StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Approach to Smart Transportation & Study of Intelligent Transport System in Ireland Information Technology Dissertation
14 pages (3500 words) , Download 5 , Dissertation
Free
The paper tells that ITS plays a major role in the safety of roads, its management efficiently and economically. It already persists in many countries. It is envisaged that there will be more use of ITS in future in transport infrastructure to make it even better. It is likely to solve the major issues related to the transportation over the decade.
Preview sample
Agile Software Development Information Technology Essay
10 pages (2500 words) , Download 6 , Essay
Free
According to the study conducted, agile software development is considered the most effective approach to the development of software systems for individuals and organization. This approach applies the iterative and incremental approaches within its methodologies to ensure high quality, functional and quickly delivered software.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Can Information Technology change Organisational Behaviour Information Technology Essay
12 pages (3000 words) , Download 3 , Essay
Free
The report includes a brief introduction followed by discussion including three case studies and a conclusion highlighting the impacts of Information technology (IT). IT is one of the emerging concepts of modern era and is most essential to retain in the market for long run. Apart from this, it is essential to improve the productivity and profitability of the organisation among others in the market.
Preview sample
How Has The Emergence Of The Internet Help The Sport Industry Information Technology Research Paper
10 pages (2500 words) , Download 2 , Research Paper
Free
The researcher of this present paper tells that Information technology (IT) is one of the promising concepts of modern era which is most vital to sustain in the market for long run. Apart from this, it is essential to improve the efficiency and profitability of an organization among others in the market.
Preview sample
Development of an internet based housing demand database system for the KwaZulu-Natal Department of Human Settlements Information Technology Essay
12 pages (3000 words) , Download 3 , Essay
Free
The target population for this study was the employees of the housing demand database section, municipality employees and the IT section of the DHS. The target population for the study comprised of 70 individuals. As it was impossible to focus on the entire population, it was necessary to use a sample to obtain the relevant data.
Preview sample
Use of Information technology in education Information Technology Essay
22 pages (5500 words) , Download 3 , Essay
According to the research findings the five major factors that can be used in determining the success of Information System that is used by the institution are the usefulness of the system, technical capabilities of the user, management support and the quality of information. The management of the institution should be very supportive of the initiative in order to see its substantial success
Preview sample
E-Commerce. The Advantages of Global Education Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
The paper presents the strength on eLearning using a mobile phone that usually lies in the aspect of the communication approach rather than an approach pertaining to contents. Technologies within the mobile industry will at the moment as well as in the future tend to be made use of with a content approach but it must be pinpointed out that, mobile learning real advantages lie in the domain of communication.
Preview sample
UNIX Operating System History Information Technology Essay
10 pages (2500 words) , Download 4 , Essay
Free
UNIX Operating System History Likewise, primary objective of Ken is to provide a user friendly environment to his subordinates who are associated with computing research along with a provision of time sharing environment (Fox 1807-1814). Ken and his subordinates improved the UNIX code for several years by integrating utilities and functionality for enhancing user interface along with rewriting the code in C language (Fox 1807-1814).
Preview sample
Evaluation of the Existing and Proposed System Using the PIECES Framework Information Technology Report
17 pages (4553 words) , Download 2 , Report
Free
The root cause of the problem was thus addressed first. Fact-finding techniques were applied that resulted in the collection of a manual record of the people availing the transport facility and the management personnel related to it. This collected data was then made automated by storing it in a database powered by MS ACCESS.
Preview sample
Information and Communication Technology ICT Information Technology Essay
13 pages (3581 words) , Download 3 , Essay
Free
The Cisco Catalyst 3750 v2 series switch is ideal for remote site environments. The switch consumes less power and enhances productivity for the local area network. It protects the network investment by supporting the unified network for data, voice, and video streaming. The switch supports two software versions, which are also called the input/output system (IOS).
Preview sample
Anglia Local News Assignment Information Technology Report
15 pages (3897 words) , Download 2 , Report
Free
Unlike the traditional hosting, the cloud is distinctive in three ways: First cloud is provided (sold) on demand, usually by the minute or hour. Secondly the cloud is elastic, that means the services provided through the cloud is elastic hence users can have the amount of service according to their needs at any given time.
Preview sample
Local Area Network Design Information Technology Assignment
12 pages (3000 words) , Download 3 , Assignment
Free
The paper tells that encryption must also be incorporated within the network for transmitting highly confidential data. Furthermore, encryption can be carried out symmetrically or asymmetrically depending on the requirements. Lastly, encryption keys are vital to protect, as leakage of encryption keys may result in a complete exposure of confidential information.
Preview sample
Profit Implications of Malware Information Technology Annotated Bibliography
15 pages (3750 words) , Download 3 , Annotated Bibliography
Free
Viruses are small software programs that are designed to spread replicate from one computer to another. They are malicious as they interfere with the normal computer operations. A virus operates either by deleting or corrupting data. There are several categories of viruses these are macro virus, email virus, multi-variant virus.
Preview sample
Diagnosis of the Situation of Google Information Technology Research Paper
11 pages (2750 words) , Download 3 , Research Paper
Free
It is evident from the study that introduction of IT created a worldwide revolution, which enhanced the passion of search engines with the help of internet. Among numerous search engines, the brand image of Google is quite significant and renowned, which is one of the greatest strengths of the organization.
Preview sample
Implementing E-Healthcare in Saudi Arabia: Opportunities and Challenges Information Technology Literature review
11 pages (2750 words) , Download 4 , Literature review
Free
According to the study amid the various challenges that are faced with respect to the inclusion of e-health in the KSA, it is crucial to note that, with enhanced perspective and effortless measures, the results are very robust. The government of the KSA has the capacity to uphold and support the project; it only requires availing a taskforce to look into the carrying out of the whole process and its effectual implementation.
Preview sample
Risk Management of UAE Academy Information Technology Case Study
9 pages (2509 words) , Download 3 , Case Study
Free
The risk management process must follow a process of periodic assessment for continuous improvement. The risk management framework for the ‘UAE Academy’ will primarily address the purpose followed by risk process, risk identification, Risk analysis along with qualitative or quantitative risk analysis, risk response planning, and risk monitoring controlling, and reporting.
Preview sample
Transaction Security in E-commerce Information Technology Research Paper
10 pages (2500 words) , Download 3 , Research Paper
Free
This study has presented a detailed analysis of the security issues and threats that can take place while using the Internet for performing business transactions. This paper has discussed the ideas of various researchers along with suggestions that can help the businesses improve their e-commerce related capabilities.
Preview sample
A Student and Faculty Web-portal Design Information Technology Research Proposal
5 pages (1269 words) , Download 4 , Research Proposal
Free
Students would also like to access their records from the same website. It would therefore be overloading if all these processes are done from one website. There is therefore a need to separate these two different processes. The purpose of this project then, is to come up with a web portal that will handle student access to their data records.
Preview sample
Computer Science and Information Technology in HR Department of an Organization Information Technology Research Paper
9 pages (2250 words) , Download 2 , Research Paper
Free
The discussion seeks to answer the question: How information technology and computer science function in HR department? How information technology and computer science help the easy identification and coordination of data? How it helps to improve the overall problem solving and communication skill of the HR department of an organization?
Preview sample
ABC Hospital Staff Allocation Information Technology Essay
32 pages (8000 words) , Download 2 , Essay
The aim of the paper is to develop an application that given a set of patient constraints will produce a hospital schedule that will try to satisfy the patient’s needs. Some of the needs a patient might require: - Patient only available at certain hours - Patient only available at certain days - Patient may need to attend hospital roomes at the same time with his brother or sister
Preview sample
The trouble with Lichen. novel by John Wyndham and Short circuit movie review Information Technology Literature review
18 pages (4500 words) , Download 2 , Literature review
Free
“The trouble with Lichen.” by John Wyndham. The author of the novel takes a futuristic view into the next century and writes a book that has an interesting plot of a young biochemist that stumbles on a strain of Lichen that has the ability to prevent the process of ageing.
Preview sample
The Impact of Information Technology on Photojournalism Information Technology Essay
14 pages (3500 words) , Download 3 , Essay
Free
Information Technology influences the results of photojournalism’s outputs. The research focuses on the essence of information technology on photojournalism. The research includes the importance of photo journalism on both the makers and the viewers of the journalism photos.
Preview sample
Technology acceptance model (TAM) Information Technology Article
16 pages (4000 words) , Download 5 , Article
Free
According to the research findings Technology Acceptance Model (TAM) was a great deal easier to utilize, simpler and much more powerful model for determining and forecasting users’ acceptance of computer technology as compared to other models. An organization must study this model before introducing a new technology or system to their staff members.
Preview sample
Practical Storage Management Information Technology Research Paper
13 pages (3250 words) , Download 2 , Research Paper
Free
This research tells that practical storage management is all about assessing the online storage system and ensuring that all the entire process of storing data, information in documents, folders and files are well protected and reliable. The process of practical data storage is very complex and involves a lot of activities and operations such as data organization, device concept, data management and tools among others.
Preview sample
Network Security Threats and Their Solutions Information Technology Literature review
11 pages (3023 words) , Download 2 , Literature review
Free
Traditionally, communication was highly based on sending and receiving letters among other primitive methods, such as smoke signals, horn blowing, as well as communication through the word of mouth. These channels were time consuming and, on top of that, they were subject to distortion.
Preview sample
Cyber Bullying in Schools Information Technology Term Paper
12 pages (3000 words) , Download 5 , Term Paper
Free
The paper looks at the various methods that are used in perpetrating cyber bullying, including emails and social media sites. The study also looks at the various stakeholders who can act in order to create and implement legislation and school programs that will help in diminution or extinction of cyber bullying; these include governments and the school administrations.
Preview sample
Online Payments Assurance and Security Information Technology Term Paper
24 pages (6000 words) , Download 3 , Term Paper
Online payments have been gaining greater impetus in the recent years. Along with this fact, it has also been observed that e-commerce is also rapidly gaining huge popularity. Although the traditional modes of payments such as cash and cheque are still in use, however the modern methods of payments has become more well-liked.
Preview sample
Optical Fiber and WLAN Information Technology Essay
12 pages (3000 words) , Download 4 , Essay
Free
Wireless Ethernet networks were accepted several years ago, as traditional connectivity solutions were replaced by robust wireless connectivity solutions. Although, several industrial protocols utilized standardized Ethernet physical layer that facilitated automation protocols to be transmitted via wireless media Commercial off the Shelf (COTS) (Brandt, Piggin 2006).
Preview sample
Enterprise Resource Planning Analysis Information Technology Essay
12 pages (3198 words) , Download 2 , Essay
Free
ERP aims to make the business processes more efficient and effective so that the overall yield of the business can be increased, along with reducing the errors incurred during business dealings (Logan, 2007). The traditional business setup is concerned with various functions, or departments, in large-scale organizations.
Preview sample
PHP Benefits vs. ASP.net Information Technology Dissertation
32 pages (8080 words) , Download 2 , Dissertation
To ensure that both languages are not discriminated basing a specific weakness, various properties are analyzed before a conclusion is drawn. The various factors that influence the performance of the two languages and the outcome will show the exclusive strength of the two languages in terms of the performance.
Preview sample
Smart Meters Privacy Concerns & Solutions Information Technology Dissertation
14 pages (3899 words) , Download 2 , Dissertation
Free
The dissertation will be studying the issues surrounding the recent release and distribution of Smart Meters, the threats to privacy, and the exposure of Sensitive Personal Data. The Smart Meter will be placed against the backdrop of two conflicting scenarios, one promoting and encouraging its usage due to increased consumer convenience and awareness of electricity usage.
Preview sample
Arabic learning tools. Kingdom of Education web based platform development. Project evaluation Information Technology Essay
17 pages (4250 words) , Download 2 , Essay
Free
At the present, use of the Internet has become very common among people. They make use of this innovative technology to communicate with friends and relatives, for shopping, entertainment and so on. In this scenario, the Internet distributes information and data using web sites.
Preview sample
Online flower ordering system Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
Company Vision and Mission Our vision is to become the leading florist in the locality. We seek to be the most sought after company amongst the local people for delivering flowers reliably. We value the satisfaction of our customers and aim at being part of their memorable moments in life.
Preview sample
Information Security Risk Assessment Framework Information Technology Annotated Bibliography
15 pages (3750 words) , Download 12 , Annotated Bibliography
Free
The framework should provide operational information and oversight in all sectors in IT security in relation to risk management framework. A clearly defined reporting and escalation thresholds are then incorporated by the framework. Mechanisms responsible for report coding must consider risk and control dimensions.
Preview sample
National Identification System in the United States Information Technology Essay
23 pages (5750 words) , Download 2 , Essay
The issue of having National Identity Cards has been a subject of debate for quite some time in the United States. Those in favor state that having national identity cards will improve national security as it will protect the Americans from terrorists, and likewise discourage illegal immigrants from entering the country.
Preview sample
Testing Analog and Mixed Signal Circuits With Built In Hardware Information Technology Research Paper
20 pages (5000 words) , Download 2 , Research Paper
Free
System-on-chips (SOCs) with built-in hardware and analog mixed-signal embedded-core-based are intended to be tested with the help of this paper. In this article the method used for testing the components of analog mixed-signal circuit is oscillation-based built-in self-test (OBIST).
Preview sample
Developing an Interactive Secure Website Information Technology Essay
22 pages (5500 words) , Download 2 , Essay
Developing an Interactive Secure Website Abstract This project report depicts the possible applications of IT in the social setting. The photo sharing website information system is an application that encompasses the conveyance of information in regards to the possible socialization techniques of the community.
Preview sample
Cyber/digital Attacks Information Technology Literature review
12 pages (3295 words) , Download 3 , Literature review
Free
The different types of attack that are detriment to cyber security are Keylogging and spyware Description The first digital attack is keylogging and spyware. This is a malware that is built to illegally obtain, track and block the right of a user to get access to the system.
Preview sample
Potential Security Threats and Challenges for Hybrid Cloud Solution Information Technology Coursework
13 pages (3705 words) , Download 4 , Coursework
Free
Internet activists seek to influence the policies of governments or corporations across the globe. Internet activists use a variety of information that can assist them to use the internet effectively for their cause. Some internet activist just like hackers tends to disrupt normal online operations of the target organization, in addition to blocking online access to targeted facilities.
Preview sample
Reliability of a Hypervisor Information Technology Capstone Project
42 pages (10434 words) , Download 2 , Capstone Project
In IT, infrastructure, virtualization can be illustrated from a technical or economical point of view. Virtualization is, therefore, the abstraction of a physical computing surrounding using created virtual resources to generate a logical simulated surrounding can be looked upon as an instance of a technical description.
Preview sample
Virtual Machine Ware Project Information Technology Research Proposal
19 pages (4786 words) , Download 3 , Research Proposal
Free
This allows sharing of one physical server with many others and in a way provides the imagination that each client has its own linked server. Many operations like web hosting and e-mail management among others. Visualization is undoubtedly embraced as a way of minimizing costs through ISP clients sharing web hosting expenses which reduces the costs considerably by more than 70%.
Preview sample
Cloud Computing as a Value Driven Technology Information Technology Report
14 pages (3855 words) , Download 3 , Report
Free
Likewise, risk factors are also being considered, as the risk, mentioned in the underpinning contract is now owned by a third party i.e. cloud computing vendors. Martin Sandler, who is a director of HP systems security Lab says, “People often think of virtualization as adding to security problems, but it is fundamentally the answer to a lot of those problems,” (Anthes 2010).In a nutshell, cloud computing delivers major advantages along with negative consequences as well.
Preview sample
Toward Delivery of Effective Mobile Government Information Technology Literature review
11 pages (3004 words) , Download 3 , Literature review
Free
The implementation process still has a lot of challenges that still need to be perfected. This includes attaining the level where everybody is mobile phone literate and coming with alternatives that will safeguard each person’s culture. For perfect execution, the government needs to correlate with its citizens as well as all its stakeholders.  
Preview sample
Delivery of Effective E-Government Services. The case of Oman Information Technology Coursework
10 pages (2500 words) , Download 2 , Coursework
Free
The client is the Information Technology Authority (ITA) who is engaged in implementing the national information technology infrastructure by undertaking projects and ensuring close supervision with regard to the execution of the digital Oman strategy (e-Oman) thus enabling sound leadership and direction for other e-governance ideas of the sultanate of Oman.
Preview sample
Comparing Two Penetration Testing Methodologies. Penetration Testing versus Vulnerability Assessment Information Technology Dissertation
19 pages (4750 words) , Download 5 , Dissertation
Free
Penetration Testing, which is commonly termed to as PenTest, refers to a process that is normally followed during the auditing or assessment of hardcore security. This methodology consists of a set of practices, rules, methods and procedures which are normally followed and later implemented in the process of auditing programs on any information security in an operating system environment.
Preview sample
Network Protocol Analysis Information Technology Essay
19 pages (5264 words) , Download 2 , Essay
Free
It caused a considerable transformation in the understanding, thoughts and ways of thinking of the people. It is an admitted fact that computer technology has affected many parts of our life by playing a vital role. Business organizations are adopting modern and innovative tools and technologies to survive in this ever-increasing competitive world.
Preview sample
Data Privacy and Security Information Technology Research Paper
12 pages (3320 words) , Download 2 , Research Paper
Free
The key way of ensuring the security of data and information on transit is making sure that the laid network devices are protected from any vulnerable attack like theft since a breakdown in the physical network setup weakness gives an opportunity to attackers. Ensuring that the intellectual property is secured is a significant factor.
Preview sample
Network Systems and Technology Information Technology Term Paper
12 pages (3270 words) , Download 2 , Term Paper
Free
The network server can be a domain controller, firewall, or Windows NT server. The requirement of the network server will emphasize on the requirements of the network. A large Network containing network nodes more than 50 may require a domain controller for the administration and configuration of user accounts and permissions.
Preview sample
Network Security Tools Comparison Information Technology Case Study
9 pages (2728 words) , Download 3 , Case Study
Free
After comparatively analysing GFI LANguard and DragonSoft Vulnerability Management (DVM), it is clear that each has its advantages and disadvantages. For instance, GFI Languard is superior while considering criteria 1 and 2. In this case, the superiority comes from the frequent updates on the vulnerabilities database and its easy setup in scan multiple hosts.
Preview sample
E-Governance in Angola Information Technology Dissertation
37 pages (9719 words) , Download 3 , Dissertation
Information and communication technology (ICT) is a vital subsector playing pivotal roles in socio-economic and political development in the world. This sphere of influence is evident in the rapid expansion of ICT, which is gradually shaping the world to new economic magnitudes. Currently, the majority of the countries in the third world are anxious to change their system of governance for the better in various ways.
Preview sample
10201 - 10250 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us