StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The trouble with Lichen. novel by John Wyndham and Short circuit movie review Information Technology Literature review
18 pages (4500 words) , Download 2 , Literature review
Free
“The trouble with Lichen.” by John Wyndham. The author of the novel takes a futuristic view into the next century and writes a book that has an interesting plot of a young biochemist that stumbles on a strain of Lichen that has the ability to prevent the process of ageing.
Preview sample
ABC Hospital Staff Allocation Information Technology Essay
32 pages (8000 words) , Download 2 , Essay
The aim of the paper is to develop an application that given a set of patient constraints will produce a hospital schedule that will try to satisfy the patient’s needs. Some of the needs a patient might require: - Patient only available at certain hours - Patient only available at certain days - Patient may need to attend hospital roomes at the same time with his brother or sister
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Computer Science and Information Technology in HR Department of an Organization Information Technology Research Paper
9 pages (2250 words) , Download 2 , Research Paper
Free
The discussion seeks to answer the question: How information technology and computer science function in HR department? How information technology and computer science help the easy identification and coordination of data? How it helps to improve the overall problem solving and communication skill of the HR department of an organization?
Preview sample
A Student and Faculty Web-portal Design Information Technology Research Proposal
5 pages (1269 words) , Download 4 , Research Proposal
Free
Students would also like to access their records from the same website. It would therefore be overloading if all these processes are done from one website. There is therefore a need to separate these two different processes. The purpose of this project then, is to come up with a web portal that will handle student access to their data records.
Preview sample
Transaction Security in E-commerce Information Technology Research Paper
10 pages (2500 words) , Download 3 , Research Paper
Free
This study has presented a detailed analysis of the security issues and threats that can take place while using the Internet for performing business transactions. This paper has discussed the ideas of various researchers along with suggestions that can help the businesses improve their e-commerce related capabilities.
Preview sample
Job description of ICTbusiness and systems analysts in organisations and different countries Information Technology Thesis
104 pages (26000 words) , Download 2 , Thesis
The basic motive of this project is to provide definitions and detailed description of functions of ICT business and systems analysts and to provide a distinction or difference between business and systems analyst with respect to function and role since these two significant jobs usually overlap and vary from organisation to organisation.
Preview sample
Testing as an Essential Aspect of the Research Information Technology Term Paper
11 pages (2807 words) , Download 2 , Term Paper
Free
The following is an explication of the Diabetic histogram: Fig. 7.1 contains the diabetic attributes through a division between type 1 (blue) and type 2 (red) diabetes. In total there are 240 males and 119 females. As the research clearly demonstrates, the individuals with type 2 diabetes outnumber those with type 1 across both genders.
Preview sample
Risk Management of UAE Academy Information Technology Case Study
9 pages (2509 words) , Download 3 , Case Study
Free
The risk management process must follow a process of periodic assessment for continuous improvement. The risk management framework for the ‘UAE Academy’ will primarily address the purpose followed by risk process, risk identification, Risk analysis along with qualitative or quantitative risk analysis, risk response planning, and risk monitoring controlling, and reporting.
Preview sample
Implementing E-Healthcare in Saudi Arabia: Opportunities and Challenges Information Technology Literature review
11 pages (2750 words) , Download 4 , Literature review
Free
According to the study amid the various challenges that are faced with respect to the inclusion of e-health in the KSA, it is crucial to note that, with enhanced perspective and effortless measures, the results are very robust. The government of the KSA has the capacity to uphold and support the project; it only requires availing a taskforce to look into the carrying out of the whole process and its effectual implementation.
Preview sample
Diagnosis of the Situation of Google Information Technology Research Paper
11 pages (2750 words) , Download 3 , Research Paper
Free
It is evident from the study that introduction of IT created a worldwide revolution, which enhanced the passion of search engines with the help of internet. Among numerous search engines, the brand image of Google is quite significant and renowned, which is one of the greatest strengths of the organization.
Preview sample
Profit Implications of Malware Information Technology Annotated Bibliography
15 pages (3750 words) , Download 3 , Annotated Bibliography
Free
Viruses are small software programs that are designed to spread replicate from one computer to another. They are malicious as they interfere with the normal computer operations. A virus operates either by deleting or corrupting data. There are several categories of viruses these are macro virus, email virus, multi-variant virus.
Preview sample
Development of an Internet Based Housing Demand Database System Information Technology Dissertation
23 pages (5645 words) , Download 2 , Dissertation
The chapter provides an analysis of the findings from the JAD sessions and the interview sessions conducted at the KZN-DHS. The chapter, therefore, discusses the testing process, user requirements analysis, and system adaptation process to help in gaining an improved understanding of the system design and development approach.
Preview sample
Local Area Network Design Information Technology Assignment
12 pages (3000 words) , Download 3 , Assignment
Free
The paper tells that encryption must also be incorporated within the network for transmitting highly confidential data. Furthermore, encryption can be carried out symmetrically or asymmetrically depending on the requirements. Lastly, encryption keys are vital to protect, as leakage of encryption keys may result in a complete exposure of confidential information.
Preview sample
Anglia Local News Assignment Information Technology Report
15 pages (3897 words) , Download 2 , Report
Free
Unlike the traditional hosting, the cloud is distinctive in three ways: First cloud is provided (sold) on demand, usually by the minute or hour. Secondly the cloud is elastic, that means the services provided through the cloud is elastic hence users can have the amount of service according to their needs at any given time.
Preview sample
Information and Communication Technology ICT Information Technology Essay
13 pages (3581 words) , Download 3 , Essay
Free
The Cisco Catalyst 3750 v2 series switch is ideal for remote site environments. The switch consumes less power and enhances productivity for the local area network. It protects the network investment by supporting the unified network for data, voice, and video streaming. The switch supports two software versions, which are also called the input/output system (IOS).
Preview sample
Evaluation of the Existing and Proposed System Using the PIECES Framework Information Technology Report
17 pages (4553 words) , Download 2 , Report
Free
The root cause of the problem was thus addressed first. Fact-finding techniques were applied that resulted in the collection of a manual record of the people availing the transport facility and the management personnel related to it. This collected data was then made automated by storing it in a database powered by MS ACCESS.
Preview sample
UNIX Operating System History Information Technology Essay
10 pages (2500 words) , Download 4 , Essay
Free
UNIX Operating System History Likewise, primary objective of Ken is to provide a user friendly environment to his subordinates who are associated with computing research along with a provision of time sharing environment (Fox 1807-1814). Ken and his subordinates improved the UNIX code for several years by integrating utilities and functionality for enhancing user interface along with rewriting the code in C language (Fox 1807-1814).
Preview sample
E-Commerce. The Advantages of Global Education Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
The paper presents the strength on eLearning using a mobile phone that usually lies in the aspect of the communication approach rather than an approach pertaining to contents. Technologies within the mobile industry will at the moment as well as in the future tend to be made use of with a content approach but it must be pinpointed out that, mobile learning real advantages lie in the domain of communication.
Preview sample
Software Development (JAVA) of Class Diagram Information Technology Coursework
2 pages (605 words) , Download 2 , Coursework
Free
All 4 classes apart from the main executable class javaapplication1 have been clearly listed with complete information about the data members and the member methods along with their data types and return types respectively. The calculated cost class is shown on top with its descendants (child classes/ subclasses/ derived classes) located at the bottom.
Preview sample
Use of Information technology in education Information Technology Essay
22 pages (5500 words) , Download 3 , Essay
According to the research findings the five major factors that can be used in determining the success of Information System that is used by the institution are the usefulness of the system, technical capabilities of the user, management support and the quality of information. The management of the institution should be very supportive of the initiative in order to see its substantial success
Preview sample
Development of an internet based housing demand database system for the KwaZulu-Natal Department of Human Settlements Information Technology Essay
12 pages (3000 words) , Download 3 , Essay
Free
The target population for this study was the employees of the housing demand database section, municipality employees and the IT section of the DHS. The target population for the study comprised of 70 individuals. As it was impossible to focus on the entire population, it was necessary to use a sample to obtain the relevant data.
Preview sample
Artificial Intelligence Information Technology Essay
4 pages (1000 words) , Download 8 , Essay
Free
From the research it can be comprehended that artificial intelligence is rapidly improving in development and growth. It has been embedded into most systems, to improve performance. The researcher’s analysis and opinion of AI is that the integration of intelligent systems has led to tremendous growth in different industries.
Preview sample
How Has The Emergence Of The Internet Help The Sport Industry Information Technology Research Paper
10 pages (2500 words) , Download 2 , Research Paper
Free
The researcher of this present paper tells that Information technology (IT) is one of the promising concepts of modern era which is most vital to sustain in the market for long run. Apart from this, it is essential to improve the efficiency and profitability of an organization among others in the market.
Preview sample
Can Information Technology change Organisational Behaviour Information Technology Essay
12 pages (3000 words) , Download 3 , Essay
Free
The report includes a brief introduction followed by discussion including three case studies and a conclusion highlighting the impacts of Information technology (IT). IT is one of the emerging concepts of modern era and is most essential to retain in the market for long run. Apart from this, it is essential to improve the productivity and profitability of the organisation among others in the market.
Preview sample
Agile Software Development Information Technology Essay
10 pages (2500 words) , Download 6 , Essay
Free
According to the study conducted, agile software development is considered the most effective approach to the development of software systems for individuals and organization. This approach applies the iterative and incremental approaches within its methodologies to ensure high quality, functional and quickly delivered software.
Preview sample
Approach to Smart Transportation & Study of Intelligent Transport System in Ireland Information Technology Dissertation
14 pages (3500 words) , Download 5 , Dissertation
Free
The paper tells that ITS plays a major role in the safety of roads, its management efficiently and economically. It already persists in many countries. It is envisaged that there will be more use of ITS in future in transport infrastructure to make it even better. It is likely to solve the major issues related to the transportation over the decade.
Preview sample
Database Design and Implementation Information Technology Coursework
13 pages (3250 words) , Download 5 , Coursework
Free
The report starts with the detailed analysis of the requirement, suitable solution for the design and all the assumptions made while designing the model. The ER diagram which visualises the overall operation of ARO is also presented along with a detailed Data dictionary for all the entities defined in the model.
Preview sample
Cloud Computing Information Technology Assignment
9 pages (2250 words) , Download 3 , Assignment
Free
The paper tells that it facilitates businesses and customers to utilize applications without their installation in accessing their files on any computer that has connectivity to the Internet. The best examples of the usage of cloud computing in business are shown in the services offered by companies such as Gmail, Yahoo and Hotmail.
Preview sample
Evidence of Quality Control Methods in IT Project Success: A Critical Evaluation Information Technology Coursework
15 pages (3750 words) , Download 2 , Coursework
Free
The discussion seeks to answer the question: Do quality control methods find use in information technology projects? Does the inclusion of quality control methods in project management contribute to success within an information technology project? This report situates that role of quality control in project management and provides an analysis of evidence that quality control methods shape the success of an IT project.
Preview sample
An e-commerce strategy and architecture Information Technology Essay
17 pages (4250 words) , Download 2 , Essay
Free
The report starts with an overview of e-commerce. This report has also discussed various important aspects that should be considered before the development of an e-commerce system such as target market and target customer. This report has also suggested the type of e-commerce model that will be adopted for this e-commerce system.
Preview sample
Analyzing the uses of scheduling methods in IT project management Information Technology Coursework
13 pages (3250 words) , Download 4 , Coursework
Free
The paper is meant to give scheduling the seriousness it deserves to ensure successful projects in information technology. Scheduling has been an important process when undertaking project management. Although this is an important process in project management, there has been limited analysis and ways of improving this important process of managing a project.
Preview sample
E-crime against Stilianos Information Technology Assignment
10 pages (2500 words) , Download 2 , Assignment
Free
The discussion seeks to answer the question: When and how Stilianos’ machine was initially compromised? Given that the machine’s binaries were verified to be clean, what would account for the two extra services that didn’t show up with a local lsof, but did with the remote scan with nmap? What sort of traffic was found on TCP/32411? What was the ipv6.o module? What was the rpc.status file?
Preview sample
A research strategy for a topic of security risk analysis Information Technology Essay
53 pages (13250 words) , Download 2 , Essay
The paper discusses a research strategy for a topic “security risk analysis”. The paper also outlines the way to develop a research strategy that involves developing research question, hypothesis, finding the variables and their correlation, developing a research methodology, identifying research methods and instruments, and finally collecting the data to analyse and present results.
Preview sample
Analysis, design, implementation and testing of a web developing company Information Technology Dissertation
37 pages (9250 words) , Download 4 , Dissertation
The purpose of this research paper will be to analyse the web market in Oxford; create a list with the retailers with no websites or with bad websites; design the project website using the required methods and skills; create a wider range of portfolio product/service; have a unique web developing company for the Small/Medium local businesses.
Preview sample
Booking system Information Technology Lab Report
4 pages (1000 words) , Download 2 , Lab Report
Free
There is a need to introduce new booking system in the industry to ensure that customers receive the various services they request in time. The system will also ease the work that many workers do, and hence making their work easier. For the tourism industry to improve its competitiveness in the market, it must come up with new management methods and adopt emerging information technology.
Preview sample
Scenario for Networking Information Technology Essay
12 pages (3000 words) , Download 2 , Essay
Free
The research will give explain the advantages and disadvantages of the two types of networks explaining further how the establishment of a network will be beneficial to the private photography business owned by Sally’s husband John. With the continuous expansion of the company there will be more need for Sally to use the internet as she may need to refer and search for more things from the internet.
Preview sample
Biometrics use in government and corporations Information Technology Research Paper
16 pages (4000 words) , Download 2 , Research Paper
Free
In Greek, “bio” means life and “metrics” means to measure. This basically describes what biometrics entails. The recent past has seen automated biometric systems become popular in the market because of the major advances in computer processing and information technology.
Preview sample
Identifying Success Factors of Implementing ERP in Small Organisations Information Technology Dissertation
63 pages (15750 words) , Download 6 , Dissertation
The purpose of this study is to determine the factors that influence the success of an Enterprise Resource Planning (ERP) system implementation project at small organisations. The findings of this study identified the success factors, grouping them into three chronological categories; project foundation, project team, and project implementation.
Preview sample
The Strategy of Sticking to the Companies, Style, Trademark, Culture, and Innovations Information Technology Term Paper
14 pages (3639 words) , Download 3 , Term Paper
Free
AT&T Wireless has achieved so much and can boast of shredding shoulders with all other companies when it comes to naming global techno-communication giants. Apart from the fact that the company has grown financially wise and has been credited with a number of technologically based innovations and inventions, there still remains a lot more that the company can do to wind up its achievement.
Preview sample
Cyber crime and security affair in e-business Information Technology Article
24 pages (6000 words) , Download 6 , Article
This research will try to answer the following questions: Whether cybercrime is a threat to E Commerce and online shopping? What are the damages done recently by cyber criminals and what are the costs of prevention? What are the new trends in Cybercrimes? Impact of Cloud computing on E commerce and Cybercrime? How computers of home users are affected by Cybercrimes?
Preview sample
I.T. Assesment of ABC Inc Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
The paper presents such issues: compliance with the law; reasonable safeguards and assurance; competence, attitude and integrity; delegation of organizational responsibilities and authority; supervision and separation of duties; accountability for and access to resources; recording and documentation; audit findings’ resolution.
Preview sample
Cloud computing in marketing Information Technology Essay
3 pages (750 words) , Download 7 , Essay
Free
This paper focuses upon cloud computing as the newest technological application that is changing the world. Cloud computing is likely to transform every sector of life in the near future. The invention and continued use of cloud computing will lift off a great burden from businesses. For along time, computers have dominated the business world.
Preview sample
Cloud Security and Privacy Issues Information Technology Research Paper
4 pages (1000 words) , Download 4 , Research Paper
Free
This research is aimed at presenting a detailed analysis of cloud computing, its security issues and other aspects. In this scenario, the researcher will present a comprehensive assessment of some of the main security issues and aspects of cloud computing structure which are still hindering in the successful application of this technology based arrangement.
Preview sample
Cyberspace Security Issues Information Technology Coursework
10 pages (2500 words) , Download 2 , Coursework
Free
Such have been used by malicious persons for their gains. Air travel has been hard hit by cyber crime and cyber-security in airports has been a challenge with each passing day. This paper aims at identifying the key areas in international airport internal operations that expose these airports to cyber attacks.
Preview sample
Network Security Risk Assessment Information Technology Term Paper
9 pages (2250 words) , Download 4 , Term Paper
Free
Advancement in technology has resulted to the development of innovative computing systems which have facilitated the functions of various organizations and institutions. The increasing complexity of information systems has resulted to information security threats which have infringed the right of individuals to privacy of information.
Preview sample
Systems Analysis, Design and Development (Object Oriented using UML) Information Technology Term Paper
13 pages (3250 words) , Download 4 , Term Paper
Free
It is evident from the study that the proposed system revolves around a scenario in which the auction of cars and motorcycles is being held online. The domain of the system would span from the seller of the vehicles to the buyer of the vehicles to the vehicles themselves and to the payment transaction that would eventually take place.
Preview sample
Critical Mistakes which Should be Avoided Information Technology Book Report/Review
9 pages (2250 words) , Download 3 , Book Report/Review
Free
This study aims to examine all relevant details concerned with the use of VMware that has been considered as one of the most popular trends for optimizing the performance of companies. This study is important because it outlines a lot of benefits regarding the use of VMware that are essential in improving the performance of a company.
Preview sample
E-crime investigation. Security breach on a Linux Operation System Information Technology Assignment
12 pages (3000 words) , Download 2 , Assignment
Free
Likewise, the system was than targeted by ‘rpc.statd’ overflow. Secondly, Andy investigated the MAC times of some important files. On the UNIX platform, there are three different time stamps for a particular file i.e. Modify, Access and Change.
Preview sample
The level of interest within Generation Y towards social network marketing Information Technology Essay
39 pages (9750 words) , Download 2 , Essay
This article would be helpful in understanding cross-generation usage of social networking, particularly among the Generation X and Generation Y. This research will help develop a comparison between the two intended generations to understand the influence of social network marketing on both these generations and how the influence differs from one generation to another.
Preview sample
RFID in retail industry - Implications on efficiency and security Information Technology Dissertation
43 pages (10750 words) , Download 2 , Dissertation
This study aims to investigate into efficiencies achieved and the security concerns addressed by large retailers that have implemented and applied RFID in their business processes. The study finds that retailers have not been addressing this concern with as much priority as they give to achieving efficiency in the business process.
Preview sample
10001 - 10050 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us