StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Accessible Virtual Classroom For Visually Impaired Students Information Technology Literature review
15 pages (3750 words) , Download 4 , Literature review
Free
Virtual classrooms and virtual education is becoming very common nowadays with special emphasis on K-12 and adult education classes. K-12.inc, the for-profit organization focusing on K-12 education has made great inroads in this direction and has an annual income exceeding 15 billion dollars.
Preview sample
Critique of TAC/AA Games Information Technology Literature review
12 pages (3474 words) , Download 2 , Literature review
Free
The internet offers the perfect infrastructure and market information for carrying out auctions at low administrative costs. Internet advertising offers a considerable source of income for online publishers and this amount to billions of dollar yearly. Auctioning attracts much interest and has been employed in various market places.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Computer Forensics Information Technology Research Paper
11 pages (2750 words) , Download 6 , Research Paper
Free
The paper focuses on the importance of computer forensics in collecting, interpreting and presenting evidence relating to cyberspace crimes. The value added by computer forensic to information gathered is also discussed. The paper presents proposals of alternative methods which can be used to protect company data from cyberspace attack.
Preview sample
Installation of a Firewall Policy in a Small Office-Home Office Environment Information Technology Literature review
15 pages (4089 words) , Download 2 , Literature review
Free
A small office/home office environment involves one or many workers. It can also be a part of a large company’s network that has been decentralized or just an independent business. The advent of SOHO environments has undergone major transformations since anyone working from a home office can globally compete due to the inception of the Internet.
Preview sample
Allowing Mobile Devices In The Office Information Technology Essay
9 pages (2250 words) , Download 3 , Essay
Free
According to the paper almost every worker in the office environment owns a mobile phone. Critiques argue allowing workers use their mobile phone in the office premises will lower productivity. These devices give voice and data communication ability. Their portability reason can allow easier location of workers. Businesses which allow workers to use their mobile phones have policy on which place to use devices. This reduces the possibility of workers making noise to others when talking on their mobile phones.
Preview sample
Benefits and risks of migrating physical servers into a virtual environment Information Technology Essay
9 pages (2250 words) , Download 4 , Essay
Free
This essay will try to analyze both the advantages and the disadvantages of server virtualization in a business environment and evaluate its potential issues and risks. Studies have shown that migrating physical servers to a virtual environment improve utilization, simplify operations, and reduce overhead costs which tend to make business overlook the risks involved.
Preview sample
Adopting Information Technology Information Technology Essay
7 pages (1869 words) , Download 2 , Essay
Free
Economic losses may also result when employees decide to use company resources for their own selfish motives. For example, an employee may use company resources for their own personal gain, for example, taking home quality ink meant for the company printer, or hosting one’s friends on the company premises and at the company’s expense.
Preview sample
Knowledge Management, Information Systems, and Organizations Information Technology Assignment
11 pages (3203 words) , Download 3 , Assignment
Free
McShane and Travaglione (2003) provided the following sample response to each of these states of the external environment. A dynamic environment is characterized by the high rate of change e.g. telecommunications industry therefore the organization should adopt an organic structure. An organic structure has low formalization, a wide span of control, and low centralization.
Preview sample
Decision Support Systems in Medicine Information Technology Research Paper
12 pages (3000 words) , Download 3 , Research Paper
Free
This study is aimed at highlighting a few such facts that have assisted in the betterment of medical treatments by virtue of improvements in technology. It also summarizes how the said affects have been formalized along with assessing how this all has been of help to the physicians and medical practitioners as well.
Preview sample
Inside a Computer Laboratory Information Technology Lab Report
12 pages (3000 words) , Download 2 , Lab Report
Free
The author states that in the process of purchasing the laboratory is important to that you ask yourself some questions regarding the computer specification. First, you need to list down how the computer is going to be used. Secondly, the software that will be used can follow and here you determine whether any specialized functions are going to be used.
Preview sample
Ontology, epistemology and methodology in information system researches Information Technology Article
35 pages (8750 words) , Download 5 , Article
This paper provides an overview of the concepts and ideas that are concerned with ontology, epistemology, and methodology in the researches on information systems. Definitions of particular concepts both on philosophical and practical levels are provided, highlighting the similarities and differences among these definitions. Finally, the empirical side of these concepts were discussed.
Preview sample
Managing mobile platform proliferation and Smartphone market fragmentation Information Technology Dissertation
32 pages (8000 words) , Download 4 , Dissertation
This study attempts to explore the factors at play in the proliferation of development platforms and to give software developers (mostly independent) bases for sound decision making. Recommendations as to what market opportunities may be tapped and how industry-specific elements should be approached will be presented.
Preview sample
Protection of Data in Email Communication Information Technology Assignment
11 pages (3074 words) , Download 2 , Assignment
Free
One of the secured most solutions suggested for protection is data encryption and decryption. The process of encryption encodes data in such a way that no one can understand or interpret it until it is decrypted by the same technology through which it was encrypted.  Decryption is the process in which the encoded data is retrieved in its original form (Kryptotel 2010)
Preview sample
Lowering Barriers to Telecommunication Growth Information Technology Literature review
8 pages (2307 words) , Download 2 , Literature review
Free
Over the past several decade's strides have been made to make everybody connected not just locally but internationally as well. This is evidenced not in audio transmissions alone but also in video transmissions as well. The number of companies or the syndication of the capital needed to create the infrastructure did not simply come from one company in one particular country.
Preview sample
Implementation of an Enterprise Resource Planning System Information Technology Literature review
8 pages (2315 words) , Download 2 , Literature review
Free
The International Accounting Standards have made it possible for applications such as SAP (Systems, Applications, and Products in Data Processing) to gain popularity. This is because not only does SAP faithfully comply with the provisions of the International Financial Reporting Standards they also provide the best practices and best methodologies for companies in the same industry.
Preview sample
Influences of Online Book Preview Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
The author explains that case of Google book copyright infringement has been referred to bring out a practical example of such copyright violations. The publishing house needs to be careful in implementing such measures as any negligence can further hamper their cause. Technology has improved rapidly in the past decade.
Preview sample
Cloud Computing as a New IT Paradigm Information Technology Essay
14 pages (4069 words) , Download 5 , Essay
Free
Cloud computing is a new IT paradigm that allows the provisioning of IT infrastructure through the flexible pay-per-use model. Its application in industry is still new because it has not yet been fully understood. This paper aims to educate the industry on the value of cloud computing to business starting by defining it, outlining its pros and cons and describing its applicability.
Preview sample
Understanding project management techniques Information Technology Coursework
9 pages (2250 words) , Download 5 , Coursework
Free
10 percent of the total systems are being used by the company’s staff members who work from home. Special technical team consisting of six members, of whom two are experienced in dealing with end users, are required to travel by local public transport to install, train and maintain the systems for upgradation.
Preview sample
Does Google Make Us Stupid Information Technology Essay
13 pages (3250 words) , Download 4 , Essay
Free
The internet has become one of the most pervasive technologies used and enjoyed by almost all people in the planet. It is also a media upon which various technologies, including search engines and social networking sites are being borne and developed. Google is one of these technologies.
Preview sample
Methods for Database Security Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
Abstract Database security has become one of the most important issues in today’s world of technology. This paper introduces the issue of database security in an organization by introducing the need and importance of database security. This is followed by a description of the main types of security threats that an organization would face, though the list is not conclusive.
Preview sample
SECURITY ISSUES IN RED HAT ENTERPRISE LINUX Information Technology Dissertation
68 pages (17000 words) , Download 2 , Dissertation
From this research it is clear that the safety protection of Linux cannot leave without all kinds of security principles and tools. SELinux System use the mandatory access control based on the rules which are set by the administrator, restricting the process to the least privilege and control the file access, resolving some authentication issues.
Preview sample
Which directrion will Cloud Computing take us Information Technology Essay
14 pages (3500 words) , Download 4 , Essay
Free
What Direction will Cloud Computing take us? This is a research report on the future of cloud computing. It is based on the topic of cloud computing centering on the definition, its features, the various forms of cloud computing, impact of cloud in terms of terms of pros and cons of cloud computing, and the prospect of cloud computing.
Preview sample
Cloud Computing and Security Issues Information Technology Dissertation
51 pages (12750 words) , Download 4 , Dissertation
1.1 Research Background Cloud computing is a new and emerging trend in the IT industry that is set to revolutionize the way people approach and use computing. There has been an exponential growth in new technologies that have converged to develop cloud computing services.
Preview sample
System Software and Network Security Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
It is evident from the research that most of the cloud providers are not focused on the security in the cloud but rather their main concern is the delivery of the their customers need i.e. low cost solutions, fast application deployment which will improve the customer service while increasing the efficiency of the IT function.
Preview sample
Security of Websites Information Technology Term Paper
12 pages (3285 words) , Download 3 , Term Paper
Free
Web security does not only entail securing the web application only but also securing the webserver and the web users as well. This article aims at explicating the various forms of threats, attacks, and vulnerabilities that web applications, servers, and users face. It will also show various methods of how to prevent minimize.
Preview sample
Building Information Modeling Information Technology Literature review
15 pages (4022 words) , Download 6 , Literature review
Free
Building and building companies throughout the world service BIM to describe geometrical, spatial relationships, light analyses, geographic information, quantities, and properties of building components. There are many advantages of BIM which include enabling its implementers to overcome the problem of poor design, which may arise, into substandard construction materials.
Preview sample
Data Warehousing and Data Mining Information Technology Research Paper
8 pages (2193 words) , Download 2 , Research Paper
Free
The increased use of information technology in every spheres of life is generating huge amount of data every day. However, there is an increase realization among information scientists that knowledge and power that should have been extracted from these huge information resources is far lesser than its capacity and most of the data collected globally each day by billions of information systems is never used for the purposes it was collected.
Preview sample
Pledge to Action against Cyber-bullying Information Technology Essay
8 pages (2178 words) , Download 3 , Essay
Free
While going to the library is classical, and not to mention, the ‘academic’ way of doing it, the case is surely different when we are given only an hour to work on it. The Internet has truly made our school life easier. Aside from this, the Internet also keeps us close with our peers, including the long-lost ones. Through instant messaging and social media, conversations are truly easy with just a click of a mouse.
Preview sample
The Policy of Censoring Books in School Library Information Technology Essay
5 pages (1489 words) , Download 3 , Essay
Free
Censorship can be perceived as a system of “policy of restricting the public expression of ideas, opinions, conceptions, and impulses, which have or are believed to have the capacity to undermine the governing authority or the social and moral order which that authority considers itself bound to protect” (Abraham 357).
Preview sample
Design System and Security Control Information Technology Essay
13 pages (3250 words) , Download 3 , Essay
Free
Many are the times the data in the IT system is at risk from a number of sources. This includes user errors, malicious and non-malicious attacks, accidents as well as external attack from hackers, who try to gain access to the system and disrupt the various system operations hence rendering it useless, or data alteration or even data loss.
Preview sample
Ensuring Appropriate Search Engine Registration Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
The aim of this report is to review the computer crime laws and regulations as they apply to a search engine company. It begins with an overview of search engines and search engine development and how it impacts information sharing on the web.
Preview sample
Specifications & Documentations Information Technology Research Paper
11 pages (2750 words) , Download 4 , Research Paper
Free
The project involves the strict organization of information and also of data to obtain the product output of the project, while the project specification is any rules for creating the product. Most of the website software program design projects ought to have at least information or even data which are contained in the main body of the documentation.
Preview sample
Network Security Information Technology Annotated Bibliography
18 pages (4500 words) , Download 2 , Annotated Bibliography
Free
Current annotated bibliography includes Winkler Vic "Securing the Cloud: Cloud Computer Security Techniques and Tactics", Chey Cobb "Network security for dummies", Cole Eric "Networking security bible", Donahue Gary Network Warrior" and other books on the stated topic.
Preview sample
Technology of the future Information Technology Research Paper
12 pages (3000 words) , Download 4 , Research Paper
Free
This research aims to evaluate and present a great amount of future technology. Technology can enrich our lives, but it’s the responsibility of the people that make sure it is put to beneficial use. Ultimately, the future will be an exciting place, but we must all work together to ensure that true progress is achieved.
Preview sample
CB Hart Law Firm: An Information Security Information Technology Report
11 pages (3153 words) , Download 2 , Report
Free
Through developing and integrating a database to collect and incorporate information into a program; software that can sort, store, and display the content when demanded. Depending on the database sight owners' requirements, the database in order software displayed in a number of styles. With attributes like primary and secondary keys, the chances of data redundancy are reduced.
Preview sample
Fire Control Project Overview Information Technology Essay
11 pages (2750 words) , Download 2 , Essay
Free
This was another example of a Government IT project in which it was absorbing increasing resources but never achieving the objectives initially set. The essential checks and balances done at the early stages of the project were ineffective.
Preview sample
Software Piracy at CWU Information Technology Research Paper
13 pages (3250 words) , Download 2 , Research Paper
Free
The purpose of this analytical report is to open the eyes of those in charge of the CWU Information Technology Department to the problem of software piracy on campus, the sentiments of the students about the problem. The problems are posed to the students in the form of a question and answer format which can be used to identify and solve the software piracy problems on campus.
Preview sample
Project Implementation Information Technology Assignment
11 pages (2750 words) , Download 3 , Assignment
Free
The report analyses the issues which the company should focus on in the project implementation. It gives explanations of constraints which the company might encounter in the process of project implementation. It goes further to provide some possible approaches which the company may take in the effort of trying to deal with the constraints efficiently.
Preview sample
Networks and System Administration Information Technology Term Paper
16 pages (4457 words) , Download 2 , Term Paper
Free
Strategies on Network scalability are essential to certain disaster recovery and business continuity, these policies are incorporated in the design to cater to the future growth of the company. The information needs of the company are subject to change due to an increase in its business operations. This may due to the expansion of the business or an increase in its customer base.
Preview sample
Password Cracker Information Technology Research Paper
16 pages (4000 words) , Download 2 , Research Paper
Free
The research discusses the Rainbow table technique. Its introduction follows a detailed discussion of a rainbow cracker tool. How that tool uses rainbow tables to retrieve passwords has been taken into account. Screenshots of Brute-force cracker and rainbow cracker are given at the end of the report.
Preview sample
Software Engineering Testing tools Information Technology Research Paper
11 pages (2750 words) , Download 3 , Research Paper
Free
This research paper details a study about the unreliability of software engineering testing tools as a result of the misuse of these testing tools in development. Testing activities that are geared towards evaluating the capabilities and attributes of systems or programs with a view to ascertaining whether the program produces the required results will be discussed.
Preview sample
Forensic investigation Information Technology Essay
13 pages (3250 words) , Download 3 , Essay
Free
This paper focuses on creating a manual that helps the forensic examiners in the lab to avoid committing any mistake while they are dealing with the digital evidence. The process that the examiner should follow: check the investigator needs, document everything about the case, fill chain of the custody, resize the evidence, and store it; make verification for the lab tools and software has to check that it works properly and clearly outlined.
Preview sample
Twelve Security Attack Trends of 2011 Information Technology Essay
9 pages (2250 words) , Download 2 , Essay
Free
GSM Security 15 7. References 19 PART I 1. Twelve Security Attack Trends of 2011 The first security threat is from the man in the browser (MITB). It is the attack on browser software used for accessing internet. Leading browsers are Microsoft Internet Explorer 8.0, Chrome from Google, etc.
Preview sample
Asset Assesment and E-Commerce Information Technology Essay
13 pages (3250 words) , Download 2 , Essay
Free
From this paper, it is clear that NIRA Ltd has the right to keep track, keep a copy of employees’ logs of usage of computers, software, and other propriety resources. Monitoring includes e-mails, Internet access, files, logins and changes to levels of access. Employees shall not expect privacy of using company-owned technology resources.
Preview sample
Prevention of Financial Frauds Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
ABSTRACT This paper focuses on one of the important issues of the world; financial frauds which could impact the overall financial stability of the economy. Financial analysts and auditors have stressed a lot in the last few years to eliminate financial frauds and thus several techniques and methods have been recommended by auditors and financial analysts from different parts of the world to prevent financial frauds.
Preview sample
Future Trends in System Consolidation Information Technology Research Paper
16 pages (4000 words) , Download 4 , Research Paper
Free
The author states that consolidation does not occur only to the software part but also on the hardware resources. The firm might decide to employ virtualization of their servers and eliminate the different distributed servers. System consolidation is continuing to be used due to its advantages and positive technological changes taking place.
Preview sample
Bluetooth Technology Information Technology Essay
6 pages (1600 words) , Download 5 , Essay
Free
Data like videos, pictures, music, information, and voice can be transferred easily between the two paired devices over a short distance and that too within seconds. Wireless signals transmitted by Bluetooth cover short distances up to 30 feet. These signals communicate less than 1 Megabyte per second (1 Mbps). The Bluetooth technology works across a secure and unlicensed short-range radiofrequency.
Preview sample
Technical factors affecting e-banking development in Iran Information Technology Dissertation
57 pages (14250 words) , Download 3 , Dissertation
The purpose of this study is to get greater understanding of e-Banking phenomenon and find out its implementation obstacles in Iran. In the conduct of the collection of data; both primary and secondary data, it is important that the researcher has a guide on the kind of data to collect and which ones to ignore.
Preview sample
Social Network Companies: Riot Incitement Using Social Media Information Technology Essay
11 pages (2750 words) , Download 3 , Essay
Free
Moral panic is a common and universal reaction to any new and unfamiliar form of communication. The arrival of television generated fears of mass digitization. In the same way, in the early 1990’s, critics believed that the diffusion of the internet was proof of individuals’ increasingly estrangement and isolation from the society.
Preview sample
Networks and Real-Time Traffic for Industrial Control Applications Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
The author explains that real-time traffic flows in a network and is required within specific time restraints of a processor simultaneously supply information to another system it is assisting. Usually, the traffic flow must be faster and arrive slightly earlier than needed by the receiving device.
Preview sample
10101 - 10150 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us