StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Improving the Education in University by Using Information and Communications Technology System Information Technology Research Paper
12 pages (3892 words) , Download 0 , Research Paper
Free
Every lecturer at Al-BahaUniversity should have adequate ICT infrastructure that will enhance the quality of teaching. Lecturers should embrace the use of ICT in teaching in order to improve the quality of results. They should use ICT for the purpose of demonstration and assimilation. The Al-BahaUniversity should Organize ICT in-service training programs for all lecturers.
Preview sample
ICT in Developing the Saudi Health Information Technology Research Proposal
7 pages (2079 words) , Download 0 , Research Proposal
Free
As the world is attacked by pandemics, which are in epic proportions, many people in the world are affected by diseases, which have no cures like HIV/AIDS, multi-drug resistant tuberculosis, and malaria. Most of these afflictions are experienced in developing countries. Prevention will be hard and difficult to overcome.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Improving the Education in Al-Baha University by Using ICT Systems Information Technology Research Proposal
5 pages (1566 words) , Download 0 , Research Proposal
Free
The paper "Improving the Education in Al-Baha University by Using ICT Systems" is a great example of a research proposal on information technology.  This section deals with the description of the background to the study, statement of the problem, the purpose of the study, objectives of the study, research questions, justification of the study, scope and limitations of the study.
Preview sample
Systems Analysis Designs Information Technology Case Study
10 pages (2518 words) , Download 0 , Case Study
Free
It is in this phase that the developer will construct the code and ensure that it is well documented. The code will entirely be tested to guarantee that all necessities are met. This phase will be completed once the committee members approve all required documentation as well as, the final version of the software product after the third and last presentation.
Preview sample
The Technical Issues of Arabic Web Page Localization Information Technology Case Study
6 pages (1599 words) , Download 0 , Case Study
Free
Reaching a wider market by firms has been a coveted aspect for decades, but with the introduction of the internet, products have been localized, firms are able to go beyond language barriers and sell their products (Global Partners International, 2011). In addition, Web localization has opened new avenues in education and business.
Preview sample
Information and Communication Technology Policy and Strategy Information Technology Coursework
20 pages (5660 words) , Download 0 , Coursework
Free
Management of virtual communities is not that easy a task, It requires people that are knowledgeable and skilled in the field. This is because of the impact that their decisions have on the general running of the community. A decision by the virtual manager may cause the whole system to come to a halt due to stagnation and withdrawal of members.
Preview sample
Waterfalls Approach to Information Systems Development Information Technology Assignment
9 pages (2593 words) , Download 0 , Assignment
Free
The use of technology has enhanced in value within the current procurement organization. Simply 17.2 percent of users of rated technology as an extremely significant supporter of their procurement business in 2008. Presently this ratio has improved to 48.2 percent that is an extremely important aspect of new technology support for modern technology-based areas.
Preview sample
Computerized Information Technology Information Technology Report
7 pages (2172 words) , Download 0 , Report
Free
The Internet on the other hand has proved to be an important shareholder in this era of Information Technology transformations. Both the developed as well as the developing nations have obtained tremendous benefits that have improved their economies. The various software, as well as the service industries, have expansively helped to enhance various nations’ economies. 
Preview sample
The Concept of Terrorism That Takes on a Whole New Dimension with Regard to the Sophistication Information Technology Coursework
11 pages (3067 words) , Download 0 , Coursework
Free
The Government on its part is striving hard to wipe out terrorism but the process is slow and long-drawn. The governments of countries like the USA and the UK have made a lot of amendments to their existing legislation in addition to bringing out many antiterrorism activities and policies to curb the escalating terrorism.
Preview sample
Basic Operating System Security for Spark Computer Information Technology Essay
12 pages (3079 words) , Download 1 , Essay
Free
Companies must always ensure that the working conditions are in such a way that they create proficiency, quality performance, and productivity and that they ensure maximum security of data. This could be done by for example ensuring that each member of staff dealing with important information regarding the company and its various activities has their own computers.
Preview sample
Building a Secure Computer System Information Technology Lab Report
9 pages (2309 words) , Download 1 , Lab Report
Free
In every department, there needs to be a record of all the activities that take place there. Therefore, it is essential to keep a good security system that will enhance that the data is not perceptible to malicious users. Group policy objectives assist the user or an administrator to a system to keep the system secure such that no irresponsible or malicious individuals get access to the data.
Preview sample
Systems Analysis - Adopting a Mac System in LM Photography Information Technology Case Study
6 pages (1796 words) , Download 1 , Case Study
Free
There is a proposal by the management that the company will be upgraded to be a journalism company. There is therefore a need that the system is upgraded to use Macintosh operating system. They have been using the Windows operating system when they are sending their photographs from the places where they took them from.
Preview sample
Creativity in Information Technology Information Technology Report
5 pages (1287 words) , Download 0 , Report
Free
The paper "Creativity in Information Technology" is a  great example of a report on information technology. Creativity can be defined as the propensity to create or identify ideas, alternatives, or possibilities that may be valuable in resolving difficulties, interacting with others, and entertaining ourselves and others.
Preview sample
A Web Service Booking System Information Technology Research Proposal
25 pages (6900 words) , Research Proposal
Nobody downloaded yet
The usability problem is defined as an issue that is found in the software product. The following lists of heuristics can help improve the system usability and guide the users with user interaction design. These are close to ten general principles that are used in the user interface design. These are known as "heuristics".
Preview sample
Yu and Associates ICT Infrastructure Upgrade Information Technology Report
6 pages (1249 words) , Download 0 , Report
Free
The firm also has plans to requisition a new 40ppm OCR scanner and thus require a better vendor who will supply at a cheaper cost. Furthermore, the firm wishes to install a wireless network that serves the three floors on top of the existing wired infrastructure. The firm also wishes to explore some of the VOIP solutions and evaluation of its benefits to the firm.
Preview sample
The PC: 35 Years and Counting Information Technology Essay
6 pages (1771 words) , Download 1 , Essay
Free
Technology has been advancing at a neck-breaking speed for the last three decades. The most notable advances have been made in computer technology, especially in the transformation of the Personal computer and its adoption in many areas of life. In the last 35 years, for instance, the PC has undergone phenomenal innovation to include some life-altering changes, improvements, and additions.
Preview sample
Risk Management as an Essential Part of Project Planning Information Technology Essay
10 pages (2640 words) , Download 1 , Essay
Free
Management of information systems can never be successful if risks that come with these systems are not properly assessed and managed. Companies, organizations, and institutions often come up with projects that are based on information systems. This makes it necessary for elements of Project Management Information Systems to be incorporated into the planning process.
Preview sample
Local Area Network Design, Microsoft Windows Server 2008, Network Requirements Information Technology Lab Report
9 pages (2511 words) , Download 1 , Lab Report
Free
It is a device that will enable access to a network or an internet connection. Here we will require 2X 3G routers for 3G internet access for the two remote branches, an additional 4X 8 port router for the LAN, it is 8 port due to future expansion otherwise a 4 port would be ideal preferably from Cisco system. 
Preview sample
Analysis of Information Security of Health Record Systems Information Technology Term Paper
7 pages (2364 words) , Download 2 , Term Paper
Free
Patients express less concern about the threat of security of their EHR records as the benefit of clinical use of computerized systems far outweighs the security risk involved. In a study carried out in Canada, it was found out that 90 percent of patients approve of the use of computer systems in the management of health records.
Preview sample
Underlining Information Security Body of Knowledge for End Users Information Technology Research Proposal
9 pages (2546 words) , Download 0 , Research Proposal
Free
Information is one of the most vital components in any organization and its operating environments. Information is an asset, in comparison to all assets within any organization, therefore, adding value to the organization (Lund & Aarø 2007). Protection of information should be of priority at all times.  The protection should be aimed at keeping the quality of any information.
Preview sample
Computer Hacking as a New Social Crime Information Technology Essay
7 pages (1981 words) , Download 1 , Essay
Free
Computer hacking is the act of modifying hardware and the software of a computer to attain a particular goal that is contrary to that of the owner’s purpose. In most cases, people treat this act of hacking to be a malicious act; however, hacking does not mean that is a bad practice. It is taken to be a bad actor when the intention of the actor is malicious (Yar, M. 2006).
Preview sample
E-Commerce Website Design for UK-Techni University Information Technology Case Study
9 pages (2419 words) , Download 0 , Case Study
Free
The university under the focus of this article is the UKTechni university which is involved in teaching computing, IT, and related subjects. This report deals with the design issues involved in the E-Commerce website design process. In the paper, a budget has been proposed for the setup and development of the E-Commerce website along with some legal issues in developing and maintaining a website.
Preview sample
Biometric Security System Information Technology Report
5 pages (1591 words) , Download 1 , Report
Free
Iris recognition has gained a lot of acceptance over time and a number of organizations are opting to adopt it in their organization. This is based on the fact that it seems more reliable since it cannot be stolen like is the case for the PIN codes. The iris recognition also offers improved recognition. The iris is an internal organ and it’s always protected against any form of damage.
Preview sample
Internet Has Actually Had a Negative Effect on Non-Western Societies Information Technology Essay
5 pages (1700 words) , Download 0 , Essay
Free
The universal spread of the modern technology comprising of the information and communication technology (ICT) is usually perceived as a postmodern era indicator of globalization as well as a prerequisite of the intensive global interactions of individuals as well as the exchange of goods and services, capital and information (Wood and Smith, 2001).
Preview sample
Human-Computer Interaction Information Technology Case Study
8 pages (2230 words) , Download 0 , Case Study
Free
In this increasingly competitive corporate world, it is important for firms to enhance their online presence. This is possible through the development of company websites in accordance with the human-computer interaction principles. Nevertheless, the success of a website depends on the appropriateness of its features.
Preview sample
Historical Analysis of the Security Breach Information Technology Report
11 pages (3046 words) , Download 0 , Report
Free
When it comes to intentional, it may result from an intelligent attacker e.g. a cracker while in the case of an accident, it may result from acts that are beyond human control such as malfunctioning or “act of God” e.g. tornado. The threat, in this case, was the hacker breaching the system and accessing thousands of personal information.
Preview sample
Effects of the Internet on Non-western Cultures Information Technology Essay
8 pages (2191 words) , Download 0 , Essay
Free
In most of the indigenous cultures, religion and religious practices were so revered that it was almost taboo to introduce another aspect of religion that is outside the beliefs of these people. In today’s world, science has ensured that religion is not necessarily a matter of gathering and performing what is viewed as religiously acceptable.
Preview sample
Student Perception of the Usefulness of Smart Phones as Learning Tools Information Technology Research Proposal
7 pages (1886 words) , Download 0 , Research Proposal
Free
Particularly, mobile devices, especially smartphones have been used in learning institutions as learning tools. A tangible example of such initiatives is the Multicasting Services and Information in Sweden (MUSIC), which involves the use of smartphones, such as the iPhone and the Blackberry for Mobile Learning (mLearning).
Preview sample
Internet History in China Information Technology Coursework
8 pages (2270 words) , Download 0 , Coursework
Free
Benefits associated with the internet in all aspects of life have seen many countries invest immensely in the development of the Internet as a way of keeping abreast with other developed countries. China has become the focus of the world's attention owing to its fast development and overwhelming economic potential to increasing demand for the Internet.
Preview sample
Adopting Information Technology Infrastructure Library for Managing IT Service Information Technology Case Study
8 pages (2135 words) , Download 0 , Case Study
Free
Most of the major communications within the company are facilitated through an IT-based communication network. This way the internal and external operations of the company are done through the use of IT equipment. Staffs communicate through the use of telephone and emails all of which are established on an IT network.
Preview sample
Encryption Scheme of a Paypal Company Information Technology Case Study
7 pages (1889 words) , Download 1 , Case Study
Free
The company has to improve on reducing the bargaining power of buyers and waging off the chances of any other entrants into the market of electronic money transfer. The other forces support the current growth strategy of the company strongly. The company has to investigate and act on issues raised by clients (D'Angelo, 2009). 
Preview sample
The Impact of E-Participation and E-Government Information Technology Literature review
14 pages (4856 words) , Download 1 , Literature review
Free
E-participation in the Republic of Korea, between 1996 and 2007, has resulted in a dramatic change in citizen participation, in government operations. Similar results, of improvement in e-participation in Korea, were given by the United Nations E-Government 2012 Survey, which ranked Korea as second in the world, after the Netherlands, in terms of e-participation.
Preview sample
Design and Model Effectiveness of the Closed-Circuit TV System Information Technology Report
11 pages (3154 words) , Download 0 , Report
Free
The advantages include a crime deterrent. If the CCTV cameras constantly monitor retail or the kind of business, criminals or bad intentioned people are more likely to seek an easier target. The protecting of employees the customer services workers are frequently compulsory to handle angry or frustrated clients.
Preview sample
Effective Protect Computer Systems from Computer Viruses Information Technology Term Paper
8 pages (2288 words) , Download 2 , Term Paper
Free
The main function of computer viruses is to reproduce, interfere, distort, delete, and corrupt normal computer operations. There are different categories of computer viruses and they enter computer systems using varied ways and attach to components of a computer's operating and file systems. Despite their nature of replicating and attaching themselves and causing harm, they can be prevented.
Preview sample
Universal Translator Designed in the United Arab Emirates Information Technology Case Study
6 pages (1963 words) , Download 0 , Case Study
Free
TNT is one of the largest express operators from UAE which in 2009 found out that there has to be a way to retrain or test its workforce for the internal language given that it had increased its international transactions to over 4 million each year (www.vantage-siam.com). It is expensive to retain workers in an international language.
Preview sample
Control Systems Security - Resilience Capability Plan Information Technology Essay
8 pages (2297 words) , Download 0 , Essay
Free
As far as the infrastructure around us is concerned, be it transportation, health, or even supply of essentials the dependency of these critical activities can only be achieved through a reliable energy system. The stability, as well as continued steadiness in managing energy resources, is important if the well-being of any economical entity is to survive.
Preview sample
Integrated Library System for Top-Mark Library Information Technology Assignment
11 pages (3134 words) , Download 0 , Assignment
Free
The top-mark library has thirty personal computers that are used around in book lending. The staff that is there in the library is sixty-five. This entails the ones using the computers and those arranging the books plus the management team. The person in charge of maintaining the system that is used in the top-mark library is the assistant library manager who has some knowledge of computers.
Preview sample
Information and Communication Technology Foundations Information Technology Case Study
6 pages (1790 words) , Download 1 , Case Study
Free
Currently, the firm faces a lot of problems with its present network infrastructure. These problems include the following: the SPI Company initially had a central place where networking was but not a very serious issue in that there was no much need for connecting the firm to any communication. There were great problems with scalability.
Preview sample
Information Systems and Cloud-Based Computing Information Technology Report
10 pages (2596 words) , Download 2 , Report
Free
Cloud computing has assisted businesses and companies to improve in terms of profitability due to the extended network provided by cloud computing. Cloud computing has a robust security monitor system that reduces the risks of loss and entry of data into the wrong hands. Small companies can also get sophisticated technology at lower costs because they are able to share with other companies.
Preview sample
The Red 5 Staff Login System, Computer-Based Monitoring and Data Security Information Technology Case Study
9 pages (2628 words) , Download 1 , Case Study
Free
We are building an online system where staff in RED5 Company view their timetable, add their feedback, read feedback, apply for holidays, and have their own email account within the company. Whereas manager can log in and update/change timetable, add staff to the system, delete staff, read feedback, delete feedback, confirm holiday requests and manager also have an email account.
Preview sample
Protecting WI-FI Insecure Channels Information Technology Coursework
11 pages (3347 words) , Download 0 , Coursework
Free
Misconfigured APs: When separate APs are independently managed, configuration errors appear as a significant security danger. Nowadays, the majority of corporate WLANs are centrally handled, by means of synchronized updates as well as periodic reviews to reduce TCO, develop dependability, and as a result minimize risk.
Preview sample
Microsoft Office Project Portfolio Information Technology Term Paper
12 pages (3149 words) , Download 0 , Term Paper
Free
The Latest Ms. Project versions have a very appealing display that promotes the Fluent User Interface thus enabling the user to easily access the needed tools. These versions facilitate faster and easier copy and paste to and from other Microsoft applications with the retaining of formatting. One can easily add columns and data with ease with necessarily highlighting the data particular type.
Preview sample
Analysis of MOS Memory Circuits Information Technology Term Paper
14 pages (3800 words) , Download 1 , Term Paper
Free
MOS memory circuits have become very popular in the recent past as rapid development is witnessed in the field of Information Communication and Technology. They are particularly applied in electronic devices for instance such as computers, radios, digital cameras, and Television sets among others. However, their use in the aforementioned devices varies depending on the purpose of the application.
Preview sample
YouTube Censorship in Turkey Information Technology Essay
11 pages (3009 words) , Download 0 , Essay
Free
The internet is a place where repressed societies can revive and develop and this is one of the major fears that authoritarian states harbor (Reporters without borders 2010). In the internet, economic and political issues have become intertwined and the need to protect information has become very important.
Preview sample
CCTV Systems and the Human Interface Information Technology Case Study
10 pages (2828 words) , Download 0 , Case Study
Free
The system basically comprises a video camera that transmits signals through a coaxial cable to a central point. It is at this central point that the signals are monitored, recorded and video analyzed. Due to the rising cases of insecurity and the subsequent need to maintain a sustainable surveillance system, the use of CCTVs has become inevitable due to its efficiency in surveillance.
Preview sample
Android and iPhone Operating Systems Information Technology Essay
8 pages (2219 words) , Download 0 , Essay
Free
Android’s upper layer is based on Java, permitting developers to build up applications of Android using Google SDK. The created software is then sold in the Android market. On the other hand, iPhone OS is a closed source operating system, founded on the Darwin model and UNIX kernel. This OS evolved from Mac OS X also, it is the default OS for iPad, iPhone, and iPod Touch.
Preview sample
Application and Efficacy of Access Control Systems Information Technology Report
7 pages (2601 words) , Download 0 , Report
Free
The provision of credentials i.e. signed documents establishes an agreement between a principal and a given property (Barbara et al, 2004). A web service provider has the autonomy to grant or deny access to the service. It is also very possible for users to individual request for a web service from a service provider spontaneously without necessarily registering.
Preview sample
Quick Response Technology on Patient Smartphone as Hospital Appointment Reminder Information Technology Literature review
8 pages (3584 words) , Download 0 , Literature review
Free
Quick Response Technology was developed by a Japanese corporation, Denso Wave (a subsidiary of Toyota) in 1994 to assist in tracking components and parts in its automobile plants (Aktas, 2010). A few years later, firms in other industries started using QR codes as marketing tools for their products.
Preview sample
Development of Silicon Valley Information Technology Case Study
7 pages (1831 words) , Download 1 , Case Study
Free
The name, Silicon Valley is derived from the fact that the area has a high concentration of computer and electronics firms that have pitched a tent there since the beginning of the twentieth century. As a matter of fact, silicon is one of the main materials used in the manufacture of semiconductors that forms a major part of computer circuits.
Preview sample
E-Crime - Stilliano's Case Information Technology Case Study
5 pages (1282 words) , Download 0 , Case Study
Free
The paper “E-Crime - Stilliano’s Case” is a provoking case study on information technology. The first look at the case shows that there is attempted entry into the system. This could be a hackers attempt to gain entry into the system using root privileges. The assumption is gotten from the vague inference into the odd entry below;netstat stream TCP nowait root /usr/lib/netstat netstat.
Preview sample
1101 - 1150 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us