StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Delivery of Effective E-Government Systems: The Case of Oman Information Technology Case Study
13 pages (3552 words) , Download 2 , Case Study
Free
As an absolute monarchy, there is always the danger of being accused of not serving the interest of the greater majority, because there is the perpetuation of a ruler in power who controls the great resources of Oman. Although there has been stability and years of ongoing growth in the country, compared to developed countries, the literacy of Omanis is low at 81.4%, according to the CIA.
Preview sample
MySQL Security Practices Information Technology Assignment
12 pages (3196 words) , Download 2 , Assignment
Free
A use who can be newly created can log into the MySQL server, but by default has zero privileges to perform anything once connected. The next task upon the creation of a new user account is to add privileges to that account. Hence, before even altering a user’s privileges, it can be useful to observe what privileges might be set.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Heuristic Evaluation and Cognitive Walkthrough Information Technology Assignment
8 pages (2158 words) , Download 2 , Assignment
Free
The inappropriate text used on the links (Plan Your Visit) leads to users’ confusion. User clicks the link having the assumption that he could plan his visit through this link. However, this link shows only the map of the park. The information uploaded to this website is poorly structured as almost the same things are being shown by different links.
Preview sample
Microsoft Windows 7 Information Technology Literature review
16 pages (4244 words) , Download 2 , Literature review
Free
Unlike the previous Windows Vista, which introduced a range of innovative features, Windows 7 was developed to meet more customized needs and to make an incremental upgradation to the Windows platform. The development of this new Windows operating system assisted Microsoft to gain competitive advantages over its competitors.
Preview sample
Avoiding System Development Pitfalls in the IT Decision-Making Processes Information Technology Dissertation
16 pages (4592 words) , Download 2 , Dissertation
Free
Managers and developers must work together, ensuring the completed product meets user needs. How can this concept be accomplished and user needs to be addressed? How managers and consumers utilize this technology has always been a questionable issue. This researches’ methodology is based on qualitative and interpretive characteristics.
Preview sample
Mobile Computing and Social Networks Information Technology Coursework
11 pages (3023 words) , Download 2 , Coursework
Free
The popularity of these applications led businesses to ponder whether some of their business process applications that run on desktop platforms and the Web could be redesigned to run on mobile devices. The response was undoubtedly positive. As it is known that Nationwide developed the Nationwide® Mobile, a free iPhone App that allows its insurance policyholders to file a claim on the spot when an accident occurs.
Preview sample
Preventing Online Sexual Predators and Online Child Crimes Information Technology Term Paper
26 pages (6672 words) , Download 2 , Term Paper
It is a matter of growing concern that online child predators are everywhere spread in different corners of the world on the lookout for unsuspecting and uninitiated teenagers, minors, and even children in some cases. A child may log in to a music forum and at the same moment may risk coming in contact with a child predator waiting for his prey.
Preview sample
Evolution of video gaming and computer networking Information Technology Research Paper
11 pages (2750 words) , Download 3 , Research Paper
Free
Surprisingly, video gaming did not attain a mainstream popularity until sometimes in between 1970s and 1980s when game consoles, home computer games, and arcade video became available to the public. This paper will seek to provide a basic analysis of evolution of video gaming and computer networking.
Preview sample
Amazon Utilizes a Unique Method in Delivering Books to Consumers, This Network Is Called Whispernet Information Technology Research Paper
12 pages (3000 words) , Download 4 , Research Paper
Free
Amazon is considered as one of the biggest internet retailers internationally. Based in Washington, United States, the business of Amazon is expanded in Canada, United Kingdom, Italy and Japan among other nations. “Amazon.com” website was first launched in the year 1995, and presently is known as one of the popular websites in e-commerce (Environmental Investigation Agency, “Amazon.com’s Unpalatable Profits”).
Preview sample
Delivery of Effective E-Government Systems: The Case of Oman Information Technology Literature review
14 pages (3883 words) , Download 2 , Literature review
Free
Governments from around the world have sought to establish e-government systems for various reasons such as efficiency and accountability. Whereas the industrialized nations have achieved much in implementing e-government systems, countries such as Omani have faced challenges despite making significant efforts.
Preview sample
Authentication Methods and Techniques Information Technology Research Paper
10 pages (2834 words) , Download 5 , Research Paper
Free
Introduction Authentication is one of the vital steps involved in providing access control (Tipton & Nozaki, 2011). Authentication is the process through which a system verifies whether a person is actually who he/she claims to be. Throughout the course of history, humans have been using some means of authentication in their day to day dealings.
Preview sample
Website Migration Project Information Technology Term Paper
10 pages (2500 words) , Download 2 , Term Paper
Free
Website Migration Project. While creating a Web Architecture it is very important to idealize the visitor’s interests, needs and expectations. The combination of Text, Visual design, navigation, and organization should be up to the mark which will allow the users to find the key information and finish their critical tasks with ease and in the desired time.
Preview sample
Delivery of Effective E-Government Systems: The Case of Oman Information Technology Dissertation
53 pages (9864 words) , Download 3 , Dissertation
Elected representatives in the Majlis Ashura, decide on important matters that impinge on the future of Oman, and it makes sense for these representatives to remain connected to the electorate of Oman. A review of relevant literature presents pertinent themes from around the world, and semi-structured interviews probe the aspirations of the people and the need to decide about how best to implement e-democracy for Oman.
Preview sample
Oman Toward Delivery of Effective Mobile Government Information Technology Dissertation
55 pages (10105 words) , Download 2 , Dissertation
The scope and purpose of the research have been presented in the first chapter along with stating the aims, objectives, and questions. The literature review revealed the fact that mobile government has been emerging as the latest trend in the majority of developing nations and Oman has been no more an exception. With some social, cultural, and political issues, the level of awareness has been a bit low.
Preview sample
Data Wharehousing: OLAP Information Technology Report
12 pages (3372 words) , Download 2 , Report
Free
This acronym, or rather the whole term as a concept has been controversial for a while, being given diverse definitions and meanings. It can be viewed in the business intelligence concept, relating to marketing, different management aspects, project planning and management, financial issues, reporting and lastly data mining (Becker, 2002) OLAP as a tool not only facilitates retrieval of data, but also helps in making a detailed analysis of the retrieved data.
Preview sample
Factors that Medium-Sized Companies Need to Think Introducing ERP System Information Technology Research Paper
32 pages (8625 words) , Download 3 , Research Paper
These business software suits have become so important in today’s business environment that without them an organization cannot identify its deficiencies that are crippling its progress. But these systems are not a complete “No Brainer”, because they are extremely complex and very expensive.
Preview sample
The Use of IT Strategies with Business Goals Information Technology Assignment
13 pages (3653 words) , Download 4 , Assignment
Free
IT governance means specifying the decision rights and the decision making mechanics to enhance the desired behavior in the use of IT. Dell can enhance its operations and performance by replacing ITIL with Cobit. The report has highlighted the underlying issues and benefits associated with the incorporation of Cobit governance frameworks.
Preview sample
Knowledge Management. Chunnel Project FTA Final Information Technology Research Paper
13 pages (3250 words) , Download 2 , Research Paper
Free
Knowledge management can be recognized as a collection of methods that seeks to alter an organization’s present framework of knowledge processing to improve the work method of the organization along with its outcome.
Preview sample
How can we safeguard against the cybercrime Information Technology Essay
3 pages (750 words) , Download 4 , Essay
Free
White collar crime is something that has elicited debate and mixed reactions from across the globe with many companies such as Enron and WorldCom going down as a result of it. Cybercrime is also part of white collar crime and is seen as the most sophisticated type of crime in the 21st century.
Preview sample
Is Internet Anonymity a Myth or a Reality Information Technology Thesis
104 pages (10358 words) , Download 4 , Thesis
As the internet is used for online speech, forums, shopping, financial transactions, blogs, relay chats, and conferencing maintaining the anonymity of the user becomes essential. Apart from the primitive anonymity tools, the common anonymity tools include latency networks and multi-proxy aggregate services. 
Preview sample
Anatomy of an Internet Routing Protocol Information Technology Coursework
13 pages (3250 words) , Download 3 , Coursework
Free
The conclusion from this study states that for redesigning the computer network for 'Engima Media Resources', we have conducted class B subnetting that will address more than five hundred hosts. The subnetting scheme will also address future considerations for the company as well as provide additional space for adding more hosts than expected.
Preview sample
A Study on Online Child Crime and its Solution Information Technology Dissertation
10 pages (3035 words) , Download 2 , Dissertation
Free
The Internet has brought a sea change in the way we communicate, collaborate, or spend our leisure time. This revolution has brought many positive effects, like the ease of business, affordable communication, easy access to data, and all staying connected with people across continents and boundaries. The rise of the internet and digital systems supporting it has redefined communication and has given the term “connectivity” a whole new meaning. 
Preview sample
Analysis of IT Services in Business Information Technology Essay
12 pages (3000 words) , Download 2 , Essay
Free
This report caters the method of dealing with those situation used by different leaders at Terra Firma. An analysis of IT services at Terra Firma and the way they have contributed in the success or failure of some tasks. Overtime development of IT at Terra Firma and problems created by these developments are a part of this paper.
Preview sample
Network Design in SLC Corp Information Technology Essay
4 pages (1207 words) , Download 2 , Essay
Free
Generally, the essay discusses the business network designed to be implemented for SLC Corp., small storage and logistic company based in Surrey. The company headquarters, referred to as SLC-HQ, is located in Surrey, while at present there are three warehouses at different locations in Greater London.
Preview sample
Cloud Computing and E-Learning Systems Information Technology Report
1 pages (308 words) , Download 3 , Report
Free
The present education scenario demands a highly methodical and organized approach towards academic processes and education goals. In the age of excessive information and unthinkable diversification, it has become increasingly important over the years to have information that matters and which is relevant for the end consumer.
Preview sample
Social Networking and its Dynamics Information Technology Research Paper
10 pages (2823 words) , Download 2 , Research Paper
Free
The paper deals with a variety of issues within SNSs, which have created magnificent changes in the lives of people, all around the world. Some have been good changes, while others, such as privacy have been frowned upon. Contents Contents 3 I.Introduction 4 a)Definition of Social Network Sites 4 b)Features of SNSs 5 II.Evolving nature of SNSs 7 III.Effects of Social Networking 9 a)Fake representations 10 b) Networking 10 c) Privacy Issues 11 d) Social Capital 12 IV.Conclusion 12 Social Networking and its Dynamics I.
Preview sample
Network Security Policy Information Technology Case Study
9 pages (2401 words) , Download 4 , Case Study
Free
The information security policy will provide a potent shield against threats, mitigation of vulnerabilities, and resolution of the weaknesses while providing the framework for the build-up of its information technology infrastructure (Andress). The information security policy will also provide the strategic parameters and guiding principles of the operation of CMS that is geared towards securing information assets (Whitman and Mattord).
Preview sample
Computer Sciences and Information Technology Information Technology Research Paper
5 pages (1250 words) , Download 3 , Research Paper
Free
Clark French emphasized computer science is not the mirror image of information technology.  Computer science is a science that is based on information theory. Computer science focuses on creating new concepts around the implementation and design of computing systems. Computer science incorporates mathematical concepts of computation.
Preview sample
Bill of Material Information Technology Essay
5 pages (1477 words) , Download 2 , Essay
Free
Since LAN and Wi-Fi can connect members only under the roof and in a limited scope, for the entire organization and various entities and departments to be in touch and contact, there needs to be a centralized body and software which keeps every member and every department on board. Software establishment can also be useful.
Preview sample
Critical Reflection on the Modules Information Technology Personal Statement
11 pages (3009 words) , Download 4 , Personal Statement
Free
It presents a critical reflection of all the modules I undertook in my first academic year during both the first and the second semesters. It reflects on the lessons learnt from each of the modules and the personal objectives, aspirations, and goals both achieved and unachieved.It also reflects on the degree at which I feel that I have realised my expectations so far as well as the fears and expectations I have for levels 5, 6, and beyond. 
Preview sample
On-Line Analytical Processing Information Technology Assignment
3 pages (1063 words) , Download 2 , Assignment
The schema should have a product dimension, location, time and organizational dimension. To be able to design a good schema one must be able to have clear goals with which schemas should be combined and define the data source to be used. Facts table and dimension table are important in design schemas and analyzing data.
Preview sample
Automobile Breathalyzer Ignition Interlock System Information Technology Report
10 pages (2551 words) , Download 2 , Report
Free
The limit varies across states and countries depending on the laws governing the states on drugs and alcohol for example in California the limit is 0.08. It takes various inputs mostly the driver’s breath. If the blood alcohol content (BAC) of the driver is more than the defined value, the system locks the ignition disabling he vehicle from starting.
Preview sample
Security of Digital Signatures Information Technology Literature review
14 pages (3786 words) , Download 4 , Literature review
Free
Information security is an absolute essential for business and organizations. Organizations maintaining, storing processing customer data must comply with the laws and regulations of regulators in different regions. Likewise, information security has three fundamental dimensions i.e. Confidentiality, Integrity and Availability.
Preview sample
Appropriate IT Projects for Bechtold Corporation Information Technology Research Proposal
6 pages (1751 words) , Download 2 , Research Proposal
Free
The strategic responses which the company requires to implement in order to survive in the competitive business environment require that an Enterprise Resource Planning System (ERP) is laid within the company. Through the ERP system, the company will be able to achieve an enhanced coordination of its human resource management, financials, supplies, logistics and transport (Jeffery, 2006).
Preview sample
Design and Implementation of the Website Information Technology Assignment
16 pages (4000 words) , Download 3 , Assignment
Free
The website was augmented through the implementation of usability criteria that allowed an enhancement of the design elements. Usability was worked on during the design phase so that implementation could be better planned and coordinated. Essentially usability refers to the simplicity of use and the learnability of products created by human beings.
Preview sample
Metrics Estimation Analysis And Team Assignment Information Technology Essay
11 pages (2750 words) , Download 2 , Essay
Free
Metrics estimation analysis and team assignment Introduction In project management, project measures require careful identification, monitoring and evaluation. Inadequate measures often results in incomplete and substandard projects. Application of many measures results in project complexities and mismatched analyses.
Preview sample
Impact of E-commerce on Business Systems Information Technology Dissertation
26 pages (6500 words) , Download 3 , Dissertation
An e-business model is an approach taken by a company to earn revenues and maximize profits. Essentially an e-business model refers to a revenue-earning medium focused around the key elements of any business venture – market, customers, suppliers and resources.
Preview sample
The Evolutional View of the Types of Identity Thefts Information Technology Research Paper
4 pages (1000 words) , Download 3 , Research Paper
Free
The author stated that fraud refers to the act of taking advantage of others, largely motivated by economic reasons, via varied deceptive means. Intuitively, online fraud is said to refer to those conducted and/or facilitated using the Internet. Although identity theft is the inception of many fraudulent and criminal activities.
Preview sample
Enterprise Networking and Security Information Technology Report
12 pages (3226 words) , Download 2 , Report
Free
The logical security domain will cover technical controls such as the deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server, and VPN security as well. Secondly, internal and physical security will discuss human threats, physical access to server rooms and servers, sensors and sprinklers, etc.
Preview sample
Advances in Cryptology Information Technology Report
12 pages (3360 words) , Download 2 , Report
Free
Each and every communication protocol that exists usually has a given number of layers that define the security of the protocol. In order for the cryptography to provided, there is usually a need for different types of encryption algorithms which help by supporting the communication protocols as well as ensuring security in the network (Duams, 2005).
Preview sample
Cloud Computing Information Technology Literature review
6 pages (1793 words) , Download 4 , Literature review
Free
It is indeed one more milestone achieved by the field of Information Technology and has added to the modernization and advancements in the business organizations and service sectors. Cloud Computing The term Cloud Computing is utilized by IT professionals for delivering the computing and technology requirements as an IT service to a community comprising heterogeneous end recipients.
Preview sample
Future of Multimedia Information Technology Article
20 pages (5320 words) , Download 2 , Article
Free
The journey of advancements has been a slow one yet continuous and every period is represented by some progress. Starting with stone age where the only tool were stones that were used for safety and fulfilling other requirements of life, the journey continued till it reached the 19th century where industrialization took over the helm of affairs and brought about a total revolution in the manner in which elements operate.
Preview sample
Impact of Expert Systems on Industrial Growth Information Technology Essay
13 pages (3558 words) , Download 4 , Essay
Free
An expert system is believed to be an information system or decision support system but actually, it is different from these systems. As its name indicates, expert systems are used to perform specific tasks which involve the knowledge and skills of experts. This paper will discuss the role of expert systems in two different sectors.
Preview sample
Cloud Services Supporting Business Intelligence Information Technology Literature review
10 pages (2724 words) , Download 5 , Literature review
Free
The cloud computing technology presents a cost effective, efficient and quick computing platform on which BI technology rides to gain insight, reduce cost and enhance speed and quality of business decisions. These are the benefits which this paper seeks to elaborate drawing arguments from various sources.
Preview sample
Digital Evidence for Computer Forensics Information Technology Case Study
13 pages (3416 words) , Download 5 , Case Study
Free
The scenario whereby somebody view, posses or produce and distribute copies of obscene images is a very sensitive thing that is considered a crime. When pornographic materials are found in somebody’s computer, it is considered as a crime and is punishable by law.
Preview sample
Total Quality Management Information Technology Essay
10 pages (2830 words) , Download 3 , Essay
Free
T.Q.M can be split into three major parts, totality, quality, and management. Its scope covers all three important areas of an organization and management field. The term totality refers to the coverage scope for all the essential aspects of the organization. The totality factor demands participation and commitment from every personnel who is part of the organization.
Preview sample
Create a Video Environment for the Organization Information Technology Case Study
5 pages (1394 words) , Download 2 , Case Study
Free
The number of channels also needs to be increased. One circuit should be enhanced with IP based technology to have a maximum number of channels where communication can take place. Reducing the cost of running the company by ensuring that video conferencing can be set up in at least main branches of Rapid Freight will subjugate traveling allowances for meetings or wasting of time.
Preview sample
Impact of Secondary use of Data Information Technology Essay
12 pages (3000 words) , Download 3 , Essay
Free
We can employ a wide variety of data collection technique and tools to collect two types of data such as qualitative data (normally comprise words or text) and quantitative data (normally comprise numbers, statistics or financial). Though, quantitative data can be presented in tables or graphical form.
Preview sample
Intelligent E-mail Analysis Information Technology Literature review
13 pages (3452 words) , Download 2 , Literature review
Free
This was beyond doubt an impediment on the system as the system was bound to have some of the prevailing weaknesses. Some of the weaknesses were related to the characteristics of information. It was supposed to be relevant, information ought to have been timely, information was supposed to be accurate, and information was supposed to obey the virtue of time.(Finlayson, Ross S,79) All this was necessary to facilitate effective communication and passage of information at that appointed and designated time.
Preview sample
Infrastructure Management Information Technology Term Paper
11 pages (3178 words) , Download 3 , Term Paper
Free
In modern times information has greatly evolved in terms of its spread. With the appropriate information one manages to keep on the same platform with the rest of his or her counterparts. Economic, political and social struggle will be greatly influenced by information revolving around them.
Preview sample
9901 - 9950 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us