StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Internet Censorship in the United Arab Emirates Information Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
The conclusion states that internet censorship within the UAE results to very illicit and diverse opinions; however from the information about internet censorship in the UAE, internet censorship does protect and preserve their cultural values. This is because the concept of internet censorship protects the Islam Society from pollution from some of the bad contents from the internet.
Preview sample
Java Impact on Business Information Technology Essay
5 pages (1406 words) , Download 1 , Essay
Free
This paper has found out that Twitter as a social network and communication App in communication technology is a “ game-changer ” in business; which has transformed Jet Blue Airways earning its customer loyalty, a good relationship with customers, good service delivery, and overall improved output.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Aspects of Technology Update Information Technology Coursework
7 pages (2046 words) , Download 1 , Coursework
Free
Therefore, HIS Technology brought its experts who represented the supply chain of the technology from the components of making electronics to the finished products together across all the applications markets that range from media, consumer, and telecom; to medical, industrial, power.
Preview sample
Effects of Social Networking Sites on Society Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
This paper tells that with the growth and spread of the internet, the use of social networking sites has grown rapidly over the recent past. This has led to the debate on whether these sites have a positive or negative influence. Just like any other form of technology, the use of social networking sites has its own disadvantages owing to the fact that these sites are sometimes misused.
Preview sample
Confidentiality of Personal Health Information Information Technology Case Study
4 pages (1000 words) , Download 0 , Case Study
Free
The mere recognition of the patient’s privacy invasion is not adequate, but rather measures are essential to prevent the annihilating act from reoccurring. To begin with, the staff members need to receive adequate training. It is apparent that the staff member was not aware of the consequences of her discussion of private matters in the waiting room.
Preview sample
Comparison Research between Two Types of Wireless Transmission: Wi-Fi and Li-Fi Information Technology Research Paper
12 pages (3214 words) , Download 1 , Research Paper
Free
From a theoretical perspective, wireless fidelity (Wi-Fi) is defined as a renowned wireless networking based technology, which fundamentally executes radio waves for offering high-speed internet as well as networking connections to the end users. On the other hand, light fidelity (Li-Fi) is described as a wireless optical based technology, which typically utilises light-emitting diodes for transmission of data (Paul & Sharma, 2014).
Preview sample
Security Issues in Wireless Mobile Communication Information Technology Coursework
7 pages (1849 words) , Download 1 , Coursework
Free
An area of interest is in the security threat that comes up as a result of wireless mobile communication technology. Mobile communication exposes its users to the violation of their privacy since the information might be shared without their consent. It poses a threat and risk to the users making them vulnerable. 
Preview sample
E-Government Portals Efficiency and Performance in Saudi Arabia Information Technology Research Proposal
8 pages (2527 words) , Download 1 , Research Proposal
Free
A systematic literature review carefully examines vital pieces of information to be collected from different secondary sources including journal articles, periodicals, government websites, reports, surveys, etc. Case studies that contain detailed information about the portals in Saudi Arabia will be utilized for the research.
Preview sample
PLC Configuration and Programming Information Technology Lab Report
6 pages (1477 words) , Download 1 , Lab Report
Free
The use of the state-based design will enable us to effectively control the machine’s heating and cooling system. Furthermore, the state-based design can allow us to easily simplify the algorithm operations by creating less complicated ladder logic. The neutral state can use in gathering inputs and setting the machine to either heating or cooling state.
Preview sample
Effective Operation of SAI Toys Information Technology Case Study
5 pages (1422 words) , Download 1 , Case Study
Free
There are some lessons that we can learn in the planning and implementation of SAI Toys' recommended system. The e-sales and marketing software system that will handle the e-commerce part of the company needs to be selected carefully by both management and technical personnel in the IT department.
Preview sample
Significance of Critical Infrastructure Information Technology Essay
5 pages (1367 words) , Download 1 , Essay
Free
Generally, sharing of the information would serve as education because new threats emerge every day and learning them is a step towards resolution.  Moreover, government institutions should take raising awareness seriously because knowledge is the key in the area of securing critical infrastructure.
Preview sample
Human Irrationality, Strikes versus Disputes Information Technology Assignment
5 pages (1358 words) , Download 1 , Assignment
Free
Unlike the rational being who only views concepts or things from a general view, the irrational thinker sees things from both the particular and general views. Thus, he finds a way of accentuating both general and particular aspects without avoiding the other. These examples hint at the significance of the irrationality mind in advancing the creative process.
Preview sample
Wireless PKI Security and Mobile Voting Information Technology Research Paper
6 pages (1651 words) , Download 1 , Research Paper
Free
It further highlights the operation, security and risks of the wireless PKI. A discussion on mobile voting (M-voting), and requirements and recommendations of the technology then follow. In general, the article explains the components and operation of the wireless public key infrastructure technology.
Preview sample
Comparing the Usability Test of Alibaba and Amazon Websites Information Technology Assignment
8 pages (2000 words) , Download 4 , Assignment
Free
This usability test aimed at testing two websites which are dedicated to offering information about the latest technology and facilitating e-commerce. It ensures this by helping buyers to meet sellers and prospective buyers. It also helps other site visitors to browse for latest products in the market. The two websites are that of Amazon and Alibaba
Preview sample
Data Mining and Prediction Modeling in Health Care Information Technology Term Paper
10 pages (2795 words) , Download 1 , Term Paper
Free
This gene facilitates the production of the HbS, the hemoglobin-sickle that converts the biconcave, disk-shaped, and soft, rounded red blood cells into rigid, brittle, and half moon-shaped red blood cells (Solanki, 2014).
Preview sample
Operating System Theory Information Technology Assignment
6 pages (1595 words) , Download 2 , Assignment
Free
A bus is a list of wires and firmly organized protocols that distinguish a list of the messages that can be disseminated to the wires. These messages are expressed by arrangements of electrical voltages, introduced to the wires with distinctive measures. On the other hand, a daisy chain is a device design that one device is characterized by a cable, which links an added device.
Preview sample
Websites on Marijuana Information Technology Essay
5 pages (1429 words) , Download 1 , Essay
Free
The “Mom for Marijuana” website is less accurate and trustworthy than the website of the National Institute on Drug Abuse. The point is that the first website presents information very unilaterally, using some false facts and unbelievable researches to support their point, when the second website operates real facts and corroborates them, referring to real researches and scientific experiments.
Preview sample
Property Control Application - Mobile App Using Cloud Computing for the Estate Agencies Information Technology Research Proposal
8 pages (2306 words) , Download 1 , Research Proposal
Free
Despite the benefits of cloud computing, many small and middle scale businesses have not implemented it and limitations of the popular brands of cloud applications could explain this. Many of the classes of organizations have not implemented cloud computing in Ireland, an observation that could be possible in other countries.
Preview sample
Cyber Terrorism Information Technology Term Paper
6 pages (1787 words) , Download 1 , Term Paper
Free
Cyber terrorism is a real threat to the American people and economy as a whole because it not only instills fear to the citizens but also results in institutions and companies' huge losses that may even lead to the companies shutting down. This kind of threat should be taken seriously to secure the people and the economy.
Preview sample
Advantages of Virtualization Software Information Technology Essay
8 pages (2102 words) , Download 2 , Essay
Free
Virtualization is a computing concept that allows one or more operating system instances to run simultaneously on a single computer. Virtualization is a means of separating hardware from a particular operating system. Each “visitor” Operating System is managed by a Virtual Machine Monitor (VMM), which is also known as a hypervisor.
Preview sample
Management of Information within a Law Enforcement Agency using Technology Information Technology Coursework
10 pages (2633 words) , Download 1 , Coursework
Free
 Law enforcement agencies usually have to deal with a wide array of information. Governmental police agencies are solely responsible for governing law enforcement agencies. The major purposes of such agencies are an investigation of criminal activities, transferring results to courts, and detention of any pending judicial action.
Preview sample
Data Mining and Knowledge Discovery in Database Information Technology Research Paper
12 pages (3198 words) , Download 2 , Research Paper
Free
The method is mainly used in understanding the phenomenon from the data, prediction and analysis. Data mining in the current situation has been important due to abundance of data that makes uses the knowledge of data discovery.
Preview sample
Sub-band Coding and Scalar Quantization Information Technology Essay
5 pages (1457 words) , Download 1 , Essay
Free
Within the context of the basic system, the Signal to Noise Ratio, or SNR, of the sub-band coder is as its maximum value based on the energy level of the band. With adaptive bit allocation, the system finds the energy of every specific band immediately after H1(z) and H2(z). The purpose of this is for the system to be able to automatically compute the best possible SNR.
Preview sample
Information Governance in Business Information Technology Coursework
12 pages (3366 words) , Download 2 , Coursework
Free
Information governance has evolved as a new concept in recent years. This concept considers information as a strategic asset. It helps in formulating new strategies as well as plays a key role in sustaining a business position. Business value is eventually maximized through the approach of information governance.
Preview sample
Business Intelligence: eCourier, Cablecom and Bryan Cave Information Technology Case Study
2 pages (630 words) , Download 6 , Case Study
Free
This has helped the company cut down on labor cost as well as increasing efficiency. The automated monitoring has also reduced the chances of packages disappearing. The enhancement of packages
Preview sample
Systems Development Life Cycle Information Technology Essay
5 pages (1369 words) , Download 1 , Essay
Free
The most important task in the designing of a system is the recognition of the problem. It entails looking at the current operations and system and analyze if it meets the organization's demand. The analyst, therefore, surveys by gathering all the required information for the designing of the program. It will also give a picture of the system.
Preview sample
UML Class & Sequence Diagram, Design, CASE Tools & Testing Information Technology Essay
5 pages (1509 words) , Download 1 , Essay
Free
The information systems form a whole project for a particular organization. Tools such as CASE tools are used in project management. Developers are required to come up with sophisticated software to run the systems. The software has to be tested before they are implemented. In addition, the software has to be checked and updated every now and then.
Preview sample
Benefits of Improvement Using a Technology Solution: UMC Clinic Information Technology Case Study
3 pages (871 words) , Download 1 , Case Study
Free
Records will not also be easily lost. The records that can be stored in the database include all drugs and medications available, patients, insurance policies, age, and gender. When all employees in the clinic have access to a computer, they
Preview sample
Information Technology and Telecommunication in Apple and Microsoft Information Technology Essay
8 pages (2301 words) , Download 0 , Essay
Free
The paper “Information Technology and Telecommunication in Apple and Microsoft” is an engrossing example of an information technology essay. IT is short for Information Technology. More often than not we pronounce IT as separate letters. It is a comprehensive subject that concerns all features of handling and processing information, particularly within a big institute or company.
Preview sample
Information Technology Strategic Plan Information Technology Case Study
8 pages (2276 words) , Download 1 , Case Study
Free
The company is engaged in adopting new and innovative technology for gaining better traction with regard to its customer satisfaction and loyalty.  The concerned company is considered as one of the pioneers in the information technology industry. It is one of the most famous dot com companies in the world. The said organization is one of the most well-known cloud service providers in the world.
Preview sample
ROI of Cloud Development Information Technology Case Study
15 pages (3898 words) , Download 1 , Case Study
Free
Security alongside other concerns could impede their adoption of the cloud utilities for data storage. As technology grows from the conventional on-premise pattern to the cloud concept, service offerings change on a nearly daily basis. This is seen even the ore in the brought about significant growth in terms of use of the cloud computing technology.
Preview sample
Emerging Cyber Security Approaches and Technologies Information Technology Research Paper
18 pages (5009 words) , Download 2 , Research Paper
Free
Furthermore, these countries have invested heavily on methods that they can use for purposes of protecting their cyber space. This paper provides a review of technologies that can be used for purposes of protecting the cyber space, and the various efforts that government organizations have enacted for purposes of supporting the development and implementation of the technologies concerned. 
Preview sample
Human Motion Detection based on Background Subtraction Techniques Information Technology Coursework
6 pages (1500 words) , Download 1 , Coursework
Free
Extensive research has been done in this field to accurately extract the motion region of interest in order to use it for further processing
Preview sample
Next Generation Mobile Computing Information Technology Coursework
12 pages (3367 words) , Download 1 , Coursework
Free
The description above can be widened to comprise of other types of devices like PDAs, mobile phones as well as tablet technology together with other usage situations, with the definition further encapsulating the more traditionally commercial aspects of mobile computing. It is important to note that mobile computing is not a field that is new.
Preview sample
Senior Citizens and Modern Technology Information Technology Research Paper
47 pages (9457 words) , Download 3 , Research Paper
While senior citizens would benefit from technology, which will improve there health care and social outcomes, they have difficulty adjusting to it.  Compelling evidence in the literature suggests this difficulty with technology is less of cultural resistance and more of a fundamental lack of accessible training and literacy.
Preview sample
SNMP for Diagnostics and Troubleshooting Network Problems Information Technology Research Paper
18 pages (4977 words) , Download 1 , Research Paper
Free
 The results from the observation of executing of commands showed that files that do not have a proper set of properties such as extension, descriptive properties, and those out of an event’s limitation standard return error messages blacking the operations from continuing further. 
Preview sample
Installation and Configuration of an Operating System Information Technology Report
5 pages (1457 words) , Download 1 , Report
Free
The operating system can secure the information put into a computer where unauthorized users cannot access it. There are various operating system categories, including multi-user, multiprocessing, multi-reading, real-time, and multitasking. Operating systems are usually installed in computers by professions who follow certain procedures, as discussed in the paper.
Preview sample
The Effect of the Internet on Communications Information Technology Literature review
9 pages (2538 words) , Download 2 , Literature review
Free
In the past decade only, huge advances in hardware and software technology changed how the world connects. It is at this era that cyber communication erupted and spread all over the world. In digital communication, the participants need to establish the most appropriate styles and forms to use.
Preview sample
The Formation of Colour Perception in Humans, Colour Blindness and Its Main Types Information Technology Literature review
9 pages (2779 words) , Download 1 , Literature review
Free
The cones on the other hand are located near the center of the retina or what biologists term as the macula. The cones also do not give good night vision but work on letting the human eye perceive color based on the conditions experienced during the day.
Preview sample
Preparing for a Company-Wide Migration to Windows 8 Information Technology Assignment
13 pages (3466 words) , Download 1 , Assignment
Free
The SWOT analysis covers the deeper look into a project including the strengths, weaknesses, opportunities, and the probable threats the project may bring about on its implementation. Zeroing into this project that is being undertaken by the Crescent Manufacturing Incorporation of upgrading to the Windows 8 platform there lies a number of advantages, weaknesses.
Preview sample
MS Excel and Access in Financial Calculations of Business Operations Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
The Flyguys has several requirements that can be met through proper usage of Access and Excel both. However, each of those software has its own pros and cons. The Flyguys is interested in implementing a system that enables them to achieve three major goals; record keeping, reward system and reporting.
Preview sample
Automation of Booking Procedures in Fly Guys Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
The Fly Guys is a corporation that deals with flights to and from the capital cities like Aberdeen, Birmingham, and Cardiff. The organization has just one plane. This aircraft is an eighty seats capacity carrier. Every day the plane makes one journey with two stopovers. The timetable is on Monday, Wednesdays and Fridays they voyage from Aberdeen.
Preview sample
ITIL for Managing IT Service in Terra Firma Information Technology Report
6 pages (1519 words) , Download 1 , Report
Free
As a supplier, Terra Firma also offers technical support services as well as integration assistance for the imaging systems with developed visualization software, analysis, and storage of important medical images. The company’s financial reports project it as a highly competitive and ultimately profitable one.
Preview sample
The Redesign of the System for Valentinos Information Technology Report
13 pages (3043 words) , Download 1 , Report
Free
It has become necessary to redevelop the software to improve the search through optimization of the software architecture. With a short historical standpoint, this research describes the fundamental tools and methods that obtainable through commercial practice, to develop software architectures. It then presents ways of developing software architecture.
Preview sample
Cash Register System Design Information Technology Coursework
7 pages (1939 words) , Download 1 , Coursework
Free
The system had inbuilt problems that deterred efficient operations of the fast-food joint. First, the system was designed to authenticate users with the use of passwords and usernames. This was a design problem owing to the need for fast access to the service in the busy fast food joint. The need to log in every time also occasioned the accumulation of grease.
Preview sample
Avatar-Based Fingerspelling Practice Software - Arabic Sign Language Information Technology Literature review
11 pages (3170 words) , Download 1 , Literature review
Free
Arabic Sign Language (ArSL) is the primary language used by the Deaf Community in Saudi Arabia. It is a visual-gestural language containing hand, facial, and body movements. Fingerspelling is an essential part of ArSL and is a necessary skill for communication that is used for acronyms, technical terms, and words from foreign languages.
Preview sample
The KKUs Electronic Questionnaire Project Information Technology Case Study
8 pages (2103 words) , Download 1 , Case Study
Free
KKU’s Electronic Questionnaire Project is a system that is installed at King Khalid University. The project involves setting up a system in place to handle all questionnaire issues at King Khalid University. The system will allow the university to create and format the questionnaire. The system also enables the university to view and analyze results from the surveys.
Preview sample
Building a New Organizational Website Information Technology Case Study
8 pages (2239 words) , Download 2 , Case Study
Free
The project aims at establishing a proper and viable marketing strategy. The proposed website would expose the business to the global market because it will be accessible to people all over the world. This development project also aims at increasing the volume of sales. The website is to be tailored in such a way that customers can make orders and purchase products directly from the website.
Preview sample
IT Project Risk Management Information Technology Research Paper
15 pages (4043 words) , Download 1 , Research Paper
Free
IT, in particular, has become an important tool in all-important sectors, and any organization will highly feel the impact of any failure of IT project management on competitive advantage. 
Preview sample
Cloud Computing as an Important Invention in the Technological Sector Information Technology Case Study
5 pages (1473 words) , Download 1 , Case Study
Free
People who are not authorized to access the data may get their hands on it. The unauthorized access may cause untold damage to the company, which may lead to closure or legal action by customers. Switching between various companies offering cloud services is complex. The security of the data stored in the cloud is another challenge.
Preview sample
1501 - 1550 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us