StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Critique of TAC/AA Games Information Technology Literature review
12 pages (3474 words) , Download 2 , Literature review
Free
The internet offers the perfect infrastructure and market information for carrying out auctions at low administrative costs. Internet advertising offers a considerable source of income for online publishers and this amount to billions of dollar yearly. Auctioning attracts much interest and has been employed in various market places.
Preview sample
Accessible Virtual Classroom For Visually Impaired Students Information Technology Literature review
15 pages (3750 words) , Download 4 , Literature review
Free
Virtual classrooms and virtual education is becoming very common nowadays with special emphasis on K-12 and adult education classes. K-12.inc, the for-profit organization focusing on K-12 education has made great inroads in this direction and has an annual income exceeding 15 billion dollars.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Video Games and Artificial Intelligence Information Technology Research Paper
15 pages (4232 words) , Download 8 , Research Paper
Free
He states that human intelligence is far more equipped and complex, and this concept can be utilized firmly in the presentation of an analogy between an artificially intelligent computer infrastructure and a simple structure. He goes onto add that a powerful application-based Chess game would have an equally powerful chess database but would know nothing about any other board game.
Preview sample
Autonomous intelligent agent topic tracking system Information Technology Dissertation
46 pages (11500 words) , Download 4 , Dissertation
The paper also describes how for each search the search engine displays a dynamic summary of query terms and other information such as the URL of the result, its size, and its possible category etc besides providing a cached copy of the result to the user. The use of crawlers, indexers, search index, query engine and the search interface. The distributed architecture based on which most of the major search engines like Google are designed.
Preview sample
The Usability Index of the Conservatives Party Website Information Technology Case Study
10 pages (2500 words) , Download 2 , Case Study
Free
Measuring usability follows a range of tests. They intend to make your website more efficient for users, easier to learn and more satisfying to users. Measuring usability is done by conducting usability testing. The most general factors measured in this are efficiency, effectiveness, satisfaction, memorability and error frequency and severity.
Preview sample
Cyber Defense Situational awareness Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Chapter Two: Literature Review 2.1: Introduction This chapter provides an analysis of cyber situation awareness. Its main purpose is to show the issue with current SA with passive cyber defense and make the case for planning and executing Active SA through active defense particularly, it centers on the theory on decision making as a situation awareness model in decision making for cyber defense.
Preview sample
An Overview of COBIT Framework Information Technology Research Paper
10 pages (2856 words) , Download 2 , Research Paper
Free
Successful businesses understand the importance of information technology (IT) and make better use of their organizational resources to improve their shareholders’ value. Additionally, they fully understand the significance of IT for running their business procedures. They are fully aware of the need to fulfill growing demands and the advantages of handling risk successfully.
Preview sample
Defining the Cloud Computing Technology Information Technology Essay
55 pages (10286 words) , Download 7 , Essay
Generally, this paper provides a number of analyses and reference points that clearly identify the benefits of Cloud computing, however, the concern is that businesses have adequate solutions that assist in implementation of the key criterion used in measuring the success embedded within Cloud Computing.
Preview sample
Models to Examine the Adoption of e-Government Services Information Technology Literature review
32 pages (8474 words) , Download 5 , Literature review
The advent of the internet witnessed a manifold jump in IT. The public and private sector started embracing the benefits which were initially restricted to the information and communications sector. E-commerce and e-business have evolved and e-government models can be seen in countries where services are customized according to customer needs.
Preview sample
Small and medium enterprises and the effectiveness of technology business incubators in Saudi Arabia Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
The paper tells that technology business incubation can only become successful if it is people oriented as human resource is considered as essential and far superior than having access to technology. People centric technology business incubation is one of the essential conditions for their successful implementation.
Preview sample
Government Services Provided Online Information Technology Report
13 pages (3275 words) , Download 2 , Report
Free
The company will set up an online android market for its subscribers. The subscribers can download the android applications for a fee or free. A massive campaign has been launched to make sure that more people buy android phones. The campaign is done in partnership with Google who is the main producer of cheap android enabled devices.
Preview sample
The Safety and Reliability Issue of Robotic System with Artificial Intelligence Information Technology Term Paper
12 pages (3389 words) , Download 3 , Term Paper
Free
The applications of robotic systems with artificial intelligence are growing day by day. Unlike human, robots can perform complicated works with utmost perfection. Moreover, robots can work continuously for longer periods without wear and tear. Even though the utility of using artificial intelligence in doing complicated work is unquestionable, there are many concerns about the safety and reliability of using it.
Preview sample
Designing a Grounded Embodied Mental Model Learning Environment Information Technology Assignment
13 pages (3250 words) , Download 2 , Assignment
Free
This research begins with the description of the grounded environment and how it would make the content more meaningful. Then it presents congruent gestures can improve mathematics performance, tells about gestural Conceptual Mapping and use of agents e.g. robots and video games and how they would be important or not in learning the content. At the end the study demonstrates GEMM motivation to students.
Preview sample
The Impact of Social Media on the Education Sector Information Technology Outline
14 pages (3500 words) , Download 4 , Outline
Free
The intention of this study is social media that is characterized by extensive boundaries and revolutionizing features that should be adopted in order to pace up with the revolutionizing of the restructured human civilization.The boom of information and communications technology in the late twentieth century has sparked a never ending chain of change in the human society.
Preview sample
Formal specification of non-functional properties in component software engineering Information Technology Research Paper
15 pages (3750 words) , Download 2 , Research Paper
Free
The ultimate aim of this report is to examine the concept of formal specification of non-functional properties in component software engineering. This entails reviewing the entire aspect of software development and looks at the specification languages that already exist as well as examining the component forms related to specification languages.
Preview sample
Fashion Waves in Information System Research Information Technology Article
23 pages (5750 words) , Download 2 , Article
Abstract The concept of information research is one which is based on being innovative and offering new pieces of information to the audience. The information research is specific with new research which is available or looking into the latest products and ideas that are available.
Preview sample
Wireless Security Information Technology Research Paper
12 pages (3000 words) , Download 4 , Research Paper
Free
Wireless networking offers wonderful advantages and opportunities to get easy access to communication and collaborative services. Due to this reason, it has been evolving quickly around the world. In addition, most of the modern technologies today are completely reliant on wireless communication.
Preview sample
Design And Analysis Of Algorithms For Obtaining Super Resolution Satellite Images Information Technology Essay
18 pages (4500 words) , Download 4 , Essay
Free
The purpose of this assignment is to develop an algorithm to obtain a HR image from a set of LR images captured by remote sensing satellites. The algorithm will be tried on images captured by X satellite. Based on the characteristics of the acquired images from this satellite an investigation should be done to choose the suitable method to reconstruct HR images.
Preview sample
Security as a management or technological issue Information Technology Essay
12 pages (3000 words) , Download 3 , Essay
Free
The research will also discuss such thesis: is it a technical issue or a managerial issue for effectively handling and managing these issues in an organization. The paper will also emphasize on all the technical aspects followed by all the managerial aspects and lastly comparing these two aspects for conclusion.
Preview sample
Problems and Risks with Information Security in the modern world Information Technology Research Paper
38 pages (9500 words) , Download 4 , Research Paper
The study intends to examine the nature of information security. It also seeks to determine the various problems and risks that information security is dealing with. Likewise, the study aims to identify some of the theories that are proposed in order to address the concerns and issues pertinent to information security.
Preview sample
Systems Analysis & Design Methods Information Technology Research Paper
16 pages (4000 words) , Download 3 , Research Paper
Free
This research is being carried out to explain or describe the process that should be taken to develop an automated information system and or software, to explain the context of system analysis, design methods and system building blocks and to discuss the importance of the systems development life cycle (SDLC) and project management.
Preview sample
Distributed Computer System Information Technology Essay
11 pages (2750 words) , Download 2 , Essay
Free
The paper will critically look at the factors motivating the adoption of distributed systems in order to evaluate the reality of a true distributed computing environment. Description of current research on the development of appropriate sub-components of distributed computer systems will then follow. This paper will present a critical evaluation on the reality of having a true distribute system.
Preview sample
The Replicability of the Technological & IT Sector Model of Silicon Valley, USA in the City of Birmingham, UK Information Technology Dissertation
12 pages (3000 words) , Download 2 , Dissertation
Free
The essay aims to examine the factors that led to the development of Silicon Valley, the factors that led to the success of the replication of Silicon Valley in Israel and Dubai, the existence of critical success factors in Birmingham and the threat of Silicon Fen, the replica of Silicon Valley in Cambridge, England.
Preview sample
Data Server Technology - Database Modeling and Implementation For International Parcel Deliveries Information Technology Essay
20 pages (5000 words) , Download 2 , Essay
Free
The purpose of this research is to investigate the relationships defined: customer/order; customer/invoice; order/shipment; cost/shipment. The research is designed based on the assumption: All the fields entered by the user in the web application are validated for invalid input errors before storing it in the database.
Preview sample
Evaluation Of Business Information System Security Policies: Case Study Of Government Departments Information Technology Coursework
12 pages (3000 words) , Download 3 , Coursework
Free
Beaver (2008) says that the security of business information must be given the highest priority by government departments irrespective of their size. Therefore, it is important that government departments are able to identify and prevent security threats on their business information systems.
Preview sample
Future of Mobile Global Business Information Technology Assignment
12 pages (3000 words) , Download 4 , Assignment
Free
Several studies have been conducted in the recent years aimed at analysing the challenges and trends as pertains to the use of mobile applications and their contribution in business. The only problem is that, a greater number of these studies have failed to address the future of the mobile industry.
Preview sample
Annotated Bibliography in APA Style Information Technology Annotated Bibliography
11 pages (2750 words) , Download 5 , Annotated Bibliography
Free
The most common errors that PCIs facilitate can be divided into two groups: (a) those in the processes involving coordination and communication the PCISs were designed to support, and (b) those involving the process of retrieving and entering information. The study provides vital information on the aspects of IT as applied to health and patient care information systems that should be improved.
Preview sample
Social, legal and ethical aspects of IS security and privacy Information Technology Research Paper
16 pages (4000 words) , Download 5 , Research Paper
Free
The researcher states that recent advancement in technology has resulted to the development of innovative computing systems which have facilitated the functions of various organizations and institutions. The adoption and implementation of information systems is the modern trend because of the advantages that are associated with the use of technology.
Preview sample
The organizational redesign with information systems Information Technology Essay
12 pages (3000 words) , Download 2 , Essay
Free
This research aims to evaluate and present the organizational redesign with information systems using as an example Forbes Solicitors case. Forbes is a large law firm with more than 96 specialist and professional solicitors who offer both legal consultation and representation services to their clients
Preview sample
Network Intrusion Detection and Forensics Information Technology Dissertation
26 pages (6500 words) , Download 3 , Dissertation
This article is a research-based project that aims to compare two or more open source Network Intrusion Detection Systems, in terms of their operation, methods of detection, capabilities, and performance. Network Intrusion Detection Systems (NIDSs), are developed to monitor network activities for any malicious activities and network violations.
Preview sample
Computer Security and Biometrics Information Technology Research Paper
10 pages (2500 words) , Download 3 , Research Paper
Free
The essay discussed the three concepts proposed by covering formal, informal and technical dimensions of threats affecting information systems. It has also discussed biometric security challenges representing five domains, each having its own challenges. Moreover, the paper also discussed researches and studies addressing fingerprint template databases.
Preview sample
Psychological and economical effects of Robotic/Remote Surgery Information Technology Research Paper
10 pages (2500 words) , Download 3 , Research Paper
Free
The researcher stateі that according to a workshop carried out by the Office of Technology Assistance (OTA) on the social effects of robotics, there were four main areas of concern: capital formation and production labor, education and training, international impacts, and other applications. They will be discussed in the paper.
Preview sample
Web Services Technology and Information Systems Information Technology Essay
11 pages (2750 words) , Download 3 , Essay
Free
The problem statement for this study is to examine web services technology and discuss how it has benefited the development of information systems. This issue is essential, as Web services is now one of the IT advancements creating a center of attention for the maximum level of funds, with small or no pragmatic studies on its influence on system development approaches.
Preview sample
Cyber Security Information Technology Coursework
10 pages (2500 words) , Download 8 , Coursework
Free
It is evident from the study that talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats.
Preview sample
Improving Third Party Service Integration The Cloud, SAAS, BPO Information Technology Essay
9 pages (2250 words) , Download 2 , Essay
Free
The study aims at ensuring that standard integration procedures and requirements are proactively incorporated for all third party BPOs and SaaS. Finally, it aims at ensuring effective, secure, and efficient integration of third parties into the business Purchasing, IT, and all other functions operated and directed by IT.
Preview sample
RFID in retail industry - Implications on efficiency and security Information Technology Dissertation
43 pages (10750 words) , Download 2 , Dissertation
This study aims to investigate into efficiencies achieved and the security concerns addressed by large retailers that have implemented and applied RFID in their business processes. The study finds that retailers have not been addressing this concern with as much priority as they give to achieving efficiency in the business process.
Preview sample
The level of interest within Generation Y towards social network marketing Information Technology Essay
39 pages (9750 words) , Download 2 , Essay
This article would be helpful in understanding cross-generation usage of social networking, particularly among the Generation X and Generation Y. This research will help develop a comparison between the two intended generations to understand the influence of social network marketing on both these generations and how the influence differs from one generation to another.
Preview sample
Critical Mistakes which Should be Avoided Information Technology Book Report/Review
9 pages (2250 words) , Download 3 , Book Report/Review
Free
This study aims to examine all relevant details concerned with the use of VMware that has been considered as one of the most popular trends for optimizing the performance of companies. This study is important because it outlines a lot of benefits regarding the use of VMware that are essential in improving the performance of a company.
Preview sample
Systems Analysis, Design and Development (Object Oriented using UML) Information Technology Term Paper
13 pages (3250 words) , Download 4 , Term Paper
Free
It is evident from the study that the proposed system revolves around a scenario in which the auction of cars and motorcycles is being held online. The domain of the system would span from the seller of the vehicles to the buyer of the vehicles to the vehicles themselves and to the payment transaction that would eventually take place.
Preview sample
Network Security Risk Assessment Information Technology Term Paper
9 pages (2250 words) , Download 4 , Term Paper
Free
Advancement in technology has resulted to the development of innovative computing systems which have facilitated the functions of various organizations and institutions. The increasing complexity of information systems has resulted to information security threats which have infringed the right of individuals to privacy of information.
Preview sample
Cloud Security and Privacy Issues Information Technology Research Paper
4 pages (1000 words) , Download 4 , Research Paper
Free
This research is aimed at presenting a detailed analysis of cloud computing, its security issues and other aspects. In this scenario, the researcher will present a comprehensive assessment of some of the main security issues and aspects of cloud computing structure which are still hindering in the successful application of this technology based arrangement.
Preview sample
I.T. Assesment of ABC Inc Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
The paper presents such issues: compliance with the law; reasonable safeguards and assurance; competence, attitude and integrity; delegation of organizational responsibilities and authority; supervision and separation of duties; accountability for and access to resources; recording and documentation; audit findings’ resolution.
Preview sample
Cyber crime and security affair in e-business Information Technology Article
24 pages (6000 words) , Download 6 , Article
This research will try to answer the following questions: Whether cybercrime is a threat to E Commerce and online shopping? What are the damages done recently by cyber criminals and what are the costs of prevention? What are the new trends in Cybercrimes? Impact of Cloud computing on E commerce and Cybercrime? How computers of home users are affected by Cybercrimes?
Preview sample
The Strategy of Sticking to the Companies, Style, Trademark, Culture, and Innovations Information Technology Term Paper
14 pages (3639 words) , Download 3 , Term Paper
Free
AT&T Wireless has achieved so much and can boast of shredding shoulders with all other companies when it comes to naming global techno-communication giants. Apart from the fact that the company has grown financially wise and has been credited with a number of technologically based innovations and inventions, there still remains a lot more that the company can do to wind up its achievement.
Preview sample
Identifying Success Factors of Implementing ERP in Small Organisations Information Technology Dissertation
63 pages (15750 words) , Download 6 , Dissertation
The purpose of this study is to determine the factors that influence the success of an Enterprise Resource Planning (ERP) system implementation project at small organisations. The findings of this study identified the success factors, grouping them into three chronological categories; project foundation, project team, and project implementation.
Preview sample
Biometrics use in government and corporations Information Technology Research Paper
16 pages (4000 words) , Download 2 , Research Paper
Free
In Greek, “bio” means life and “metrics” means to measure. This basically describes what biometrics entails. The recent past has seen automated biometric systems become popular in the market because of the major advances in computer processing and information technology.
Preview sample
Scenario for Networking Information Technology Essay
12 pages (3000 words) , Download 2 , Essay
Free
The research will give explain the advantages and disadvantages of the two types of networks explaining further how the establishment of a network will be beneficial to the private photography business owned by Sally’s husband John. With the continuous expansion of the company there will be more need for Sally to use the internet as she may need to refer and search for more things from the internet.
Preview sample
Analysis, design, implementation and testing of a web developing company Information Technology Dissertation
37 pages (9250 words) , Download 4 , Dissertation
The purpose of this research paper will be to analyse the web market in Oxford; create a list with the retailers with no websites or with bad websites; design the project website using the required methods and skills; create a wider range of portfolio product/service; have a unique web developing company for the Small/Medium local businesses.
Preview sample
A research strategy for a topic of security risk analysis Information Technology Essay
53 pages (13250 words) , Download 2 , Essay
The paper discusses a research strategy for a topic “security risk analysis”. The paper also outlines the way to develop a research strategy that involves developing research question, hypothesis, finding the variables and their correlation, developing a research methodology, identifying research methods and instruments, and finally collecting the data to analyse and present results.
Preview sample
E-crime against Stilianos Information Technology Assignment
10 pages (2500 words) , Download 2 , Assignment
Free
The discussion seeks to answer the question: When and how Stilianos’ machine was initially compromised? Given that the machine’s binaries were verified to be clean, what would account for the two extra services that didn’t show up with a local lsof, but did with the remote scan with nmap? What sort of traffic was found on TCP/32411? What was the ipv6.o module? What was the rpc.status file?
Preview sample
10151 - 10200 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us