Internet Censorship in the Peoples Republic of China
Internet Censorship in the Peoples Republic of China Information Technology Research Paper
68 pages (17000 words) , Research Paper
Nobody downloaded yet
This discussion outlines that on mainland China, Chinese citizens, for the most part, have expressed skepticism about the authenticity of online content in general and largely agree that the internet should be monitored and controlled and that the control should come from the government. The government’s control in China is natural to the people of China.
Preview essay
Information Security Practice In The Company Activity
Information Security Practice In The Company Activity Information Technology Dissertation
60 pages (15000 words) , Dissertation
Nobody downloaded yet
Advanced protection measures are mandatory. Organizations should have the capability to inspect traffic passing through open ports and inform the security administrators about any suspected malicious traffic. Therefore, a more sophisticated way of combating these attacks must be implemented, and intruder profiling is one of this method.
Preview essay
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Influence Of Smartphones On Teenagers
Influence Of Smartphones On Teenagers Information Technology Research Paper
7 pages (1750 words) , Research Paper
Nobody downloaded yet
The principle objective of this study is to determine the impact that texting or posting, as well as verbal communication through phone, has on the conduct of the students in the classroom. There is a possibility that the major observation will be the significant difference in the test scores among the students.
Preview essay
Sky High Airlines Safety Program
Sky High Airlines Safety Program Information Technology Essay
15 pages (3750 words) , Essay
Nobody downloaded yet
The accomplishment of a safe and secure system is the main concern in the aviation industry. However, safety actions are not only driven by facts and statistics but also by the perception of safety needs by the public. Acceptable safety risk is associated with the trust attributed to the aviation safety system 
Preview essay
Fundamentals of Information and Information Systems
Fundamentals of Information and Information Systems Information Technology Case Study
15 pages (3750 words) , Case Study
Nobody downloaded yet
As the paper declares, the concept behind e-services is there’s a particular task, asset, or capability that you want to gain access to, that now can be made available to you over the Net, because it’s now being created as an Internet service. In 1999 alone through the efforts of the ESS Information System, HP has achieved the status as a leading manufacturer of computer products.
Preview essay
Modern Trends In Communication And Media Technologies
Modern Trends In Communication And Media Technologies Information Technology Term Paper
15 pages (3750 words) , Term Paper
Nobody downloaded yet
AT&T should not only work hard to improve its network quality but they should also assure their customers that the network shall provide excellent services than those experienced recently. Current customer survey placed the company last in terms of customer satisfaction when compared to major telecommunication competitors in the United States.
Preview essay
Major Components of Information Management
Major Components of Information Management Information Technology Research Paper
7 pages (1750 words) , Research Paper
Nobody downloaded yet
This paper tells that for an effective control of information technology, an organization needs to carry out information technology governance. This is where the organization focuses on the use of information technology systems to manage their risks and enhance the performance. It is fundamental to focus on the use of information technology to enhance the quality of care.
Preview essay
Some Novels in Consumer Electronics and Software
Some Novels in Consumer Electronics and Software Information Technology Article
14 pages (3500 words) , Article
Nobody downloaded yet
The simultaneous launch of the two Android phones HTC One (M8) and Samsung Galaxy S5 has created quite a buzz as these are touted to be the most powerful at present. Each has its own special features with both phones supporting quad-core Qualcomm Snapdragon 801 processors which provides faster 4G LTE access, Wi-fi access, and image. processing.
Preview essay
Are Cell Phones Dangerous
Are Cell Phones Dangerous Information Technology Research Paper
8 pages (2000 words) , Research Paper
Nobody downloaded yet
Cell phones operate at low power, usually below 1 Watt, by transmitting and receiving electromagnetic radiation that lies in the Radiofrequency (RF) range of the electromagnetic spectrum. Scientific Research proves that Radiation which in scientific terms is called “ionization” can be moderately absorbed by the brain tissue.
Preview essay
Current and Future Use of Internet Technologies
Current and Future Use of Internet Technologies Information Technology Case Study
10 pages (2500 words) , Case Study
Nobody downloaded yet
Both small and large enterprises have welcomed the internet as a real tool in business approaches and a major channel for business growth. This addition of information and communications technology (ICT) in trade has transformed trade between companies and as well as those with other companies and their customers. 
Preview essay
The Challenges of Decision Making in an Environment of High Speed and Complexity
The Challenges of Decision Making in an Environment of High Speed and Complexity Information Technology Term Paper
10 pages (2500 words) , Term Paper
Nobody downloaded yet
As the paper highlights, the competitive advantages of the e-economy have encouraged several companies both - public and private - to move from the traditional system of doing business into the e-business. This part of the economy has exploited the availability of information technology to do business and is more important in decision-making.
Preview essay
The Effectiveness of Video Modelling
The Effectiveness of Video Modelling Information Technology Research Paper
8 pages (2000 words) , Research Paper
Nobody downloaded yet
The proposal provides a brief literature review and evaluates the limitations of the current research. An overview of available studies in the context of video modeling use for children with autism is provided. The proposal includes a brief review of methodology and discusses possible limitations and bias. The list of references is provided.
Preview essay
Activity on Node Network Diagram
Activity on Node Network Diagram Information Technology Essay
14 pages (3500 words) , Essay
Nobody downloaded yet
The author explains that the critical path is identified as B-E-F-G with duration of 55 days. The indicative timeframe is 12 weeks (60 days) which suggests flexibility with the project duration. A Gantt chart is developed to correspond to the logic diagram. The project constraints can be overcome with the leveled histogram.
Preview essay
Problems of the Communication Technologies
Problems of the Communication Technologies Information Technology Term Paper
11 pages (2750 words) , Term Paper
Nobody downloaded yet
The use of wireless communications systems is prone to possible mistakes that could cause a company much more than what they expect. These security risks include “break-ins, Wi-Fi sniffing snafus and incidents where Bluetooth sniper rifles were used to steal company secrets”. The first of the six is “unauthorized smartphones on wi-fi networks.”
Preview essay
User Satisfaction and Its Implications to CPOE Implementation: Community Hospitals in Westchester, New York
User Satisfaction and Its Implications to CPOE Implementation: Community Hospitals in Westchester, New York Information Technology Thesis Proposal
24 pages (6000 words) , Thesis Proposal
Nobody downloaded yet
Two articles published in the Journal of the American Medical Association serve to illustrate this debate? The first article, “Role Of Computerized Physician Order Entry Systems In Facilitating Medication Errors” (Koppel et al., 2005) highlighted that CPOEs actually facilitated as many as 22 types of medical errors instead of enhancing patient safety.
Preview essay
Jacob Walsh - Lead Software Developer
Jacob Walsh - Lead Software Developer Information Technology Resume/CV
1 pages (250 words) , Download 0 , Resume/CV
Free
Possess major experience in solving complex UI/UX problems through debugging, user testing, and market analysis. Able to plan and carry out front-end innovation projects, design future concepts and facilitate idea generation and concept development. Thrive in a fast-paced, collaborative and dynamic environment. Hope that a stellar track record of work combined with analytical skills and detail-oriented approach to every task is suitable for [Company Name]
Preview essay
Software Engineering and Human Computer Interaction
Software Engineering and Human Computer Interaction Information Technology Dissertation
10 pages (2500 words) , Dissertation
Nobody downloaded yet
The author states that human-computer interaction is the investigation on how end users interact with computers and/or gadgets, including problems that may take place and whether the use is simple and/or efficient. In Human-computer-interaction we want to reduce the number of issues related to the usability.
Preview essay
E-Government in Saudi Arabia
E-Government in Saudi Arabia Information Technology Research Paper
10 pages (2500 words) , Research Paper
Nobody downloaded yet
Governments the world over are working on implementing E-Government. These efforts do not only focus on the area of digitalization in itself, but also on the reorganization of civic services based on new ICT. The term ICT is understood mainly as internet technologies and applications based on the internet but also comprise network technologies.
Preview essay
Security, Risk, and Compliance
Security, Risk, and Compliance Information Technology Research Paper
8 pages (2000 words) , Research Paper
Nobody downloaded yet
The conclusion from this study states that network breaches are serious problems that can lead to a lot of headaches and heartaches not just for the organization itself, but for the people whose information is stored by the organization's network.  Their data can be compromised by any attack, and this can open up the organization to serious liability.
Preview essay
Book Listing Website using PHP, MySql and HTML
Book Listing Website using PHP, MySql and HTML Information Technology Literature review
8 pages (2000 words) , Download 1 , Literature review
According to the paper, human-computer interaction is a discipline concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. HCI in general terms can be inferred as a mix of a discipline belonging to the field of engineering.
Preview essay
Digital Telecommunications and Networks
Digital Telecommunications and Networks Information Technology Assignment
8 pages (2000 words) , Assignment
Nobody downloaded yet
The report has focused on the advantages and disadvantages of the Static Routing and Dynamic Routing. Finally, the report has explained the criterions for selecting the specific routing protocol. Hubs are a network device which uses to connect one or more computers. It passes the data packet to the destination through broadcasting the packet.
Preview essay
Organisational Information System at Business Wear Ltd
Organisational Information System at Business Wear Ltd Information Technology Research Paper
17 pages (4250 words) , Research Paper
Nobody downloaded yet
The conclusion from this paper states that the Internet and business information system has turned out to be the major part of every business and organization. The needs and implementations of business information technology in the business are growing more rapidly and offering better reorganization in the global business markets.
Preview essay
Computer Hacking
Computer Hacking Information Technology Dissertation
14 pages (3500 words) , Dissertation
Nobody downloaded yet
The author states that a number of ill-informed individuals have related the term of ‘hacking’ with the practices of cybercrime that has resulted in misunderstandings regarding the domain of hacking that plays a vital role in maximizing security in the computing field, and thus, this paper will involve efforts to argue over the importance of hacking.
Preview essay
What Is Telecommunication
What Is Telecommunication Information Technology Article
7 pages (1750 words) , Article
Nobody downloaded yet
As the study declares, the competition itself is the biggest challenge when seen from another perspective since there are so many service providers who already are settled in the market. It has come down to every penny spent by the end user. Every one of them is providing the same facilities and packages.
Preview essay
Network Architecture and Security Considerations in IISC
Network Architecture and Security Considerations in IISC Information Technology Term Paper
15 pages (3750 words) , Term Paper
Nobody downloaded yet
The cost of designing network architecture and security consideration is normally done against the aforementioned factors that it aims to minimize. Identity Internet Solutions Company acknowledges that fact that its ability secure its IT from malicious networks is anchored on the strength of its network architecture and security considerations.
Preview essay
FAA and the Implementation of En Route Automation Modernization
FAA and the Implementation of En Route Automation Modernization Information Technology Research Paper
34 pages (8500 words) , Research Paper
Nobody downloaded yet
The main purpose of this program is to processes the in-flight route changes and route request in a faster way. There have been and would continue to be noticeable implications and challenges in regards to this implementation. This paper focuses on the current FAA progress-to-date in the development and implementation of ERAM.
Preview essay
Digital Communication System
Digital Communication System Information Technology Assignment
10 pages (2500 words) , Assignment
Nobody downloaded yet
According to the paper, a digital communication system essentially needs less power as compared with the analog system. It is faster and has several advantages in terms of providing a better signal to noise ratio over the same bandwidth. Along with the evolution of human species has evolved its comfort tools such as clothing, transportation.
Preview essay
Planning Skills in Graphic Design
Planning Skills in Graphic Design Information Technology Personal Statement
17 pages (4250 words) , Personal Statement
Nobody downloaded yet
The author states that such planning allows him to enhance or change his projects where required. He is a hard and disciplined worker and believes in himself. He is also a team player and works well with others. For example last year, four of them freelancers worked on a website.
Preview essay
Analysis of IT Personnel Management
Analysis of IT Personnel Management Information Technology Research Paper
18 pages (4500 words) , Research Paper
Nobody downloaded yet
Information technology in a broader sense is referred to as the use of hardware and software store, retrieve and manipulate information. Servers, operating systems, databases etc come under information technology. Information technology is being used by businesses since almost 5 decades and has evolved drastically with the passage of time.
Preview essay
Web 2.0 Security
Web 2.0 Security Information Technology Research Paper
7 pages (1750 words) , Research Paper
Nobody downloaded yet
The author states that additionally, the websites which encompass the features of Web 2.0 offer its users the free option to work together or cooperate with each other in the community media discussion as designers of user-produced information material in a virtual society, as compared to those websites where clients are restricted.
Preview essay
Cyber Criminals and Other Data Security Dangers
Cyber Criminals and Other Data Security Dangers Information Technology Term Paper
16 pages (4000 words) , Term Paper
Nobody downloaded yet
There are numerous cases where IT managers have failed to provide or define adequate security for an enterprise-wide infrastructure of an organization. Likewise, they emphasize more or external security threats rather than internal vulnerabilities. As per Gartner, 70% of security incident occur internally i.e. from the organization premises.
Preview essay
History of Phishing and Development
History of Phishing and Development Information Technology Research Paper
20 pages (5000 words) , Research Paper
Nobody downloaded yet
The author states that Phishing is an emerging problem regarding online data security and information safety. There are several cases of the identity theft and online frauds using phishing and other hacking techniques, but this paper will concentrate mainly on the positive aspects of the phishing like that its use for the website verification.
Preview essay
Impact of Technology on Organizational Performance
Impact of Technology on Organizational Performance Information Technology Research Proposal
12 pages (3000 words) , Research Proposal
Nobody downloaded yet
The paper will incorporate all core as well as enabling technologies and will evaluate them from the perspectives of organizational structure, behavior, and relationships. This will also take into account the diverse functional roles within a typical organization ranging from finance, technology, human resources to customer satisfaction.
Preview essay
Requirements and Software Systems for Different Levels of Management
Requirements and Software Systems for Different Levels of Management Information Technology Assignment
7 pages (1750 words) , Assignment
Nobody downloaded yet
It is evidently clear from the discussion that every business unit in an organization has their own first line managers, who are responsible for managing the workforce.  These managers are not exposed to a lot of information but nevertheless have to use some software systems in the extremely automated work environments.
Preview essay
IPhone - Mobile Phone, iPod, and Internet Device
IPhone - Mobile Phone, iPod, and Internet Device Information Technology Assignment
11 pages (2750 words) , Assignment
Nobody downloaded yet
Apple is known the seller of high-end computer products such as Macintosh computers, iPod, the new iPad and the best- selling iPhone. The company made a big difference by introducing the PC in the electronics industry at the start of the 20th century. It first introduced the line of Macintosh in 1984 which is a well- known computer model.
Preview essay
Websites of Three Airlines Companies
Websites of Three Airlines Companies Information Technology Assignment
8 pages (2000 words) , Assignment
Nobody downloaded yet
This paper will review the websites of three airlines companies in relation to the way they managed their information with their web portals. By comparing the websites of Emirates Airways, Qatar Airways, and Singapore Airlines, this paper will discuss information managing practices employed by these companies with the help of their websites.
Preview essay
Private Internet Usage in the Workplace and Privacy
Private Internet Usage in the Workplace and Privacy Information Technology Research Paper
16 pages (4000 words) , Research Paper
Nobody downloaded yet
The author states that organizations have found it necessary to regulate internet usage in the workplace, especially with the emergence of many social networking sites. Telstra is one such organization that formulated an organizational policy aimed at enhancing best practice while engaging in social networking.
Preview essay
The Impact of Computer-Mediated Communication
The Impact of Computer-Mediated Communication Information Technology Research Paper
20 pages (5000 words) , Research Paper
Nobody downloaded yet
The author states that changes are taking place in every aspect of our life because of the immense improvements in technology and scientific advancements. Technological development has attained an all-time peak at present and it is developing further and further and we cannot even imagine how it is going to shape the future of the world.
Preview essay
Virus Detection Software
Virus Detection Software Information Technology Research Paper
12 pages (3000 words) , Research Paper
Nobody downloaded yet
In definition, viruses refer to specific programs that people deliberately make, to get in the way of system documentation and functionality, therefore, doing away with important information stored in the system for different uses. Virus detection software plays a critical role in enhancing the safety of computer systems.
Preview essay
Electronic Medical Records
Electronic Medical Records Information Technology Term Paper
12 pages (3000 words) , Term Paper
Nobody downloaded yet
The particular brand to be studied in the paper is the so-called Epic Electronic Health Records. That particular technology integrates various functionalities into one useable tool that any healthcare practitioners can use with ease. They do not need to worry about the ways on how to use it because it comes with instructions 
Preview essay
Development, Applications, and Future Trends of Telematics Systems
Development, Applications, and Future Trends of Telematics Systems Information Technology Assignment
18 pages (4500 words) , Assignment
Nobody downloaded yet
The effective use of the right system can help in significant improvements in the fleet security, productivity, and efficiency; this can help to reduce fleet mileage, operational costs and the fuel consumption. The improved efficiency can lead to an increase in profitability. The modern telematics is more complex and sophisticated.
Preview essay
Client-Server Communications Technology
Client-Server Communications Technology Information Technology Research Paper
7 pages (1750 words) , Research Paper
Nobody downloaded yet
With the emergence of technology we need more data communication and data transfer to survive in the fast technology age. For this purpose we need a network that can deliver better, fast and secure data transfer. The main aim of this research is to analyze the connection and connectionless client-server structure and communication protocols.
Preview essay
Active Directory - a Contemporary Network Management Techniques
Active Directory - a Contemporary Network Management Techniques Information Technology Research Paper
5 pages (1250 words) , Research Paper
Nobody downloaded yet
Active Directory employing a similar database, for the exercise of main MS Windows settings, Active Directory as well permits network administrators to allocate deploy software, policies, as well as implement important updates to an association. AD supplies data and information as well as settings in a fundamental database.
Preview essay
Abu-Dhabi City Using GIS Techniques
Abu-Dhabi City Using GIS Techniques Information Technology Essay
8 pages (2000 words) , Essay
Nobody downloaded yet
The main purpose of this paper is to focus on how the GIS technology can help in crime analysis and thereby fighting crime in Abu Dhabi by the police. The analysis involves the use of satellite images and other valuable data from independent and UAE based sources to perform hotspot analysis to identify trouble spots.
Preview essay
Future of Quantum Computing
Future of Quantum Computing Information Technology Research Paper
11 pages (2750 words) , Research Paper
Nobody downloaded yet
Up-to-date QC based technicalities facilitates a system built on these ideologies, a supposed quantum computer system, to carry out jobs that are at present considered not possible to carry out resourcefully on a usual computer, in the same way as infringement present encryption principles (Yahoo News, 2009).
Preview essay
Managing Performance in Turbulent Times
Managing Performance in Turbulent Times Information Technology Research Paper
4 pages (1000 words) , Research Paper
Nobody downloaded yet
In 1998, when Google entered the markets, it was hardly known by anyone. At that time, popular brands like Yahoo, Excite, Hotmail and Netscape dominated the market. These companies had the reputation of being the pioneers in the internet and e-business. However, in today's world, Google has beaten all these brands.
Preview essay
Direct Digital Synthesis
Direct Digital Synthesis Information Technology Research Paper
6 pages (1500 words) , Research Paper
Nobody downloaded yet
The paper aims to investigate what the components of a DDS system are and the interactions of those components; the different component parameters that engineers can select and tweak; and how those parameters impact the overall performance of the DDS systems in general. The name suggests the nature of its function.
Preview essay
Information Systems and Processing Controls
Information Systems and Processing Controls Information Technology Assignment
6 pages (1500 words) , Assignment
Nobody downloaded yet
Computer-assisted audits have increased speed because manually most time is spent on routine calculations. On the contrary, a computer program quickly runs through the financial statements and compiles the data and figures. It also reduces the cost of hiring as the cost of obtaining a computer auditing software is cheaper compared to hiring of an auditor. 
Preview essay
Software security engineering: Merging IT and Daimler Chrysler
Software security engineering: Merging IT and Daimler Chrysler Information Technology Case Study
2 pages (500 words) , Case Study
Nobody downloaded yet
This research will begin with the statement thatthe Daimler and Chrysler's merger was viewed as a land business move in the auto industry that would greatly cut costs and create economies of scale in the premium auto industry. However, as a result of the two companies agreeing to join their operations, some key issue emerged after the merger.
Preview essay
Managing Information and Technology in Samsung Electronics
Managing Information and Technology in Samsung Electronics Information Technology Case Study
12 pages (3000 words) , Case Study
Nobody downloaded yet
The author states that information systems strategic role includes utilization of information technology in developing services, products, and capabilities which offer a company considerable advantage beyond the competitive forces the company faces within the international marketplace.
Preview essay
51 - 100 results of 6585 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you samples on subject Information Technology for FREE!

Contact Us