StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Donald Arthur Don Norman's View on Human-Computer Interaction Information Technology Literature review
19 pages (5222 words) , Download 1 , Literature review
Free
Donald Arthur "Don" Norman is one of the renowned scholars in the field of Human-computer interaction, particularly the interaction of humans with the designed world. He is an intellectual in cognitive science, design, as well as usability engineering whose works have had a huge impact on the field of Human-computer interaction. 
Preview sample
Effects of Internet on Politics and Social Life Information Technology Essay
6 pages (1746 words) , Download 0 , Essay
Free
Prior to the diversifications of the internet, people were compelled by circumstances to communicate but its spread has contributed to mute relationships. For example, it is quite possible to board a train or a plane but you will not communicate with the person seated next. This is only because that you may have a PC or tablet that you are using to surf the internet.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
-5%
Apply my DISCOUNT
Technological Inventions in Enhancing the Quality of Life Humanity Information Technology Essay
6 pages (2436 words) , Download 0 , Essay
Free
Elgin (2006) observes that the internet has necessitated the growth of an online community that allows people to connect and share information on various issues through social sites and micro-blogging sites. This offers individuals to build social contacts, thereby expanding the social network of individuals (See Appendix 4).
Preview sample
Ways in Which Social Affiliation can Be Strengthened Information Technology Research Proposal
20 pages (6255 words) , Download 0 , Research Proposal
Free
Social affiliation is interpreted in terms of two basic models: the social affiliation model and the multidimensional model of social affiliation. The proposal also contains information about the objectives of the research, the questions to be used in the research, and a brief definition of key terms that will be used in the research.  
Preview sample
Ethical and Privacy Issues in Big Data Information Technology Report
18 pages (5011 words) , Download 0 , Report
Free
As already noted, three elementscharacterizebig data: velocity, variety, and volume. Many organizations regard the volume of big data as “big.”According to the references from various organizations, the volume is a relative term. This is because some organizations may have data sizes in gigabytes, petabytes, or terabytes, or even exabytes for big global enterprises (Matteson, 2013).
Preview sample
Social Technology Deep Dive: Facebook Information Technology Case Study
10 pages (2890 words) , Download 0 , Case Study
Free
Since time immemorial, businesses have relied on customer feedback as the best way to know how business is doing in the industry. Today, more than ever, customer feedback has proved to be is one important, if not the only, aspect that business owners cannot do without, and organization CEOs cannot just brush off. 
Preview sample
Identification of Underlying Technologies: Case of Instagram Information Technology Case Study
8 pages (2302 words) , Download 0 , Case Study
Free
Mobile applications have been characterized by rapid rates of innovation. With a high rate of changes in the tastes and preferences of consumers, developers of mobile applications have been forced to continuously adapt to rapid innovations. These innovations have sought to either improve existing applications or develop entirely new ones in the market.
Preview sample
Air Traffic Control System Information Technology Report
9 pages (2594 words) , Download 0 , Report
Free
The air traffic control system has considered a traffic control system as a critical infrastructure that has a role in the commercial business of an economy and requires fostering an environment that ensures the safety and easy mobility of the people. This will require protecting the air traffic control system both from physical and cyber attacks.
Preview sample
The High-End Model Computer Owned by Apple Inc Information Technology Case Study
5 pages (1528 words) , Download 0 , Case Study
Free
Taste has increasingly become a process through which social actors or individuals construct clarification about their social environment, classifying practices, people, and other things into groups of unequal values. Such differences are displayed in form of manners, habits, conservation, and possession of some goods.
Preview sample
Survey in Multimedia Data Mining by Content in Social Media Information Technology Literature review
9 pages (2420 words) , Download 1 , Literature review
Free
A range of community services, as well as Web-based sharing like YouTube and Flickr, have made a massive and hastily mounting amount of multimedia content accessible online. Content uploaded by partakers in these vast content pools is escorted by wide-ranging forms of metadata, like descriptive textual data or social network information.  
Preview sample
Virtualization Comparison: VMware, Microsoft Hyper-V and VERDE Information Technology Term Paper
6 pages (1842 words) , Download 2 , Term Paper
Free
In conclusion, it is evident that virtualization solutions play an important role in terms of increasing the efficiency of desktops and servers. It is also evident that each of the virtualization solutions offers unique services to the users. The experience of the users is also enhanced through the virtualization process.
Preview sample
Evaluation of Network Access Control Information Technology Report
5 pages (1634 words) , Download 0 , Report
Free
The paper " Evaluation of Network Access Control " is a perfect example of a report on information technology. Network access controls (NAC) can also be referred to as network control admission. They are security bolstering methods of a selected network where network resources are restricted to end-point procedures that are aimed at complying with a certain security policy.
Preview sample
Integrating Mobile Device Management Information Technology Case Study
9 pages (2587 words) , Download 0 , Case Study
Free
An overwhelming majority of phones in the market are what is known as a smartphone. Smartphones take about 75% of the phone market (Hamelsbach, 2013). A smartphone refers to a mobile phone which is based on a mobile operating system. Smartphones have more computing and connectivity capabilities than ordinary phones (Ilyas & Ahson, 2006).
Preview sample
How IT Improves Business Transactions Today Information Technology Term Paper
8 pages (2330 words) , Download 0 , Term Paper
Free
Among the notable changes in the way that businesses conduct their transactions today. With the advent of IT, most people in the world have found it easier to do business and commercial transactions over the Internet platform. Many people operate through virtual offices, making and executing business transactions from the comfort of their homes.
Preview sample
End Point Protection Comparison Information Technology Report
8 pages (2185 words) , Download 0 , Report
Free
Cloud’s is the next front in organizational computing. The provision of cloud-based services such as Sophos Live Protection provides new opportunities for real-time protection and eliminates the need for onsite software installation and management. The choice of any one solution among the three is dependent on a lot of factors and needs best outlined by each organization.
Preview sample
Network Infrastructure Improvement Information Technology Case Study
10 pages (2635 words) , Download 0 , Case Study
Free
In the business world, technologies provide a competitive advantage if timely adopted and deployed. Technologies help in reducing inefficiencies and closing gaps that increase business costs. In the DoD, technologies are employed in order to maintain secure communication in various places. This is important for national security.
Preview sample
Sustainability of Methodologies for the Development of a Fixit TV and Video Information Technology Report
37 pages (9642 words) , Report
Nobody downloaded yet
In SSADM, products are clearly defined by a product breakdown structure, and at every stage; a fixed amount of product is produced. There are detailed deliverables at the end of every phase until the system is delivered at the end of the lifecycle. The methodology thus does not meet this criterion because it does rapidly deliver the product.
Preview sample
Cloud Computing - Demerits and Benefits with Emphasis on Cost, Data Availability, and Data Security Information Technology Thesis Proposal
4 pages (1016 words) , Download 0 , Thesis Proposal
Free
The paper “Cloud Computing - Demerits and Benefits with Emphasis on Cost, Data Availability, and Data Security” is an intriguing example of a thesis proposal on information technology. Cloud computing is one of the most demanded and talked technologies in the contemporary world. The technology has got attention from both professionals and the media for its opportunities it offers to the market.
Preview sample
Development of Social Networks Information Technology Essay
7 pages (2356 words) , Download 0 , Essay
Free
The social network is arguably developing as the leading platform of getting news especially on the trending fashion and brands that rule the day. Most marketers are still struggling to find the best ways of promoting and ensuring sustainable development of their brands on social networking platforms.
Preview sample
Cloud Computing and Threats to Corporate Privacy Information Technology Research Paper
18 pages (4886 words) , Download 2 , Research Paper
Free
Maximizing user control is another important issue. Trust is one of the most important components in looking to develop a technology for a mass market; lack of control could have an indirect impact and result in distrust of the organization. Cloud computing increases risk, as personal information could be misused, leading towards distrust.
Preview sample
Context-Aware Sensor Networks for Smart Environments Information Technology Essay
22 pages (6162 words) , Essay
Nobody downloaded yet
Sensor-based applications of the early days had independent application domain and hardware platforms. Because of this, many sensor-based devices for new scenarios must be developed from scratch. This paper presents a detailed discussion of various aspects of context-aware sensor networks in smart environments.
Preview sample
The Mechanism of Data Mining Information Technology Term Paper
21 pages (6074 words) , Term Paper
Nobody downloaded yet
Presently, every organization understands the importance of online marketing and as such, cannot afford to ignore the importance of social media as a platform for reaching potential customers. Leveraging social media as a way of marketing business creates a lot of buzz for the product. Social media continues to increasingly grow in popularity.
Preview sample
Usability Testing and Heuristic Evaluation - Website Interface Design Information Technology Literature review
11 pages (2996 words) , Download 0 , Literature review
Free
Designers are concerned with user interface and overall system usability (Frankilne and Coustan 2013).  The user interface, in this case, is the machine’s industrial design that is supposed to facilitate quick interaction between humans and itself. The goal of this interaction is to enhance the effective control and operation of the machine and end-users.
Preview sample
Effects of Facebook Mobile Advertising on Australian Teenagers Social Life Information Technology Research Paper
9 pages (2644 words) , Download 0 , Research Paper
Free
These effects are both positive and negative. This research will delve into this matter in a way that there will be research not only in as far as Australian teenagers are concerned but also a brief exploration from other states. This is because the effects of Facebook mobile advertising are almost similar all around the world.
Preview sample
Internet and National Boundaries Information Technology Research Paper
10 pages (2962 words) , Download 0 , Research Paper
Free
The current media ecology encompasses an interdependent system with local, national, and international actors. The introduction of the Internet has led to the removal of barriers and opened a space for individuals, non-state actors, and civil society organizations. This discussion aims at unraveling the importance and centrality of the Internet in modern society.
Preview sample
ICT Outsourcing vs Cloud Computing Information Technology Report
14 pages (4240 words) , Download 0 , Report
Free
Presently, there is an augmented recognition that worldwide markets have experienced regulatory transitions. In the information communication technology sector, in the perspective of bigger service suppliers as well as providers, there is noteworthy stress rooted in decreasing the project's business outlay particularly with additional antagonistic opposition from less significant firms.
Preview sample
Concept of Digital Divide Information Technology Report
8 pages (2502 words) , Download 1 , Report
Free
The term digital divide was developed in the mid-1990s to the gap that separates individuals who have access to news forms of information and communication technology and those that do not. It has earned many definitions since. Indeed, some researchers have restricted their definitions to access to digital information and communication technology.
Preview sample
Integrated Learning & Social Development Information Technology Report
6 pages (1559 words) , Download 0 , Report
Free
According to Gaad et al. (2006), assistance for any local calamity is offered from an adversity fund, which as well assists families whose bread winner is not capable to work for the reason of infirmity, old age, or disability. The assistance offered is under the National Assistance Law, and if the man of the house dies his spouse's future is protected.
Preview sample
The Key Failure Points in the Tjx System Information Technology Case Study
7 pages (1890 words) , Download 1 , Case Study
Free
Some threats that could have attacked Tjx may have included the following e.g. Espionage, by extortion i.e. can be blackmailing a mail clerk, the hardware failure that can be as a result of the firewalls blocking all the traffic causing errors, human errors, sabotage by the use of a worm to delete files, software attacks, software errors or failure, technical obsolescence among many other factors.
Preview sample
Rapid Internet Growth and Its Sustainability Information Technology Literature review
9 pages (2509 words) , Download 0 , Literature review
Free
It is viewed as the highway to achieving the global village vision in the near future that will change the way business transactions are handled, advance how people communicate and improve efficiency in all areas of operations. The recent growth of the technology has led to internet being embraced in almost all sectors of operations for improved services and products.
Preview sample
Information and Environmental Scan Information Technology Essay
6 pages (1883 words) , Download 0 , Essay
Free
In this sense, any observation may be considered data and once processed and made meaningful to a recipient it is then defined to be information. Information is data that minimize the options available to a manager. An uninformed manager can do anything; an informed manager is likely to have less rational options.
Preview sample
Business Communication Systems Information Technology Essay
11 pages (2888 words) , Download 1 , Essay
Free
Communication is whereby an individual person receives from or sends information to another individual. The information could be about one’s desires, ideas, skills, etc. communication can be categorized into different forms i.e. spoken or of different modes. In communication, we have the message, the sender, the medium, and the recipient of the information.
Preview sample
Positive and Negative Effects of the Internet Information Technology Essay
5 pages (1595 words) , Download 0 , Essay
Free
The paper “Positive and  Negative Effects of the Internet” is a  spectacular variant of an essay on information technology. Internet is the connection of computers to communicate messages using wireless devices. In the modern world, internet has become a major channel of communication and is being used by many people including the young and old.
Preview sample
Software Spending in This Rapidly Changing World Information Technology Report
14 pages (4055 words) , Download 0 , Report
Free
Cell phones for instance require a lot of software programs to run the different applications they offer. Satellites on the other hand require an embedded software system that guides and controls them accordingly in space. The cardioverter-defibrillators require pacemakers that can ensure that the pace corresponds to the heartbeat.
Preview sample
Information Management Systems in Health Institutions Information Technology Case Study
6 pages (1818 words) , Download 0 , Case Study
Free
Management of patient information is significant in any health institution since it helps in the provision of quality healthcare services to patients. There is an increase in technological changes which determine how healthcare activities are supposed to be conducted in a way that leads to efficiency in service provision.
Preview sample
Network Performance And Dynamic OD With Bluetooth Data And Wi-Fi Information Technology Speech or Presentation
4 pages (1242 words) , Download 0 , Speech or Presentation
Free
The paper "Network Performance And Dynamic OD With Bluetooth Data And Wi-Fi" is a wonderful example of a speech/presentation on informational technology. Gives a comprehensive knowledge of Personal Area Network interface features and devices (PANs). Explores how Blue tooth and Wi-Fi works. Gives an overview of devices involved in wireless connection.
Preview sample
Evaluation of Cerner Information System at the Ministry of Health, United Arab Emirates Information Technology Term Paper
7 pages (1750 words) , Download 0 , Term Paper
Free
The application of modern IT solutions in health care institutions brings in a tremendous improvement in the quality of health care service delivery since it minimizes clinical errors and fastens processes (Cerner, 2013). Evaluation of user satisfaction is often used as a yardstick for the achievements of an information system.
Preview sample
Analysis of the Technology in Healthcare Information Technology Case Study
7 pages (1969 words) , Download 1 , Case Study
Free
First, the sensitization of senior nurses on the advantages of electronic medical records is very important for the future state of the information system in the hospital. Second, education on the use of electronic medical records is very important in the future to avoid errors in data entry and processing.
Preview sample
Recent Developments in Data Warehouses and Its Application in E-Commerce Information Technology Article
17 pages (4272 words) , Download 0 , Article
Free
All components of the data warehouse improve the data extraction procedure and the views for achievement. Data marts, such as online analytical processing are an architectural annex of a data warehouse for the reason that the mart has tailored data and runs on data at an extreme level of summarization. Data warehousing is a tactical enterprise and IT scheme in various organizations at the moment.
Preview sample
Linux Booting Process Information Technology Essay
5 pages (1666 words) , Download 0 , Essay
Free
The paper "Linux Booting Process " is an excellent example of an essay on information technology. In a nutshell, the Linux booting process starts from the BIOS where the MBR is executed after the integrity check is performed before the MBR loader is executed. 
Preview sample
Oracle Database Tuning Plan Information Technology Report
7 pages (1958 words) , Download 0 , Report
Free
Performance tuning is aimed at identifying and reacting to performance problems, preventing this problem from occurring in the future, meeting service levels and requirements, optimizing usage of available and avoiding upgrades, and ensuring the application meets organizational and customer needs (Powell, 2007, p.27).
Preview sample
Developing Business Information System Solutions Information Technology Term Paper
9 pages (2250 words) , Download 0 , Term Paper
Free
Amalgamated Construction and Garden care will need key information regarding their customers, construction companies they contract, their workers as well as information about the management staff itself. With regard to construction companies that are contracted to undertake construction work, the company will need information about previous construction projects undertaken by the company.
Preview sample
Information System Management: Healthy Snacks Information Technology Case Study
8 pages (2000 words) , Download 0 , Case Study
Free
The errors within the sales and marketing department are eliminated through the use of the system. This is achieved as real-time data is used during the operations of the company. The master data is usually updated and the information is distributed to all the departments. This ensures that access to information is made easy. 
Preview sample
Red Sky Travel Company Information Technology Report
19 pages (5233 words) , Download 0 , Report
Free
The report intended to improve user interaction with the system as well as help prepare new users on the aspects of the system. Since the review process is part of the system implementation, it was initiated by Wilson consulting company who is responsible. The report will be handed to the managing director of Red Sky Travel company, Philip Spector for appropriate action to be taken.
Preview sample
Investigating an Instance of Information Technology Systems Information Technology Assignment
11 pages (3143 words) , Download 1 , Assignment
Free
Based on taxonomy one, Computer-Aided Despatch (CAD) system project endured correspondence failure, which occurs when a project fails to meet its predefined business objectives laid down by top management. Essentially, the CAD system's primary objective was to computerize numerous of the human-intensive procedures entailed in the manual despatch system.
Preview sample
Cloud Computing Information Technology Literature review
7 pages (1787 words) , Download 0 , Literature review
Free
Some of the services highlighted in this report include Software as a Service (SaaS), Infrastructure as a service (IaaS), Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS), and Desktop as a Service (DaaS). There are numerous service providers offering this service and consumers choose their providers depending on the reliability, quality of service as well as competitive prices.
Preview sample
The Skills in Computer Engineering Information Technology Assignment
13 pages (3460 words) , Download 0 , Assignment
Free
Rijndael is one of the most secure encryption software that used by organizations to protect their data. This software has been voted as the best by most of the users who have found it efficient in terms of safeguarding the systems. It is thus evident that the encryption process is beneficial in terms of safeguarding confidential information.  
Preview sample
Information Communication Technology Information Technology Report
11 pages (3045 words) , Download 1 , Report
Free
However, he plans to conduct feasibility, as well as a sensitivity analysis to determine whether converting to predominantly electricity would yield improved benefits, or if it were better to retain petrol engines or come up with other alternative renewable supplies of energy such as alternative fuels.
Preview sample
Computer Forensics Issues Information Technology Report
13 pages (3583 words) , Download 1 , Report
Free
Recent developments in information technology and the increased use of technology in business operations have increased the need to safeguard sensitive and valuable business information from third parties. Such third parties could be cyber-criminals, both within and outside organizations, who use computer technology as a means to commit criminal activities.
Preview sample
Snail Mail vs Email Information Technology Report
6 pages (1776 words) , Download 0 , Report
Free
Emails are therefore the most preferred means of communication because of their enhanced platform. Emails have significantly changed modern life and communication as a whole; it has basically set the pace for the evolution of other new platforms that depend on mails. While the core function of emails was to send emails faster, other value-added services have been integrated into emails.
Preview sample
1001 - 1050 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us