StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Development of a Predictive Model by Making Use of a Data from Canberra Weather Measurements Information Technology Coursework
10 pages (1827 words) , Download 0 , Coursework
Free
The overall error rate for Decision Tree was 37.10% while the error for Random Forest was 21.31% which meant that Random Forest was more accurate in predicting Rain Tomorrow. A ROC curve, which contrasts the false positive rate to the true positive rate, indicated that Random Forest had a bigger range than Decision Tree which meant more accuracy.
Preview sample
Machine To Machine Communication Information Technology Case Study
10 pages (2660 words) , Download 0 , Case Study
Free
Communication in machine-to-machine devices or systems is broadly concerned with information and networking technologies. Machine to machine communication is an integral part of internet communication and comes about with several advantages. This nature of communication mostly used in control as well as for monitoring purposes.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
How is the Internet Changing the Way We Think Information Technology Case Study
8 pages (2350 words) , Download 0 , Case Study
Free
Sometimes this has taken place gradually, but often communication has made great leaps, as when writing emerged in the Middle East more than 3000 years B.C.E. Inventions and discoveries brought about revolutions in the way society interacted or lifted the level of communication to another height to be explored.
Preview sample
Application of Social Technology in Organizations Information Technology Case Study
8 pages (2482 words) , Download 0 , Case Study
Free
The author of the paper evaluates the concept of assemblages’ development and application of social technology in organizations. In order to offer a practical evaluation and illustration of the concept application, the essay adopts the Cisco case study a global leader in IT products and services consultancy.
Preview sample
The Internet as Encouraging and Improving Democratic Debate Information Technology Case Study
6 pages (1841 words) , Download 0 , Case Study
Free
In this paper, the extent of the Internet’s influence opens up a democratic debate. This paper discusses how the Internet is encouraging and improving democratic debate in modern society. It starts by examining how the Internet is allowing minor parties to participate in political debates typically dominated by their major allies.
Preview sample
Reflection on IT Ethics and Practice Information Technology Coursework
11 pages (2823 words) , Download 0 , Coursework
Free
With the existence of continuous growth and spontaneous changes in Information and Technology, the livelihood of people today revolves around information and technology as they focus on accomplishing their desired goals and objectives. Information and Technology do not offer a solution to all the challenges existing in the world.
Preview sample
Information Classification Schema Information Technology Case Study
12 pages (3619 words) , Download 0 , Case Study
Free
The specialized technology industry is experiencing serious challenges attributed to failure to protect product development information. A number of specialized technologies have lost patent protection and are currently generic making the pipeline of novel technology too sparse for filling the existing gap as well as generating a basis for future growth.
Preview sample
ACS Trends and Future Technologies Information Technology Coursework
10 pages (3168 words) , Download 0 , Coursework
Free
Internet Protocol run systems and devices are, for example, expected to dominate access control because they give the system the characteristic of remote control. There are also strong indications that Near Field Communications through the use of devices such as mobile phones will be prevalent in the management of access control systems in the future.
Preview sample
Wikileaks and the Freedom of the Press Information Technology Case Study
7 pages (2138 words) , Download 0 , Case Study
Free
WikiLeaks is an international nonprofit organization that works on the principle of transparency. The corporation mainly focuses on the publications of leaks on the premise of their ethical, political and historical implications on the community. WikiLeaks was founded in 2006 by a collective effort of dissidents, Chinese journalists and also mathematicians.
Preview sample
Business Operations Through the Cloud Computing Information Technology Coursework
11 pages (3137 words) , Download 0 , Coursework
Free
A company wishing to expand and have a competitive edge over other businesses operating in the same field needs to adopt cloud computing technology which guarantees innovation, better service delivery to customers, and efficiency only if the necessary on-site IT infrastructure has been laid.
Preview sample
Investigating Saudi EFL University Students Writing Processes Using Computer-Keystroke Logging Information Technology Case Study
6 pages (2763 words) , Download 0 , Case Study
Free
We also get a chance to know the challenges that the writers face in composing as well as other stages of their work.  There are various methods used to analyze the writing process data such as think-aloud protocol, retrospective interviews, questionnaires, text analysis, observation, and the real-time computer-helped study, which is an observation-based methodology.
Preview sample
Enterprise Systems of A-Coffee Ltd Information Technology Case Study
6 pages (1637 words) , Download 0 , Case Study
Free
Enterprise systems permit organizations to manage organizational data with ease when input data are fed into the system and the system automatically processes the data into a more useful output thereby facilitating data management processes and reducing redundancy. The enterprise systems integrate many business processes.
Preview sample
Awareness of Current Events: Saudi Aramco Attack Information Technology Case Study
6 pages (1524 words) , Download 0 , Case Study
Free
In essence, users searching for a manuscript or worksheet rather found a burning image of the American flag (Leyden, 2012). The virus, named after a phrase in its code, was intended to overwrite vital files with a burning image of an American flag. The researchers investigating the attack found instructions in Shamoon’s code, which is recognized as a “kill timer.”
Preview sample
Advancements in User Interfaces by Example UX/UI Information Technology Case Study
8 pages (2106 words) , Download 0 , Case Study
Free
The windows 10 can compromise a user’s security through the collection of your browsing history, targeted advertising and recording location information. The location data can expose users to danger and identity theft while browsing history violates their privacy by exposing users to unsolicited advertisements.
Preview sample
Mobile IP Operation Principles Information Technology Coursework
6 pages (1564 words) , Download 0 , Coursework
Free
Traveling business persons, corporate executives, and organizational employees demand unreserved and uninterrupted access to their office databases, personal files, office mail, video conferencing, and other office related communication while traveling between geographically disperse locations. The Internet Protocol (IP) has advanced the Internet.
Preview sample
Threat Scenarios for Shadowmiles Limited Information Technology Case Study
9 pages (2414 words) , Download 0 , Case Study
Free
This threat campaign mainly focuses on an external threat actor fully funded to demand block certain services from being accessed unless a certain ransom is paid. This threat scenario is comprised of two critical assets, one threat actor and five threat scenarios. Each scenario will be explained in detail, hereunder.
Preview sample
Summary of Overall Strategy for IT Security Policy Information Technology Coursework
7 pages (2001 words) , Download 0 , Coursework
Free
During the merging of two organizations to participate in sensitive business operations such as e-commerce, there is always a lack of governance or some of the employees may be reluctant to offer assistance because of the fear of losing their jobs. As such, the strategy should consider adopting a mechanism that will establish consensus.
Preview sample
Types of Artificial Intelligence Information Technology Coursework
6 pages (1843 words) , Download 0 , Coursework
Free
Social ethicists have been vehement and critical towards the application of AI as an alternative to human intelligence. They regard the creation of intelligent robots and programs as a direct competition with God. The question of whether AI is morally and ethically right has brought a huge debate that scientists are not willing to entertain.
Preview sample
Aryam Internet Cafe and Facing Network Connection Information Technology Case Study
9 pages (1950 words) , Download 0 , Case Study
Free
There are different methods of carrying out an analysis of the network. The methods selected are mainly based on the area of information system. Penetration testing is one of the areas of the security network. It main methodologies involve Open Source Security Testing Methodology Manual, Penetration Testing Framework and NIST.
Preview sample
Network Operating System Performance Evaluation and Analysis Information Technology Coursework
8 pages (2103 words) , Download 0 , Coursework
Free
The computer operating system forms the most significant program that runs all the processes in the computer. It contains an operating system to run such functions through programs and applications. Computer applications need the operating system to make by making requests to provide service through the application program interface.
Preview sample
Sustainable Issues on Mobile Phones in the UAE Information Technology Case Study
8 pages (1981 words) , Download 0 , Case Study
Free
Mobile phones formed an essential part of the lives of most people in the UAE and the world as a whole. GSMA (2016) has approximately 3.6 billion mobile phone subscribers globally with about 7.5 billion SIM connections. This linked to many benefits that are got from the uses of mobile phones from communication to entertainment and doing business services.
Preview sample
The Importance of Social Media For the Company Information Technology Case Study
7 pages (1662 words) , Download 0 , Case Study
Free
Social media marketing is an essential tool for making the campaign for the brand. This is because it connects too many people at the same time. In the current world. social media is an important marketing tool that offers a company opportunity to engage with their markets and to learn about customers’ needs.
Preview sample
New Online Learning Platform Information Technology Case Study
17 pages (4164 words) , Download 1 , Case Study
Free
Remarkable University needs to implement measures that prioritize the training of the involved employees on the online learning platform's management. The review of the updates available to the software used in the e-learning platform should be frequently undertaken in complying with the changes in technology.
Preview sample
A New Online Learning Platform Information Technology Case Study
17 pages (4164 words) , Download 0 , Case Study
Free
Remarkable University uses email service as the primary means of communication and thus is a priority IT risk area.  The best strategy to reduce this type of risk is to use appropriate controls such as the ones related to malicious code protection and spyware and spam protection on the client IT system.
Preview sample
History of Stochastic and Probability Modelling Information Technology Coursework
6 pages (1649 words) , Download 0 , Coursework
Free
The Stochastic process gives the probable capacity of predicting the future instance at a given unpredictable observable outcome. This gives a wholesome technique in which the nature of measurement is done, data emerged from longitudinal, and giving a wide range of opportunities that would be used in modeling. 
Preview sample
Developing for the Internet (Solent Cinemas) Information Technology Assignment
8 pages (1407 words) , Download 0 , Assignment
Free
If the admin is logged in     Read movie ID             If movie ID valid                         Connect to database Send SQL DELETE query to the movies table Display successful message                         Close connection to the database             Otherwise                         Display invalid movie ID error message Display HTML movie listing to allow administrator to select End
Preview sample
Dedicated and Embedded Processors Information Technology Assignment
6 pages (1523 words) , Download 0 , Assignment
Free
When users' tremendous pressure on the manufacturers to cope with applications' demands, more enhanced features were produced, RISC/CISC are such processors designed for that purpose.RISC is an abbreviation for reduced instruction set computers, while CISC is an abbreviation for Complex instruction set computers.
Preview sample
Downloading Music for Free from Internet Information Technology Assignment
6 pages (1953 words) , Download 0 , Assignment
Free
The music materials being downloaded; the type of work under copyright, for example, is it out of print, is it published or unpublished, or is the material used strictly factual material; what proportion of the work is used; and whether the use will negatively affect the market value of the original work (Edger 2002).
Preview sample
Waterfalls Approach to Information Systems Development Information Technology Assignment
9 pages (2593 words) , Download 0 , Assignment
Free
The use of technology has enhanced in value within the current procurement organization. Simply 17.2 percent of users of rated technology as an extremely significant supporter of their procurement business in 2008. Presently this ratio has improved to 48.2 percent that is an extremely important aspect of new technology support for modern technology-based areas.
Preview sample
Information Security Threats and Access Control Information Technology Assignment
10 pages (2664 words) , Download 0 , Assignment
Free
Insiders are the most treacherous attackers, for the reason that they understand numerous of the security measures implemented as well as codes used. Insiders always have goals as well as objectives to achieve, and most of them have lawful access to information. Workers are individuals most conversant with information systems.
Preview sample
Information and Communications Technology: Services Management Information Technology Assignment
12 pages (4434 words) , Download 0 , Assignment
Free
In delivering high-speed connectivity, the NBN that is being implemented by the Australian government will be underpinned by various technologies. This article is relevant to this topic since it presents material that demonstrates the technology that will underpin this type of network. As per the article, it is clear that the NBN will utilize fiber-to-the-premises technology to provide broadband speeds of up to 100 MBs.
Preview sample
The Security Domain in Australia Information Technology Annotated Bibliography
9 pages (2659 words) , Download 0 , Annotated Bibliography
Free
The paper shows five annotated bibliographies each showing a job description. At the same time, the paper analyzes the relationship between security employment and academic setting. The findings of each task description are then identified and discussed in detail. There is evidence that for one to hold those respective positions he or she must hold relevant skills and knowledge.
Preview sample
Issues on the File Transfer Protocols Information Technology Annotated Bibliography
8 pages (2108 words) , Download 0 , Annotated Bibliography
Free
Another thing is to ensure that the machine that is being transferred to has an FTP program also running. It should also be attached to the Internet. The user should also be aware of their domain name (that is the domain name of the machine that is being connected). There should also be active accounts that will be used to transfer the files.
Preview sample
The Prologue of Software Abstraction Techniques Information Technology Article
6 pages (1562 words) , Download 1 , Article
Free
The existing pattern may be used since it is familiar even as other organizations are considered much better. For instance, the Unix community where pipes and filters are considered as the most preferred system structure. As time goes by, the abstractions capture larger amounts of facet with more precision.
Preview sample
The Foundation of Business Computing Information Technology Assignment
13 pages (3681 words) , Download 1 , Assignment
Free
Hardware refers to the machine itself and all other supporting equipment. It is any machine that can replace or supplement human work. The supporting equipment includes both input and output devices, storage components, and communication devices. Software programs together with the manuals that support them.
Preview sample
Security in Computing Information Technology Assignment
7 pages (2000 words) , Download 0 , Assignment
Free
This demands that a good security policy must address the issue of training employee on the vulnerability introduced by the use of these devices. In addition, users must be advised to protect their PDAs and all their handheld devices apart from demonstrating to them ways through which hackers and attackers can take advantage of their negligence.
Preview sample
Technological Ethics, Cyber Ethics Information Technology Article
6 pages (1665 words) , Download 1 , Article
Free
Philosophical ethics is a philosophy branch aimed at exploring moral virtues while evaluating the actions of humans. It differs from ethical approaches that are either legal, cultural, or personal. This is through organizing what is right through outlooks aimed at satisfying human happiness and that which is the rationale.
Preview sample
Solutions to Performance Problems in VoIP over a Wireless LAN Information Technology Annotated Bibliography
13 pages (4416 words) , Download 0 , Annotated Bibliography
Free
With the continued adoption of TCP as the most preferred transport layer protocols, studies have continued to assess the effectiveness of other transport layer protocols. This study has been picked as it assesses the effectiveness of other protocols with regard to TCP. In particular, it reviews Datagram Congestion Control Protocol (DCCP) to understand how its usage in the carriage of VOIP traffic can rival other protocols.
Preview sample
Current Trends and Future of Access Control Systems Information Technology Assignment
10 pages (2885 words) , Download 0 , Assignment
Free
The most recent trend is to ensure the protection of property using authentication processes of 2-factor as well as 3-factor. This may include or exclude biometric authentication forms. The aim of these methods is to track activities or deny access once the individual gains admission into the properties or networks.
Preview sample
Conceptual Framework of Network Information Technology Assignment
10 pages (2701 words) , Download 0 , Assignment
Free
All network components are connected to a device, which is located centrally. The device may be a switch, router, or hub. Consequently, all the communication passes through the central device before being routed to the right destination. The central device, which is sometimes called a hub, acts as a junction for connecting the several nodes within the topology.
Preview sample
Technological Change as Trauma Information Technology Assignment
4 pages (2703 words) , Download 0 , Assignment
Free
Has the web been overtyped as technologists try to enlarge the extent to which we will rely on the internet? It will answer this question by giving examples involving different works by various technologists as they try to determine whether there are other factors other than consequential shakeouts and bubbles that can affect technological changes.
Preview sample
Enhancing Enterprise Security Information Technology Assignment
12 pages (3105 words) , Download 0 , Assignment
Free
Also in the laptop were information assets such as the Social Security numbers, of the Dean, his wife, and their children and account number for the Dean’s personal bank accounts domiciled in India. Initially, the laptop also contained information such as class Social Security numbers that were used to identify students and student exam details.
Preview sample
Computer Network and Server Issues Information Technology Assignment
7 pages (1804 words) , Download 0 , Assignment
Free
a) Print and file services regulate the sharing of files and printers amongst the clients within the network. b) Application services enable the execution of certain programs necessary within an institution's network. c) Gateway services facilitate the points at which networks merge with the other networks, hence performing network address translations.
Preview sample
Modern Internet Trends Information Technology Annotated Bibliography
9 pages (2322 words) , Download 0 , Annotated Bibliography
Free
The article summarizes the nonsense of the internet. It highlights the multiple issues perceived by the internet and the various measures that can be adopted to ensure that the nonsense on the internet is stopped. Some claims on the internet are that once a technology is integrated into the internet, it loses its history and intellectual autonomy.
Preview sample
National Security on the Internet Information Technology Assignment
11 pages (2829 words) , Download 0 , Assignment
Free
The companies among other companies should uphold the American ethics of justice and civility by not discriminating against people according to their ethnicity. People discrimination by the recognized agencies threatens the entire law enforcement system, thus making people distrust the government's responsibilities in protecting them.
Preview sample
Online Research Methods Information Technology Assignment
6 pages (1621 words) , Download 0 , Assignment
Free
The process involved in the stage of gathering data starts after the formalization of the sampling plan. The gathering of data is a procedure of collecting or gathering information. Notably, human observers, machine recording during surveys that are web-based and in the use of scanner data, or interviewers may be involved in data collection.
Preview sample
Project Risks and Mistakes Information Technology Assignment
15 pages (476 words) , Download 0 , Assignment
Free
The project will be designing and creating a photography website. Digital pictures are becoming more and more useful in telling stories. Stand-alone pictures help in telling stories that could otherwise not be described by words. Additionally, the website will have Digital Single-Lens Reflex Cameras (DSLR) reviews.
Preview sample
Assessment of Information Systems in the Future Information Technology Assignment
7 pages (1945 words) , Download 0 , Assignment
Free
The below mentioned negative and positive aspects will give one a clear idea of the strengths and weakness of the report. One needs to read them carefully. This report seems to be ISD-based as data warehousing is a topic of ISD. The positive aspect of the report was that is completely plagiarized, thus it can be said that it was a100% custom-made paper.
Preview sample
Social Networking Sites Health Promotion Framework Information Technology Assignment
9 pages (2139 words) , Download 0 , Assignment
Free
On the third level, it is the strategies that can be used in changing behaviour using SNSs. All of the strategies aim to change the individual's behaviour to control diseases and have improved health. This behavioural change is based on the ideology that increased exposure to certain content tends to change consumers' behaviour.
Preview sample
Criminal Threats From Cyberspace Information Technology Assignment
6 pages (1682 words) , Download 0 , Assignment
Free
The encrypted data is referred to as ciphertext while the unencrypted form is the plain text. It is worth noting that encryption is the most popular and effective data management method used by most organizations. The primary aim of encrypting data is to ensure the confidentiality of digital data that is stored in computers.
Preview sample
1151 - 1200 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us