Fraud in the Internet Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
With a click of the mouse, pedophiles can gain access to a massive number of social networking sites where young children frequent on-line. To counter this menace, law enforcing agencies have adopted various sting operations to catch perpetrators in flagrante.
Preview sample
Racial Cultural perceptions of Registered Nurses Information Technology Dissertation
9 pages (2449 words) , Download 2 , Dissertation
Free
Methods for the evaluation of PPD were found to be: asking general questions or identifying risk factors during the postpartum office visit; telephonic questioning when patients called to inquire about any queries, concerns, or symptoms that they have; as a part of the documentation for the admissions database during the admission for delivery and during chart review or as a part of the routine history during the obstetric visits.
Preview sample
Password Cracking Systems Information Technology Research Paper
20 pages (5000 words) , Download 2 , Research Paper
Free
Password cracking is a way of trying to access or crack passwords in an attempt to enter into a computer system or a communication network. Crackers usually make use of a range of scripts, tools or cracking software to break a communication system password. The prime objective is to perfectly get the password of server or other system.
Preview sample
Essential Components of a Wireless Security Policy, the Difference of Wireless and Wired LAN Security Policy Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
The policy governing wireless communication in a local area network is different in that sense. Wireless devices that can attach to a network are mobile or can be taken out of the premises of the organization while devices that are wired to the Local Area Network of the organization cannot be taken out of the office without arousing any suspicion.
Preview sample
Internet and World Wide Web Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
The World Wide Web is based on the principle of universal readership according to which if information is available to a single individual it will be available to all.Internet and World Wide Web are two terms that are often used by many individuals interchangeably but in reality,the fact is that the two words though in similar use are not synonymous
Preview sample
Literature Review on Personalized Web Improvement Information Technology Literature review
6 pages (1500 words) , Download 3 , Literature review
Free
Users need personalized web portals and services because they allow users to get the information they need quickly. Many users need to constantly pop online to check only a few things: A favorite news site, an e-mail account, Twitter and Facebook, for example. Opening four tabs in a browser to do that is absurd.
Preview sample
Strategic Positioning Information Technology Essay
3 pages (750 words) , Download 6 , Essay
Strategic Essay. Table of Contents Table of Contents 2 1.0 Central Arguments of This View ‘Strategic Positioning’ 3 2.0 Criticisms 4 3.0 Arguments of Michael Porter for ‘Strategy and the Internet’ 5 References 6 Bibliography 7 1.0 Central Arguments of This View ‘Strategic Positioning’ Strategic positioning has become extremely important in the competitive environment of today.
Preview sample
What is security Why network security is important Information Technology Coursework
9 pages (2250 words) , Download 3 , Coursework
Free
In the context of network security definition, it consists of concerns related to network communication privacy, confidentiality of data over the network, accessing unauthorized classified data, access to prohibited network domains and utilizing Internet for concealed communication (Network Security.
Preview sample
Importamce of the eticks for the IT professionals Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
IT professionals are known to be involved in different activities like development, analysis, design, implementation and maintenance pertaining to computer applications and hardware, as well as data mining and data warehousing techniques.
Preview sample
Structural Change in the Telecommunications Industry Information Technology Assignment
1 pages (323 words) , Download 3 , Assignment
Free
As clearly averred by Szmania, “the emergence of alternative providers and the wholesale introduction of new services have given customers increased choices and flexibility to meet their long-distance needs”. The change occurred due to the erosion of barriers in monopolies in telecommunications networks.
Preview sample
Apple Inc - Companys Vision and Strategy Information Technology Case Study
2 pages (557 words) , Download 6 , Case Study
Free
Apple Inc. (Apple Computer) was founded in 1976 by Steven Wozniak and Steven Jobs. The first product of the company was a mass-produced personal computer Apple I. Today the mission statement of the firm points out that “Apple designs Macs, the best personal computers in the world, along with OS X, iLife, iWork, and professional software” (Apple Inc., 2011).
Preview sample
Understanding product purchase behavior and use Information Technology Assignment
2 pages (500 words) , Download 2 , Assignment
Free
I reached the Super Electronics market in the evening, and it was quite occupied at this time. There were few brand specific shops while some others had all renowned modals and brands of laptops.
Preview sample
Web security authentication and authorization Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Moreover, as soon as 401 response headers receive by the web browser, it asks the user to specify username and password in order to authenticate the user. Similarly, the server will check the credentials in the safe list, if they are available; the resource is made available to the user.
Preview sample
Security Solutions for MANETs (mobile ad-hoc networks) including the development of IDS Information Technology Research Paper
16 pages (4000 words) , Download 4 , Research Paper
Free
In mobile or computer networks the privacy and security have turned out to be prime concerns in an attempt to offer secured transmissions among portable terminals in a threatening framework.
Preview sample
The Performance of Navi-Sailor 3000 Electronic Chart Display and Information System Information Technology Assignment
11 pages (2750 words) , Download 3 , Assignment
Free
Electronic charts are navigational tools which serve the purpose of maritime navigation safety. These real-time navigation systems increase the efficiency of maritime navigation. From two types of electronic charts, Electronic Chart Display and Information System and Electronic Chart System, ECDIS is a state-of-the-art electronic chart.
Preview sample
Internet and the Issues It Gave Birth to Information Technology Assignment
5 pages (1250 words) , Download 2 , Assignment
Free
This assignment will begin with the statement that the Internet is undoubtedly the biggest leap in communication technology in human history. The fruits of internet beggar description and do not require elaboration as everyone- both young and old- is making use of these advantages in their everyday lives.
Preview sample
Advantages and disadvantages of having hackers or other systems intruders as your IT security guardians Information Technology Essay
4 pages (1000 words) , Download 3 , Essay
Free
Despite the fact that there are some benefits of engaging a hacker as a member of corporation’s information technology staff since a corporation that upholds a corporate website and domestic network is capable to take advantage of the experiences built by the hacker.
Preview sample
9701 - 9750 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us