Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
12 pages (3892 words)
, Download 0
, Research Paper
Free
Every lecturer at Al-BahaUniversity should have adequate ICT infrastructure that will enhance the quality of teaching. Lecturers should embrace the use of ICT in teaching in order to improve the quality of results. They should use ICT for the purpose of demonstration and assimilation. The Al-BahaUniversity should Organize ICT in-service training programs for all lecturers.
7 pages (2079 words)
, Download 0
, Research Proposal
Free
As the world is attacked by pandemics, which are in epic proportions, many people in the world are affected by diseases, which have no cures like HIV/AIDS, multi-drug resistant tuberculosis, and malaria. Most of these afflictions are experienced in developing countries. Prevention will be hard and difficult to overcome.
Preview sample
sponsored ads
Hire a pro to write a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
5 pages (1566 words)
, Download 0
, Research Proposal
Free
The paper "Improving the Education in Al-Baha University by Using ICT Systems" is a great example of a research proposal on information technology. This section deals with the description of the background to the study, statement of the problem, the purpose of the study, objectives of the study, research questions, justification of the study, scope and limitations of the study.
It is in this phase that the developer will construct the code and ensure that it is well documented. The code will entirely be tested to guarantee that all necessities are met. This phase will be completed once the committee members approve all required documentation as well as, the final version of the software product after the third and last presentation.
Reaching a wider market by firms has been a coveted aspect for decades, but with the introduction of the internet, products have been localized, firms are able to go beyond language barriers and sell their products (Global Partners International, 2011). In addition, Web localization has opened new avenues in education and business.
Management of virtual communities is not that easy a task, It requires people that are knowledgeable and skilled in the field. This is because of the impact that their decisions have on the general running of the community. A decision by the virtual manager may cause the whole system to come to a halt due to stagnation and withdrawal of members.
The use of technology has enhanced in value within the current procurement organization. Simply 17.2 percent of users of rated technology as an extremely significant supporter of their procurement business in 2008. Presently this ratio has improved to 48.2 percent that is an extremely important aspect of new technology support for modern technology-based areas.
The Internet on the other hand has proved to be an important shareholder in this era of Information Technology transformations. Both the developed as well as the developing nations have obtained tremendous benefits that have improved their economies. The various software, as well as the service industries, have expansively helped to enhance various nations’ economies.
The Government on its part is striving hard to wipe out terrorism but the process is slow and long-drawn. The governments of countries like the USA and the UK have made a lot of amendments to their existing legislation in addition to bringing out many antiterrorism activities and policies to curb the escalating terrorism.
Companies must always ensure that the working conditions are in such a way that they create proficiency, quality performance, and productivity and that they ensure maximum security of data. This could be done by for example ensuring that each member of staff dealing with important information regarding the company and its various activities has their own computers.
In every department, there needs to be a record of all the activities that take place there. Therefore, it is essential to keep a good security system that will enhance that the data is not perceptible to malicious users. Group policy objectives assist the user or an administrator to a system to keep the system secure such that no irresponsible or malicious individuals get access to the data.
There is a proposal by the management that the company will be upgraded to be a journalism company. There is therefore a need that the system is upgraded to use Macintosh operating system. They have been using the Windows operating system when they are sending their photographs from the places where they took them from.
The paper "Creativity in Information Technology" is a great example of a report on information technology. Creativity can be defined as the propensity to create or identify ideas, alternatives, or possibilities that may be valuable in resolving difficulties, interacting with others, and entertaining ourselves and others.
The usability problem is defined as an issue that is found in the software product. The following lists of heuristics can help improve the system usability and guide the users with user interaction design. These are close to ten general principles that are used in the user interface design. These are known as "heuristics".
The firm also has plans to requisition a new 40ppm OCR scanner and thus require a better vendor who will supply at a cheaper cost. Furthermore, the firm wishes to install a wireless network that serves the three floors on top of the existing wired infrastructure. The firm also wishes to explore some of the VOIP solutions and evaluation of its benefits to the firm.
Technology has been advancing at a neck-breaking speed for the last three decades. The most notable advances have been made in computer technology, especially in the transformation of the Personal computer and its adoption in many areas of life. In the last 35 years, for instance, the PC has undergone phenomenal innovation to include some life-altering changes, improvements, and additions.
Management of information systems can never be successful if risks that come with these systems are not properly assessed and managed. Companies, organizations, and institutions often come up with projects that are based on information systems. This makes it necessary for elements of Project Management Information Systems to be incorporated into the planning process.
It is a device that will enable access to a network or an internet connection. Here we will require 2X 3G routers for 3G internet access for the two remote branches, an additional 4X 8 port router for the LAN, it is 8 port due to future expansion otherwise a 4 port would be ideal preferably from Cisco system.
Patients express less concern about the threat of security of their EHR records as the benefit of clinical use of computerized systems far outweighs the security risk involved. In a study carried out in Canada, it was found out that 90 percent of patients approve of the use of computer systems in the management of health records.
9 pages (2546 words)
, Download 0
, Research Proposal
Free
Information is one of the most vital components in any organization and its operating environments. Information is an asset, in comparison to all assets within any organization, therefore, adding value to the organization (Lund & Aarø 2007). Protection of information should be of priority at all times. The protection should be aimed at keeping the quality of any information.
Computer hacking is the act of modifying hardware and the software of a computer to attain a particular goal that is contrary to that of the owner’s purpose. In most cases, people treat this act of hacking to be a malicious act; however, hacking does not mean that is a bad practice. It is taken to be a bad actor when the intention of the actor is malicious (Yar, M. 2006).
The university under the focus of this article is the UKTechni university which is involved in teaching computing, IT, and related subjects. This report deals with the design issues involved in the E-Commerce website design process. In the paper, a budget has been proposed for the setup and development of the E-Commerce website along with some legal issues in developing and maintaining a website.
Iris recognition has gained a lot of acceptance over time and a number of organizations are opting to adopt it in their organization. This is based on the fact that it seems more reliable since it cannot be stolen like is the case for the PIN codes. The iris recognition also offers improved recognition. The iris is an internal organ and it’s always protected against any form of damage.
The universal spread of the modern technology comprising of the information and communication technology (ICT) is usually perceived as a postmodern era indicator of globalization as well as a prerequisite of the intensive global interactions of individuals as well as the exchange of goods and services, capital and information (Wood and Smith, 2001).
In this increasingly competitive corporate world, it is important for firms to enhance their online presence. This is possible through the development of company websites in accordance with the human-computer interaction principles. Nevertheless, the success of a website depends on the appropriateness of its features.
When it comes to intentional, it may result from an intelligent attacker e.g. a cracker while in the case of an accident, it may result from acts that are beyond human control such as malfunctioning or “act of God” e.g. tornado. The threat, in this case, was the hacker breaching the system and accessing thousands of personal information.
In most of the indigenous cultures, religion and religious practices were so revered that it was almost taboo to introduce another aspect of religion that is outside the beliefs of these people. In today’s world, science has ensured that religion is not necessarily a matter of gathering and performing what is viewed as religiously acceptable.
7 pages (1886 words)
, Download 0
, Research Proposal
Free
Particularly, mobile devices, especially smartphones have been used in learning institutions as learning tools. A tangible example of such initiatives is the Multicasting Services and Information in Sweden (MUSIC), which involves the use of smartphones, such as the iPhone and the Blackberry for Mobile Learning (mLearning).
Benefits associated with the internet in all aspects of life have seen many countries invest immensely in the development of the Internet as a way of keeping abreast with other developed countries. China has become the focus of the world's attention owing to its fast development and overwhelming economic potential to increasing demand for the Internet.
Most of the major communications within the company are facilitated through an IT-based communication network. This way the internal and external operations of the company are done through the use of IT equipment. Staffs communicate through the use of telephone and emails all of which are established on an IT network.
The company has to improve on reducing the bargaining power of buyers and waging off the chances of any other entrants into the market of electronic money transfer. The other forces support the current growth strategy of the company strongly. The company has to investigate and act on issues raised by clients (D'Angelo, 2009).
14 pages (4856 words)
, Download 1
, Literature review
Free
E-participation in the Republic of Korea, between 1996 and 2007, has resulted in a dramatic change in citizen participation, in government operations. Similar results, of improvement in e-participation in Korea, were given by the United Nations E-Government 2012 Survey, which ranked Korea as second in the world, after the Netherlands, in terms of e-participation.
The advantages include a crime deterrent. If the CCTV cameras constantly monitor retail or the kind of business, criminals or bad intentioned people are more likely to seek an easier target. The protecting of employees the customer services workers are frequently compulsory to handle angry or frustrated clients.
The main function of computer viruses is to reproduce, interfere, distort, delete, and corrupt normal computer operations. There are different categories of computer viruses and they enter computer systems using varied ways and attach to components of a computer's operating and file systems. Despite their nature of replicating and attaching themselves and causing harm, they can be prevented.
TNT is one of the largest express operators from UAE which in 2009 found out that there has to be a way to retrain or test its workforce for the internal language given that it had increased its international transactions to over 4 million each year (www.vantage-siam.com). It is expensive to retain workers in an international language.
As far as the infrastructure around us is concerned, be it transportation, health, or even supply of essentials the dependency of these critical activities can only be achieved through a reliable energy system. The stability, as well as continued steadiness in managing energy resources, is important if the well-being of any economical entity is to survive.
The top-mark library has thirty personal computers that are used around in book lending. The staff that is there in the library is sixty-five. This entails the ones using the computers and those arranging the books plus the management team. The person in charge of maintaining the system that is used in the top-mark library is the assistant library manager who has some knowledge of computers.
Currently, the firm faces a lot of problems with its present network infrastructure. These problems include the following: the SPI Company initially had a central place where networking was but not a very serious issue in that there was no much need for connecting the firm to any communication. There were great problems with scalability.
Cloud computing has assisted businesses and companies to improve in terms of profitability due to the extended network provided by cloud computing. Cloud computing has a robust security monitor system that reduces the risks of loss and entry of data into the wrong hands. Small companies can also get sophisticated technology at lower costs because they are able to share with other companies.
We are building an online system where staff in RED5 Company view their timetable, add their feedback, read feedback, apply for holidays, and have their own email account within the company. Whereas manager can log in and update/change timetable, add staff to the system, delete staff, read feedback, delete feedback, confirm holiday requests and manager also have an email account.
Misconfigured APs: When separate APs are independently managed, configuration errors appear as a significant security danger. Nowadays, the majority of corporate WLANs are centrally handled, by means of synchronized updates as well as periodic reviews to reduce TCO, develop dependability, and as a result minimize risk.
The Latest Ms. Project versions have a very appealing display that promotes the Fluent User Interface thus enabling the user to easily access the needed tools. These versions facilitate faster and easier copy and paste to and from other Microsoft applications with the retaining of formatting. One can easily add columns and data with ease with necessarily highlighting the data particular type.
MOS memory circuits have become very popular in the recent past as rapid development is witnessed in the field of Information Communication and Technology. They are particularly applied in electronic devices for instance such as computers, radios, digital cameras, and Television sets among others. However, their use in the aforementioned devices varies depending on the purpose of the application.
The internet is a place where repressed societies can revive and develop and this is one of the major fears that authoritarian states harbor (Reporters without borders 2010). In the internet, economic and political issues have become intertwined and the need to protect information has become very important.
The system basically comprises a video camera that transmits signals through a coaxial cable to a central point. It is at this central point that the signals are monitored, recorded and video analyzed. Due to the rising cases of insecurity and the subsequent need to maintain a sustainable surveillance system, the use of CCTVs has become inevitable due to its efficiency in surveillance.
Android’s upper layer is based on Java, permitting developers to build up applications of Android using Google SDK. The created software is then sold in the Android market. On the other hand, iPhone OS is a closed source operating system, founded on the Darwin model and UNIX kernel. This OS evolved from Mac OS X also, it is the default OS for iPad, iPhone, and iPod Touch.
The provision of credentials i.e. signed documents establishes an agreement between a principal and a given property (Barbara et al, 2004). A web service provider has the autonomy to grant or deny access to the service. It is also very possible for users to individual request for a web service from a service provider spontaneously without necessarily registering.
8 pages (3584 words)
, Download 0
, Literature review
Free
Quick Response Technology was developed by a Japanese corporation, Denso Wave (a subsidiary of Toyota) in 1994 to assist in tracking components and parts in its automobile plants (Aktas, 2010). A few years later, firms in other industries started using QR codes as marketing tools for their products.
The name, Silicon Valley is derived from the fact that the area has a high concentration of computer and electronics firms that have pitched a tent there since the beginning of the twentieth century. As a matter of fact, silicon is one of the main materials used in the manufacture of semiconductors that forms a major part of computer circuits.
The paper “E-Crime - Stilliano’s Case” is a provoking case study on information technology. The first look at the case shows that there is attempted entry into the system. This could be a hackers attempt to gain entry into the system using root privileges. The assumption is gotten from the vague inference into the odd entry below;netstat stream TCP nowait root /usr/lib/netstat netstat.