StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Operating Systems and Networking Information Technology Case Study
5 pages (1502 words) , Download 2 , Case Study
Free
Today IT and all internet-based Information Systems have become very significant in promoting and expanding business operations. The use of information technology helps different forms of businesses improve the effectiveness and efficiency of business practices, managerial operations, decision making, and workgroup collaboration.
Preview sample
Online Intranet Performance Tracker Information Technology Dissertation
16 pages (4388 words) , Download 2 , Dissertation
Free
The last ten years or so have experienced a radical growth in the utilization of the IMPRO systems, but the community has lived oblivious to what the resource contributes as well as creates such as the mobile works. Mobile works represent a platform via which business can be conducted without necessarily installing an information system to the operations thereof included.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Cyber Terrorism as a Combination of Cyberspace and Terrorism Information Technology Literature review
10 pages (2733 words) , Download 3 , Literature review
Free
Collin and defined by the technolytic institute as The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives.
Preview sample
Personal Security Audit Information Technology Research Paper
11 pages (3287 words) , Download 2 , Research Paper
Free
In my audit, the following relevant information was collard and gathered: (1) identifying and examining if my identity is safe; (2) the reasons why I need to protect myself from identity theft; and (3) how I could protect myself using very basis guide basics against potentially exposing myself for incidents of identity theft ((Identity Theft Protection (IDPST), 2012).
Preview sample
The CIO'S In Public Service Sector And Private Service Sector Information Technology Assignment
9 pages (2250 words) , Download 2 , Assignment
Free
The Chief information Officer’s role in the public service sector has become more dominant since they have relied on the government for information and technology management, service delivery to the public as well as meeting the demands of the technological world.
Preview sample
Internetworking IpV6 vs IpV4: Compare and Contrast Information Technology Research Paper
17 pages (4250 words) , Download 3 , Research Paper
Free
A new version of the internetworking protocol, IPv6, was designed to address the service and scalability shortcomings of the previous version, IPv4. Unfortunately, machines and systems designed to one protocol cannot directly communicate with another machine designed to the other protocol due to the incompatibility between the two protocols.
Preview sample
Emerging Technologies Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
It is an admitted fact that computer technology has affected many parts of our life by playing a vital role. In addition, these advancements of information technology have made it essential for business organizations to make effective use of this technology with the intention of surviving in this ever-increasing competitive world.
Preview sample
Ten Steps to Get a Complete and Running Home Network Information Technology Speech or Presentation
7 pages (1804 words) , Download 2 , Speech or Presentation
Free
Here I describe the 3 most common techniques that are used to share a broadband internet connection with multiple computers. The first option is sharing a broadband connection using Microsoft Internet Connection Sharing which is suitable for home users with low budgets, the second is sharing a broadband connection using a dedicated broadband router.
Preview sample
USB device encryption. Types of USB flash drives Information Technology Essay
3 pages (750 words) , Download 3 , Essay
USB device encryption. Types of USB flash drives The USB flash drives are removable and rewritable. Types of USB flash drives. According to EHow, there is a variety of flash drives that are available for different kinds of use. They include corsair flash padlock, lexar jumpdrive secure II, Kingston data traveler secure, Imation pivot plus, scandisk cruzer professional, corsair survivor GT and ironkey secure flash drive.
Preview sample
Metodology for the Research Information Technology Term Paper
6 pages (1750 words) , Download 5 , Term Paper
Free
Therefore, this research is explanatory in nature, and involves analysis of information to establish relationships between shareholders and their rights. Through the analysis of data on shareholder behavior for the three study environments, and analysis of the legal ramifications at their disposal, the research will draw comparisons for the two countries to make arrive at a definite conclusion to the research.
Preview sample
Implementation of the Email Protocol Information Technology Term Paper
12 pages (3044 words) , Download 2 , Term Paper
Free
Information and data integrity and identity of people transferring data should never be compromised. Privacy and confidentiality which are key ingredients to protecting the parties to an electronic message can be assured best by implementing the right email protocol.
Preview sample
Innovation and Enterprise Information Technology Business Plan
10 pages (2611 words) , Download 11 , Business Plan
Free
The ability of any businessperson to identify and make the most t of a business opportunity makes the individual a business entrepreneur. It is a skill that is learnt from education as well as experience. Innovation on the other hand means creation of ideas that may lead to monetary benefits.
Preview sample
Virtual Team success Information Technology Term Paper
12 pages (3000 words) , Download 5 , Term Paper
Free
In an attempt to support project management globalization and compete in this ever-increasing competitive world, organizations are more and more building and implementing virtual teams
Preview sample
Information System Theories Information Technology Coursework
16 pages (4580 words) , Download 3 , Coursework
Free
Being a discipline that is focused on people and machines and, the fact that it incorporates researchers from other fields, Information systems can be said to be a multidisciplinary field. The idea of developing applications for other fields has led to the adoption of theories from such fields. It has become necessary to incorporate these theories.
Preview sample
Cloud Security and Privacy Issues Information Technology Research Paper
9 pages (2250 words) , Download 4 , Research Paper
Free
Cloud Security and Privacy Issues Cloud computing is basically a computer science term that implies using the internet and servers in order to maintain and secure data and its applications. The technology of cloud computing allows consumers and business owners admission to all types of applications and their personal documents over the internet.This occurs without them installing any files at a computer with internet access.
Preview sample
Voice over Internet Protocol Security Vulnerability and Risk Analysis Information Technology Literature review
4 pages (1000 words) , Download 2 , Literature review
Free
The journey of communication has undergone number of steps and over period of time all those means have offered more compared to their predecessors. The late 20th century was seen as the time period where rapid development took place in the world of telecommunications.
Preview sample
Migrating Servers to Virtual Machines Information Technology Research Proposal
15 pages (3905 words) , Download 4 , Research Proposal
Free
Previously, data management and storage required tapes and files to keep. However, due to advancement of complexity in managing organizations, more data storage is required as well as its incorporation and easy access. This has led to the use of data management tools to ensure information is flowing in all directions.
Preview sample
Delivery of effective mobile government: The case of Oman Information Technology Coursework
10 pages (2500 words) , Download 2 , Coursework
Free
The information and communications technology (ICT) industry is gradually developing Oman’s technology infrastructure and adopted a vehicle called the information technology authority in 2006. OmanTEL and Narwas were formed to administer the m-government services.
Preview sample
E-Governance in Angola Information Technology Dissertation
37 pages (9719 words) , Download 3 , Dissertation
Information and communication technology (ICT) is a vital subsector playing pivotal roles in socio-economic and political development in the world. This sphere of influence is evident in the rapid expansion of ICT, which is gradually shaping the world to new economic magnitudes. Currently, the majority of the countries in the third world are anxious to change their system of governance for the better in various ways.
Preview sample
Network Security Tools Comparison Information Technology Case Study
9 pages (2728 words) , Download 3 , Case Study
Free
After comparatively analysing GFI LANguard and DragonSoft Vulnerability Management (DVM), it is clear that each has its advantages and disadvantages. For instance, GFI Languard is superior while considering criteria 1 and 2. In this case, the superiority comes from the frequent updates on the vulnerabilities database and its easy setup in scan multiple hosts.
Preview sample
Network Systems and Technology Information Technology Term Paper
12 pages (3270 words) , Download 2 , Term Paper
Free
The network server can be a domain controller, firewall, or Windows NT server. The requirement of the network server will emphasize on the requirements of the network. A large Network containing network nodes more than 50 may require a domain controller for the administration and configuration of user accounts and permissions.
Preview sample
Data Privacy and Security Information Technology Research Paper
12 pages (3320 words) , Download 2 , Research Paper
Free
The key way of ensuring the security of data and information on transit is making sure that the laid network devices are protected from any vulnerable attack like theft since a breakdown in the physical network setup weakness gives an opportunity to attackers. Ensuring that the intellectual property is secured is a significant factor.
Preview sample
Network Protocol Analysis Information Technology Essay
19 pages (5264 words) , Download 2 , Essay
Free
It caused a considerable transformation in the understanding, thoughts and ways of thinking of the people. It is an admitted fact that computer technology has affected many parts of our life by playing a vital role. Business organizations are adopting modern and innovative tools and technologies to survive in this ever-increasing competitive world.
Preview sample
Comparing Two Penetration Testing Methodologies. Penetration Testing versus Vulnerability Assessment Information Technology Dissertation
19 pages (4750 words) , Download 5 , Dissertation
Free
Penetration Testing, which is commonly termed to as PenTest, refers to a process that is normally followed during the auditing or assessment of hardcore security. This methodology consists of a set of practices, rules, methods and procedures which are normally followed and later implemented in the process of auditing programs on any information security in an operating system environment.
Preview sample
Delivery of Effective E-Government Services. The case of Oman Information Technology Coursework
10 pages (2500 words) , Download 2 , Coursework
Free
The client is the Information Technology Authority (ITA) who is engaged in implementing the national information technology infrastructure by undertaking projects and ensuring close supervision with regard to the execution of the digital Oman strategy (e-Oman) thus enabling sound leadership and direction for other e-governance ideas of the sultanate of Oman.
Preview sample
Toward Delivery of Effective Mobile Government Information Technology Literature review
11 pages (3004 words) , Download 3 , Literature review
Free
The implementation process still has a lot of challenges that still need to be perfected. This includes attaining the level where everybody is mobile phone literate and coming with alternatives that will safeguard each person’s culture. For perfect execution, the government needs to correlate with its citizens as well as all its stakeholders.  
Preview sample
Cloud Computing as a Value Driven Technology Information Technology Report
14 pages (3855 words) , Download 3 , Report
Free
Likewise, risk factors are also being considered, as the risk, mentioned in the underpinning contract is now owned by a third party i.e. cloud computing vendors. Martin Sandler, who is a director of HP systems security Lab says, “People often think of virtualization as adding to security problems, but it is fundamentally the answer to a lot of those problems,” (Anthes 2010).In a nutshell, cloud computing delivers major advantages along with negative consequences as well.
Preview sample
Virtual Machine Ware Project Information Technology Research Proposal
19 pages (4786 words) , Download 3 , Research Proposal
Free
This allows sharing of one physical server with many others and in a way provides the imagination that each client has its own linked server. Many operations like web hosting and e-mail management among others. Visualization is undoubtedly embraced as a way of minimizing costs through ISP clients sharing web hosting expenses which reduces the costs considerably by more than 70%.
Preview sample
Reliability of a Hypervisor Information Technology Capstone Project
42 pages (10434 words) , Download 2 , Capstone Project
In IT, infrastructure, virtualization can be illustrated from a technical or economical point of view. Virtualization is, therefore, the abstraction of a physical computing surrounding using created virtual resources to generate a logical simulated surrounding can be looked upon as an instance of a technical description.
Preview sample
Potential Security Threats and Challenges for Hybrid Cloud Solution Information Technology Coursework
13 pages (3705 words) , Download 4 , Coursework
Free
Internet activists seek to influence the policies of governments or corporations across the globe. Internet activists use a variety of information that can assist them to use the internet effectively for their cause. Some internet activist just like hackers tends to disrupt normal online operations of the target organization, in addition to blocking online access to targeted facilities.
Preview sample
Cyber/digital Attacks Information Technology Literature review
12 pages (3295 words) , Download 3 , Literature review
Free
The different types of attack that are detriment to cyber security are Keylogging and spyware Description The first digital attack is keylogging and spyware. This is a malware that is built to illegally obtain, track and block the right of a user to get access to the system.
Preview sample
Developing an Interactive Secure Website Information Technology Essay
22 pages (5500 words) , Download 2 , Essay
Developing an Interactive Secure Website Abstract This project report depicts the possible applications of IT in the social setting. The photo sharing website information system is an application that encompasses the conveyance of information in regards to the possible socialization techniques of the community.
Preview sample
Testing Analog and Mixed Signal Circuits With Built In Hardware Information Technology Research Paper
20 pages (5000 words) , Download 2 , Research Paper
Free
System-on-chips (SOCs) with built-in hardware and analog mixed-signal embedded-core-based are intended to be tested with the help of this paper. In this article the method used for testing the components of analog mixed-signal circuit is oscillation-based built-in self-test (OBIST).
Preview sample
National Identification System in the United States Information Technology Essay
23 pages (5750 words) , Download 2 , Essay
The issue of having National Identity Cards has been a subject of debate for quite some time in the United States. Those in favor state that having national identity cards will improve national security as it will protect the Americans from terrorists, and likewise discourage illegal immigrants from entering the country.
Preview sample
Information Security Risk Assessment Framework Information Technology Annotated Bibliography
15 pages (3750 words) , Download 12 , Annotated Bibliography
Free
The framework should provide operational information and oversight in all sectors in IT security in relation to risk management framework. A clearly defined reporting and escalation thresholds are then incorporated by the framework. Mechanisms responsible for report coding must consider risk and control dimensions.
Preview sample
Online flower ordering system Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
Company Vision and Mission Our vision is to become the leading florist in the locality. We seek to be the most sought after company amongst the local people for delivering flowers reliably. We value the satisfaction of our customers and aim at being part of their memorable moments in life.
Preview sample
Arabic learning tools. Kingdom of Education web based platform development. Project evaluation Information Technology Essay
17 pages (4250 words) , Download 2 , Essay
Free
At the present, use of the Internet has become very common among people. They make use of this innovative technology to communicate with friends and relatives, for shopping, entertainment and so on. In this scenario, the Internet distributes information and data using web sites.
Preview sample
Smart Meters Privacy Concerns & Solutions Information Technology Dissertation
14 pages (3899 words) , Download 2 , Dissertation
Free
The dissertation will be studying the issues surrounding the recent release and distribution of Smart Meters, the threats to privacy, and the exposure of Sensitive Personal Data. The Smart Meter will be placed against the backdrop of two conflicting scenarios, one promoting and encouraging its usage due to increased consumer convenience and awareness of electricity usage.
Preview sample
PHP Benefits vs. ASP.net Information Technology Dissertation
32 pages (8080 words) , Download 2 , Dissertation
To ensure that both languages are not discriminated basing a specific weakness, various properties are analyzed before a conclusion is drawn. The various factors that influence the performance of the two languages and the outcome will show the exclusive strength of the two languages in terms of the performance.
Preview sample
Enterprise Resource Planning Analysis Information Technology Essay
12 pages (3198 words) , Download 2 , Essay
Free
ERP aims to make the business processes more efficient and effective so that the overall yield of the business can be increased, along with reducing the errors incurred during business dealings (Logan, 2007). The traditional business setup is concerned with various functions, or departments, in large-scale organizations.
Preview sample
Optical Fiber and WLAN Information Technology Essay
12 pages (3000 words) , Download 4 , Essay
Free
Wireless Ethernet networks were accepted several years ago, as traditional connectivity solutions were replaced by robust wireless connectivity solutions. Although, several industrial protocols utilized standardized Ethernet physical layer that facilitated automation protocols to be transmitted via wireless media Commercial off the Shelf (COTS) (Brandt, Piggin 2006).
Preview sample
Online Payments Assurance and Security Information Technology Term Paper
24 pages (6000 words) , Download 3 , Term Paper
Online payments have been gaining greater impetus in the recent years. Along with this fact, it has also been observed that e-commerce is also rapidly gaining huge popularity. Although the traditional modes of payments such as cash and cheque are still in use, however the modern methods of payments has become more well-liked.
Preview sample
Computer Security from the Attack Information Technology Case Study
5 pages (1324 words) , Download 2 , Case Study
Free
He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran Tromer, 2008).
Preview sample
Cyber Bullying in Schools Information Technology Term Paper
12 pages (3000 words) , Download 5 , Term Paper
Free
The paper looks at the various methods that are used in perpetrating cyber bullying, including emails and social media sites. The study also looks at the various stakeholders who can act in order to create and implement legislation and school programs that will help in diminution or extinction of cyber bullying; these include governments and the school administrations.
Preview sample
Network Security Threats and Their Solutions Information Technology Literature review
11 pages (3023 words) , Download 2 , Literature review
Free
Traditionally, communication was highly based on sending and receiving letters among other primitive methods, such as smoke signals, horn blowing, as well as communication through the word of mouth. These channels were time consuming and, on top of that, they were subject to distortion.
Preview sample
Internet banking applications Information Technology Research Paper
9 pages (2250 words) , Download 2 , Research Paper
Free
The researcher develops the following research questions that need to be answered to affirm the findings: How actually these internet banking applications work? Are these applications really worth it? How these internet banking applications have evolved over the period of time and what extra features are now available in these applications?
Preview sample
Practical Storage Management Information Technology Research Paper
13 pages (3250 words) , Download 2 , Research Paper
Free
This research tells that practical storage management is all about assessing the online storage system and ensuring that all the entire process of storing data, information in documents, folders and files are well protected and reliable. The process of practical data storage is very complex and involves a lot of activities and operations such as data organization, device concept, data management and tools among others.
Preview sample
The effects of retail channel integration through the use of information technologies on Firm performance Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
It is evident that firms that have been vertically integrated through information technology are bound to experience low uncertainty regarding its flow of production. This is due to the strong structure of the association. However, it faces issues with flexibility on the side of production given the involvement of many units that are affected due to modifications effected to comply with technology.
Preview sample
Technology acceptance model (TAM) Information Technology Article
16 pages (4000 words) , Download 5 , Article
Free
According to the research findings Technology Acceptance Model (TAM) was a great deal easier to utilize, simpler and much more powerful model for determining and forecasting users’ acceptance of computer technology as compared to other models. An organization must study this model before introducing a new technology or system to their staff members.
Preview sample
The Impact of Information Technology on Photojournalism Information Technology Essay
14 pages (3500 words) , Download 3 , Essay
Free
Information Technology influences the results of photojournalism’s outputs. The research focuses on the essence of information technology on photojournalism. The research includes the importance of photo journalism on both the makers and the viewers of the journalism photos.
Preview sample
9951 - 10000 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us