StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Web Analysis of Argos Retailers Information Technology Case Study
10 pages (2903 words) , Download 1 , Case Study
Free
The review of Argos will entail an overview of the company website, by highlighting where and what web analytics techniques and tools can be used to improve the site use. Some of the techniques or tools that will be used comprise browser type, page views, hits, clickstreams, and traffic patterns. The tools support the correct usage and operation of the websites.
Preview sample
Bens Online Fashion Shop Information Technology Case Study
10 pages (2824 words) , Download 1 , Case Study
Free
This paper tells that traditional business communication used to be face-to-face and later telephones but with technological advancement, there are new forms of communication in business. Software developers are coming up with different communication applications that are significant in business transactions. 
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Internet in Egypt Information Technology Report
9 pages (2665 words) , Download 0 , Report
Free
Since then, the quality of the Internet has improved and more users have been reported. The number of Internet users utilizing numerous strategies such as through phones and computers increased tremendously. The Internet is provided by two infrastructure companies and eight service provider companies. These eight service provider companies later sell the services to more service providers.
Preview sample
Survey of Information Systems Personnel Theory Information Technology Assignment
12 pages (3351 words) , Download 1 , Assignment
Free
Web services are applications that communicate using open protocols such as the Internet. These services allow communication between organizations without prior knowledge of the organizations over a firewall. Instead of providing Graphical User Interfaces (GUI), they share data, processes, and business logics over networks. 
Preview sample
How Technology Impacts Our Everyday Life Information Technology Term Paper
27 pages (7163 words) , Download 2 , Term Paper
Technology is around all the time; the recent rampant use of cell phones, computers, and television can tell it all. The use of technology per se is not of recent origin; it is as old as mankind and has undergone transition many years down the line, from the early days of using the printing press and the first cellular phones to the use of more sophisticated information systems in the present.
Preview sample
4G: The Next Standard Phase in Communication Information Technology Report
6 pages (1861 words) , Download 0 , Report
Free
A special focus will be given to 4G, which are the latest standards in the market. With respect to 4G networks, the app will analyze the different bandwidths in various countries which makes it impossible to get gadgets that can work in all parts of the world.  The report will also evaluate the input which the Qualcomm RF360 Chipset, a chip with roaming capabilities, will have on 4G.  
Preview sample
Happy Cow Dairy Company: Information System Information Technology Case Study
9 pages (2594 words) , Download 1 , Case Study
Free
Happy Diary Company uses a manual system to keep its records of everyday transactions. Each driver has around the book to record milk that is taken round. This can be very demanding and time-consuming for the drivers who have to meet deadlines other than spend time filling the diary book. Time is an important factor in the company’s operations. 
Preview sample
IS IT Strategy Module Information Technology Report
17 pages (4587 words) , Download 0 , Report
Free
The goals and objectives of the company should then be identified in relation to the information technology infrastructure. This process should involve all the experts in the information technology department. New visions or missions should be developed at this point so as to ensure that it is in line with the strategies of the company.  
Preview sample
Feasibility of Censoring the Internet in the US Information Technology Report
15 pages (4305 words) , Download 0 , Report
Free
It analyzes by looking at the roles or responsibilities of the US department of defense to the citizens or nationals of the United States. In the process of analysis, the report looks at how the Internet came to be associated with the department of defense or the military in that matter as a form of introduction.
Preview sample
Introduction to Information System Information Technology Report
8 pages (2427 words) , Download 0 , Report
Free
The system usually involves some term for the wide set of activities that enable the business to manage the most significant sections of the business. The detail of information that is made available through the system of ERP helps in the provision of visibility for the crucial performance indicators that the organizations require for meeting their objectives.
Preview sample
Uses of Technology during Recruitment and Selection Information Technology Coursework
20 pages (5540 words) , Download 0 , Coursework
Free
The use of simple devices is also an advancement in terms of technology during the recruitment process. It is also evident that the use of technology has multiple benefits to an organization. The ease of recruitment and saving of costs are some of the important benefits of using technology during the recruitment and selection process.
Preview sample
User Interface: The Case of Disneyland Website Information Technology Case Study
6 pages (1753 words) , Download 0 , Case Study
Free
The site does not at any point attempt to explain what is Disneyland and its purpose Disneyland. This may be because Disneyland as a brand is large and ubiquitous and anyone stumbling on the website should know what it is. It may also be an oversight or flaw in the development of the site, either way, it is hard to speculate on this. 
Preview sample
IS-IT Strategy Module Information Technology Case Study
16 pages (4575 words) , Download 0 , Case Study
Free
Avison et al (1994) added to this allegation by claiming that information systems strategy was an important part of the business and had a linkage to the business framework. In their work, they presented a strategic information system as an information system that was intended to enable the operator to gain and uphold a competitive advantage over their rivals in varying environmental conditions.
Preview sample
IT and IS Strategy Module Assignment Information Technology Case Study
19 pages (5069 words) , Download 0 , Case Study
Free
Strategic IT/IS Plans are used by businesses to provide for a forward-thinking approach regarding the management of information technology and related systems in a business. Small level businesses often do not have separate IT/are Plans and instead, employ is as part of business strategic planning.
Preview sample
Vehicle Registration Process in Abu Dhabi Information Technology Term Paper
24 pages (6724 words) , Term Paper
Nobody downloaded yet
Given the competitive business nature around the globe, every single corporation is constantly searching for a way to measure up to the varying demands and needs to fulfill the expectations of its clients. The corporations demand increased control over the business processes through the latest trends. Projects have found their significance here.
Preview sample
Invention of iCloud Information Technology Information Technology Term Paper
7 pages (2112 words) , Download 0 , Term Paper
Free
Myriads of innovations and inventions have been witnessed in the recent past. Computers have penetrated every aspect of our life (Turnbull, 2011). In the current modern-day world, computing is no longer confined to the desktop, with the internetworked universe, networked computing has been ubiquitous and affected every aspect of our lives.
Preview sample
E-Commerce and Neutral Networks Information Technology Case Study
9 pages (2680 words) , Download 0 , Case Study
Free
Under this concept, users do not like waiting for long. They would like to wait for about 3 seconds and could extend their patience to up to 8 seconds. Beyond this time, their train of thought gets disturbed and they get unpleasant feelings about the site. Usually, the user will open another web page, or they will refresh the existing page.
Preview sample
The HYDRAUL UK Information System Information Technology Case Study
10 pages (2879 words) , Download 0 , Case Study
Free
More specifically, I learned that DSS would offer great support to sustainable customer relationship management in the company and all the franchisees. This DSS enhanced CRM would significantly assist in understanding, anticipating, and responding to the needs of customers in a consistent manner, right across the organization. 
Preview sample
Ethics for the IT Professional, Software Contracts and Liability Information Technology Report
7 pages (2101 words) , Download 0 , Report
Free
Respect each IT professional has to show significant regard to themselves and to additional individuals. This is mostly in cases where there are valuable resources that have been entrusted to them. These include money, the safety of other people, people and their reputations, environmental or natural resources (Schultz, 2011).
Preview sample
On the Deep Structure of Information Systems Information Technology Assignment
14 pages (3873 words) , Download 1 , Assignment
Free
Encryption is a process that encodes messages and information in a manner that is impossible to be hacked, read, or heard but allowing authorized parties to do it. The information is encrypted through an encryption key specifying how a message is to be encoded and turning it into unreadable ciphertext. 
Preview sample
Performance of Information Technology Service Management in Australia Information Technology Essay
8 pages (2293 words) , Download 0 , Essay
Free
More organizations like the Dubai Aluminum Company Limited (DUBAL) are also working towards achieving ISO/IEC 20000-1:2005 I.T Service Management certification while incorporating ITSM. The organization has implemented ITIL which is an international operating system to issue instructions for effective IT management.
Preview sample
Web Application Security Information Technology Term Paper
6 pages (1892 words) , Download 1 , Term Paper
Free
The SQL injection utilizes the use of rogue commands to access the website of an organization (Kieyzun, 2009). The database information is usually distorted through the use of unauthorized codes. The passwords or other security details required to access a website are usually distorted and hence enabling access by the intruder. 
Preview sample
Network Security Information Technology Case Study
9 pages (2722 words) , Download 0 , Case Study
Free
The research and solution for Web Soul Ltd. must take into account the business expansion that will take place in the future. These include accommodating future domain hosting requirements, SSL certificates issuance and validation system, Web design and applications, E-shops, and software development and testing requirements.
Preview sample
Secure and Anonymous Browsing Information Technology Literature review
12 pages (3344 words) , Download 0 , Literature review
Free
Secure browsing is a concept that should be looked into to make sure that the users and their content are taken care of. Internet users need to be protected from internet attacks. This is more so given the fact that these users do not have enough computer security and will do things that will compromise their security.
Preview sample
Fundamentals of Network Security Information Technology Coursework
15 pages (4037 words) , Download 0 , Coursework
Free
The risk of overlooking information is minimized through the use of complex and diverse computer forensic techniques, not relying on just one of them as depicted by the article published in the Journal of Information Systems Security (1997). In addition, continuous detailed documentation is performed to reduce the risk of loss of data trail.
Preview sample
Network Simulation for Small Businesses Information Technology Literature review
21 pages (6258 words) , Download 1 , Literature review
In marketing, employees spend a lot of time out of the office, providing ubiquitous access to their workspace can increase the amount of time they work effectively.  Network connectivity increases employees’ collaboration as well as allowing employees to walk around with their laptops without losing productivity(Silage, 2009).
Preview sample
Open Source Enterprise-Wide Systems, Service-Oriented Architectures and Software as a Service Information Technology Essay
9 pages (2502 words) , Download 0 , Essay
Free
Every company similar that is implementing a new production process needs a computing system to support their operations. However, in some cases, implementing the system may force a company to abandon some of its newly developed production processes. Therefore implementing an open-source enterprise-wide system requires a proper strategy. 
Preview sample
Email Security Vulnerabilities Information Technology Report
10 pages (2650 words) , Download 1 , Report
Free
With the electronic world that we have today, email communication remains one of the most essential tools that are used for communication. It forms the backbone of communication in many organizations. The use of email will grow from time to time. As the growth is seen to be exponential, its security is an important aspect that should be considered.
Preview sample
Network Monitoring Information Technology Report
15 pages (3829 words) , Download 0 , Report
Free
With the growth in computer networks that are used in organizations, there is a need to have a way in which networks are managed and monitored. This phenomenon is taking shape as more and more companies develop their intranets. There different types of traffic that are found to be traversing computer networks that need to be monitored.
Preview sample
The Societys Response on Internet Hackers Information Technology Term Paper
12 pages (3279 words) , Download 0 , Term Paper
Free
All over the world, people have continued to live in societies where obeying the laid down rules and laws has become part and parcel of their culture. As a result, there will always be other individuals who are keen on attempting to break the laid down rules, regulations, and laws in order to disrupt society.
Preview sample
Africa: Safaricom Company Limited Information Technology Report
9 pages (2439 words) , Download 0 , Report
Free
Acquisition of cell phones has been on an increasing trend ever since the introduction of mobile handset services. Many people would think that the region is less technologically advanced compared to other continents in the world. Recent technological advancements are extended to the continent, giving it an opportunity to join the world as a global village.
Preview sample
Contemporary Issues in Information Technology Systems Information Technology Essay
6 pages (1678 words) , Download 2 , Essay
Free
Middleware software has the ability to streamline business operations and hence reducing losses in an organization. Agile is one of the most important concepts in the operations of the business. Cost-effectiveness in the business operations is also achieved through the use of this software and hence an advantage to an organization.
Preview sample
Information Management: The Online Students Board Information Technology Assignment
7 pages (2297 words) , Download 0 , Assignment
Free
For the implementation of the online students’ board for the XYZ college database technology, we have decided to implement the MYSQL. The main advantages of a section of this technology platform are: MYSQL is a free system that is having huge market support and technical consultancy. It is easy to use and has wide market consultation and support.
Preview sample
The Impact of Social Media on Culture Information Technology Essay
7 pages (2124 words) , Download 0 , Essay
Free
The article highlights the use of different concepts which has their relevance and usage. The article in a similar manner shows the manner in which technology and the growth of social networking sites can be used for reducing the cultural gaps and ensuring that the required platform is developed for better interaction.
Preview sample
Information Security Information Technology Case Study
13 pages (3859 words) , Download 0 , Case Study
Free
Computer forensics is therefore an important concept used to combat crime in information technology (Heiser et al., 2002). It uses the similar concepts of other forensic sciences to question the law with the main aim of determining whether a crime has been committed or not. Most of the organizations with confidential information about the company products or ingredients have been faced with crimes that require computer forensic.
Preview sample
Violent Video Games Information Technology Report
5 pages (1615 words) , Download 0 , Report
Free
Violent video games refer to the gaming activities administered through the use of video systems that depicts a violent nature that is capable of influencing the users to act violently in real life situation (Craig, Douglas & Katherine, 2007).
Preview sample
Considering the Features of Blackberry Messenger Information Technology Report
6 pages (1858 words) , Download 0 , Report
Free
With Blackberry 5.0, users can utilize the QR code to add friends to their friend’s lists instead of the usual numeric PIN identification or an email address linked with the user’s mobile device. The most recent Blackberry smartphones can allow users to exchange contacts using near Field Communication Technology.
Preview sample
Penetration Testing in Network Security Information Technology Report
10 pages (3085 words) , Download 4 , Report
Free
Clearly, from the above-listed features of the tool, it can impose great losses to an organization’s computer network system. Address resolution protocol spoofing aids in obtaining the network address configuration of an organization. Wireless scanning spoof can result in accessing all details passing from one wireless antenna to another.
Preview sample
Awareness of Online Security Information Technology Report
8 pages (2497 words) , Download 0 , Report
Free
Instead of this development, the issue of online security and security awareness needs to be paid considerable attention. Specifically, on a government level, the issue of online security needs to be addressed with the employees working in the sector need to be well aware of the security policies and practices in place to create a secure virtual working environment.
Preview sample
The Electronic Culture Information Technology Essay
8 pages (2215 words) , Download 0 , Essay
Free
This latest development has been confronted by extensive amplification and accelerated growth which has been spearheaded by the heightened awareness and popularity of multi-user software, networked computers as well as the internet which have been subjected to the elevated investigation (Deuze, 2006, p. 63).
Preview sample
Information Security, Identity Theft and Identity Fraud Information Technology Assignment
8 pages (2229 words) , Download 1 , Assignment
Free
Given that Ethics refers to the way and how people should act, on issues concerning goodness and value of situations and things, Information Security Ethics is” the analysis of the impact and nature of information technology and the relating formulation and implementation of policies for the ethical use of such technology. 9Moor, 1995, p.7)
Preview sample
What Are the Requirements for an Effective Adaptive Learning System Information Technology Research Proposal
6 pages (1969 words) , Download 0 , Research Proposal
Free
The paper details how an effective adaptive learning system for Al-Baha University should look like in terms of addressing the technological needs of the university’s learning process. The identified requirements for an effective adaptive learning system can be used in future activities of developing appropriate and productive adaptive learning systems in other educational institutions.
Preview sample
Data Warehouses, OLAP, and Data Mining Information Technology Assignment
8 pages (2444 words) , Download 0 , Assignment
Free
Dimensional modeling is a particular type of data modeling that is associated with data warehouses. It is significantly different from the entity-relationship modeling that is employed for databases. The dimensional modeling instead involves the denormalization of data that are grouped as per the star schema (Kimball and Ross, 2002).
Preview sample
The Use of Information Systems in Improving Transportation Systems Information Technology Report
8 pages (2350 words) , Download 0 , Report
Free
The process of selecting the host country is rigorous and to the ever-changing environment, various challenges for instance transport problems have been faced in previous Olympic Games. In this regard, strict requirements for instance the capacity to integrated Information Systems into the necessary infrastructure such as transportation and ticketing are observed.
Preview sample
Requirements and Specification: Customer Order Entry System Information Technology Term Paper
13 pages (3205 words) , Download 0 , Term Paper
Free
The testing for the COES application project encompassed the following: system/Integration (combined testing), unit, and acceptance levels. It was planned that the testing personnel for the application would be a single full-time expert to take the process through system/integration testing. However, most testing roles were taken by the test manager – together with the application development team.
Preview sample
Current and Desirable Structure Lockheed Martin Corporation Information Technology Case Study
6 pages (1531 words) , Download 0 , Case Study
Free
The second section of the paper deliberated on sustainability issues where innovation is the guiding principle of Lockheed Martin. The other sustainability issue that surfaced from the paper was environmental care. To address environmental issues, Lockheed Martin considerably reduced air and water pollution in 2012.  
Preview sample
Are Wireless Networks Good Enough to Support Real-Time Traffic for Industrial Control Applications Information Technology Case Study
11 pages (3254 words) , Download 0 , Case Study
Free
The paper argues that the reliability and timeliness of these networks are not up to standard to allow them to be used in industrial control applications. The main concern that has been found to limit the adoption of these technologies in industrial control applications is the interference within and between networks.
Preview sample
Unified Software Development Process and Object-Oriented Analysis and Design Information Technology Literature review
6 pages (1755 words) , Download 2 , Literature review
Free
According to Booch et al. (2007), Object-Oriented refers to a way of developing a robust and flexible software program, and also a means of evaluating problems and developing solutions to the problems. In Booch et al. view, the two concepts are associated in that problem analysis and design of solutions are important prerequisites to the development of a triumphant software program.
Preview sample
Project Management for Business, Engineering, and Technology Information Technology Essay
20 pages (5058 words) , Download 0 , Essay
Free
The client company contributed to the project by employing participants for inclusion in the project and allocating a small budget to the project. Despite the support from the client company, the project faced some challenges, which included the inexperienced state of students who participated in the project and the client company’s unfamiliar state with online reservations or bookings.
Preview sample
Systems Development of Waterfall Approach Information Technology Coursework
9 pages (2629 words) , Download 0 , Coursework
Free
For the sake of IS system procurement, we need to manage and handle a number of aspects. From my personal experience, one of the initial aspects we need to take care of is our already available technology. We need to be careful regarding the application of a new technology-based system with more and compatibility with our previously available technology.
Preview sample
1051 - 1100 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us