StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Digital Certificate Technology and Its Criticisms in the Recent Times Information Technology Coursework
10 pages (3054 words) , Download 1 , Coursework
Free
Additionally, technology has been effective in ensuring that various programs are developed to enhance the security among many other important functions. Schwalbe says that the development of security programs has been thought of as an effective approach by which important information can be kept away from any unauthorized persons. 
Preview sample
Achievements, Examples, and Limitations of Artificial Intelligence Information Technology Essay
5 pages (1357 words) , Download 2 , Essay
Free
Artificial intelligence refers to computer systems that enable machines to perform duties that necessitate human intelligence. The term also includes the ability of a computer to respond in a human behavior way. The described human actions include functions that include visual perception, speech recognition abilities, and decision-making skills.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Analysis on the Internet of Things Information Technology Essay
8 pages (2500 words) , Download 1 , Essay
Free
The paper "Analysis on the Internet of Things" is an outstanding example of an information technology essay. The rate at which the technology advances is at times alarming, as evidenced by the recent invention of the Internet of Things (IoT). In simple terms, IoT is said to the network through which physical things communicate with each other with the help of software and using the internet as the medium of this communication.
Preview sample
Dynamics Overview Microsoft Dynamics and it Role for Users Information Technology Movie Review
6 pages (1815 words) , Download 1 , Movie Review
Free
The address bar has the travel buttons; the forward and the backward buttons hence provide the user with more navigation possibilities. Further, the address bar allows navigation to other pages, modules and even other companies. 
Preview sample
Operating Systems - Windows, Linux and Android Information Technology Case Study
7 pages (1979 words) , Download 3 , Case Study
Free
An example of software includes the office package, Adobe reader, and Acronis disk director. Although there is numerous OS on the market, this paper will focus on three of them, namely Windows, Linux, and Android OS. With the help of online sources as the primary source of data, this study will analyze the above three OS in terms of their structures, components, working mechanism, and code complexity.
Preview sample
Making the Web Friendlier for Elderly Users Information Technology Annotated Bibliography
4 pages (1150 words) , Download 0 , Annotated Bibliography
Free
The study is an online publication. The article observes a difference in the use of information technology between literate and illiterate health workers. Not much information is available concerning the topic though. However, for future studies, the author offers alternative solutions such as speech interfaces and text interfaces among the workers.
Preview sample
Business Strategy BPM Distribution Company Information Technology Coursework
5 pages (1492 words) , Download 1 , Coursework
Free
Moreover, this paper tackles the kind of Information Technology (IT) strategy put in place to work together with the IS to ensure the success of the business. This is with regard to the kind of hardware, networking, and software infrastructure to be put in place to realize this. BPM is a company that has built its base and reputation hence the large customer base. 
Preview sample
Management of Information Systems: The Google Inc Information Technology Case Study
5 pages (1397 words) , Download 2 , Case Study
Free
It documented that nearly over 70 percent of the world’s online search requests usually pass through Google search engine (Rezaul 41). Therefore, Google managers the largest internet users globally. The company started its services with only 50 internet products and services including online document creation software specifically for tablet computers and mobile phones (Scott 44).
Preview sample
Logical File System and Physical File System Information Technology Assignment
6 pages (1518 words) , Download 1 , Assignment
Free
A MOVE operation from one device to another requires manipulation of the file itself due to the reference in-memory directory. The operations are somehow stored in the same drive unlike a MOVE operation from one place to another on the same device which definitely involves manipulation only of the directory.
Preview sample
Network Time Protocol Information Technology Coursework
9 pages (2434 words) , Download 1 , Coursework
Free
In order to obtain UTC, several methods can be used including satellite and radio systems. For a high level, services such as Global Positioning Systems specialized receivers are always used. However, it is highly uneconomical and impractical for every computer in a network to be fitted with these receivers.
Preview sample
Professional Practice in IT Information Technology Essay
5 pages (1461 words) , Download 1 , Essay
Free
Interpersonal communication is a significant aspect of the IT industry as it involves the process through which information exchange is accomplished between two or more people. It encompasses face-to-face contact whereby verbal and non-verbal communication may be used to convey different messages depending on the circumstances.
Preview sample
Implementing Database Security Information Technology Report
11 pages (3022 words) , Download 2 , Report
Free
The next plan is to receive the reports of the other groups, which will aid us to discover the weaknesses of our system. So, we can work to improve our system according to that. As we will have an opportunity to hack other team systems, we can learn from their work and apply what they did to our system too.
Preview sample
Cash Flow Management SAP VS Microsoft Information Technology Coursework
7 pages (1862 words) , Download 1 , Coursework
Free
The situations that it can be used in, for example, include calculating parameters where cash flow discloses cash movements over the period that is examined in the study. Cash flow in business mainly entails the movement of funds in and out of a business through the activities that the finances are used in and the inflow through factors such as sales.
Preview sample
Advantages, Disadvantages, and Critical Analysis of Cloud Computing System Information Technology Research Paper
31 pages (9321 words) , Download 1 , Research Paper
Most organizations that currently have control of their computer infrastructure are considering exploiting the broad advantages offered by the cloud computing system.  The main driving force should be the multiple ranges of benefits that aim at overall operational cost reduction and improved data protection.
Preview sample
Computer Networks and Security Information Technology Assignment
11 pages (2864 words) , Download 1 , Assignment
Free
In other cases, it is important because it alerts the persons in charge when there are dangerous problems looming. In regard to that, it goes further to intercept even data leaving the organization. Correctly setting up firewalls along with the anti-malware software will help counter-attacks by hackers and infection by viruses.
Preview sample
The Use of Handheld Devices in Education Information Technology Case Study
11 pages (3185 words) , Download 0 , Case Study
Free
The paper 'The Use of Handheld Devices in Education' is a perfect example of an information technology case study. Education for students is an experience where the minds get to understand the way things and domains operate. This means that students are exposed to an environment where they are able to receive education and shape their thinking.
Preview sample
Key Aspects of Data Storage Management Information Technology Coursework
6 pages (1605 words) , Download 1 , Coursework
Free
While the reasons for this are many, officials responsible for effective data lifecycle management cannot afford to keep the computer data unprotected, without any backup, particularly when the threat of data crashing always looms large. Hence, finding the proper solution to protect the data remains one of the most important tasks with these mangers. 
Preview sample
Key Concepts of Cloud Computing Information Technology Coursework
11 pages (3113 words) , Download 1 , Coursework
Free
The improvement in processing and storage technologies based on the Internet has resulted in cheap and affordable computing resources. In addition, computing resources have become more advanced and user-friendly. The technology has made it possible to adopt cloud computing, which is considered a recent technology in computing.
Preview sample
The Use of the Internet and Global Diversity Information Technology Essay
6 pages (1618 words) , Download 1 , Essay
Free
The author states that cultural exchange is one of the possible effects of the use of the internet. As expected, the diversity of the global population is easily shared and learned by different people from other backgrounds. The level of learning and adoption, however, differs significantly among different users.
Preview sample
The New Frontier - Data Analytics Information Technology Case Study
5 pages (1453 words) , Download 0 , Case Study
Free
Data analytics entails qualitative and quantitative methods and ultimate processes that are utilized to enhance business productivity by way of extracting data. The data extracted is utilized for analysis and identification of behavioral data necessary for organizational requirements. Global organizations use data analytics to streamline business operations, etc.
Preview sample
Social Networking Sites Information Technology Essay
4 pages (1041 words) , Download 0 , Essay
Free
Social networking sites have taken the world by storm ever since the start of the 21st century. There has been stone age and industrial age in the past. If modern times were to be defined similarly, today’s would-be social networking age. Social networking sites have had a massive influence on the way people live and interact with one another.
Preview sample
Issue of the Software Theft Information Technology Case Study
8 pages (2175 words) , Download 2 , Case Study
Free
The ethical theories and principles that are of consideration when it comes to the said software license violation are few and limited. The ethical theory that can be considered in software piracy and illegal sharing is utilitarian. Under the utilitarian theoretical perspective, the consequence or result of the act is considere.
Preview sample
Internet Use and How It Affected Culture Information Technology Report
7 pages (1900 words) , Download 0 , Report
Free
Internet use in modernity has emerged as a result of technological inventions and innovation. Internet use traces its development, evolution, and neo-evolutionary perspective at the beginning of the classical period. Critical theorists ultimately view internet use and culture as a double-edged sword where one of these societal structures have greater impacts on the other.
Preview sample
Emerging Information Security Threat Advisory White Paper Information Technology Term Paper
6 pages (1555 words) , Download 3 , Term Paper
Free
  Improper destruction of data: Financial institutions must be worry of any information, catalogs, papers and files that are to be discarded or destroyed. Such documents may contain sensitive and vital information that may be a security threat in case they are assessed by unauthorized individuals (Gutwirth, Poullet, & Leenes, 2011). 
Preview sample
Yahoo's Database Security Information Technology Coursework
6 pages (1816 words) , Download 1 , Coursework
Free
In 1994, these two developers decided to customize Yahoo into a database that could serve quite a number of users through an online platform, precisely the internet (An Introduction to Yahoo, 2015). From that time, Yahoo gradually gained popularity all over the world.
Preview sample
Big Data Challenges and Opportunities Information Technology Case Study
3 pages (862 words) , Download 2 , Case Study
Free
Only 0.5% of the existing world’s data has been analyzed, meaning that there is an enormous amount of data that still needs to be ventured into. However, it is worrying that with the huge potential for the un-extracted data that requires being
Preview sample
Enterprise Application SystemsIntegration- Assessment Documentation Information Technology Research Paper
26 pages (6380 words) , Download 1 , Research Paper
This is not a process document, service level agreement or operational document. Any information pertaining to operational issues, are only noted for system design implications. Operational documentation can be found within department Standard Operating Procedures (SOP) or Work Instructions (WI).  
Preview sample
Data Mining for Internet Search Engine Information Technology Essay
6 pages (1800 words) , Download 0 , Essay
Free
The paper "Data Mining for Internet Search Engine" is an outstanding example of an information technology essay. Data mining is notably the simplest and most powerful tool entailing new technology that presents the potential for companies and individuals to focus on the most significant information in the data they have about their customers and potential customer behaviors.
Preview sample
Project Description of MOAID Information Technology Speech or Presentation
6 pages (1918 words) , Download 1 , Speech or Presentation
Free
This application is meant to enable them to overcome communication barriers in their learning. This app is expected to ease the process of transition for the foreign students undertaking their studies in Korea. This communication platform is very interactive and it allows the user to be connected with the source where he is expected to receive help. 
Preview sample
Professionalism and Ethics in IT Information Technology Coursework
9 pages (2439 words) , Download 1 , Coursework
Free
The modern world revolves around Information Technology. The significance and relevance of IT in the world have grown steadily and rapidly over the years. The modern man is almost entirely dependable on IT. The increase in the use of IT systems in institutions that are highly reliable has increased the need to embrace the trend.
Preview sample
Convergence of Networking and Storage Solutions Information Technology Coursework
7 pages (1892 words) , Download 1 , Coursework
Free
The last few years have seen exponential growth in the storage requirement in most organizations regardless of the prevailing economic climates. Krutov et al. (2014) note that trends like the user-created content and the increased need for regulatory compliance have made it necessary for enterprises to store large volumes of data.
Preview sample
Digital Electronic System Information Technology Lab Report
7 pages (2059 words) , Download 2 , Lab Report
Free
From the lab activity, it was noted that Serial communication is used for all long-haul communication and most widespread in the Computer and Telecommunication industry where the cost of cable and synchronization difficulties make parallel communication impractical. Serial buses have also reduced the cost that was initially induced by integrated circuits that have more pins.
Preview sample
HCI Design Project: Final Paper and Presentation Information Technology Report
7 pages (1910 words) , Download 2 , Report
Free
Humans interact with computers and other computing devices to be able to accomplish their daily activities. Therefore, the applications and the computing devices' effectiveness depends on the user's ability to communicate with the system in a user-friendly, convenient, and effective manner (Heim, 2008). This is entirely dependent on the design of the interface.
Preview sample
Social, Professional and Ethical Issues in Information Systems Information Technology Coursework
15 pages (4214 words) , Download 1 , Coursework
Free
Over the years, Instagram has been one of the fast-growing social networking platforms across the world. Obtaining relevant consent from Instagram participants through web-based searches is difficult based on the researcher with the likelihood of meeting the Instagram participants by a person. The concerns are shared by the possibilities of obtaining consent and the creators and owners of websites.
Preview sample
An Ethical Study of Little Brother Book by Cory Doctorow Information Technology Book Report/Review
4 pages (1000 words) , Download 0 , Book Report/Review
Free
The book serves to do the same, although a few instances raise ethical concerns and highlight shortcomings in our society. "Little Brother" by Cory Doctorow is a wholesome read by lovers of hacking, internet gaming, and technology, while lovers of societal awakening, movements and revolution will find it interesting from a different angle
Preview sample
Services and Types of Cloud Computing Information Technology Case Study
19 pages (5017 words) , Download 2 , Case Study
Free
Cloud computing is all about making effective use of the computing assets i.e. hardware and software which are served jointly usually over the network. We refer to it as ‘Cloud Computing’ because it holds the symbol of Cloud which usually symbolizes huge networks particularly the ‘Internet’. The obstacles in communication associated with the system diagram are demonstrated by the ‘Cloud’ symbol.
Preview sample
Cloud Computing Service Models Information Technology Coursework
11 pages (2913 words) , Download 3 , Coursework
Free
The data center of companies consist of applications that are operated on web services, these applications include cloud computing. The term ‘SaaS’ represents those services that are delivered on the Internet. The vendors nowadays are using the term ‘PaaS’  and ‘IaaS’ i.e. These terms are used to exhibits the services and products for the customers.
Preview sample
Data Warehousing and Business Intelligence Information Technology Coursework
6 pages (12318 words) , Download 1 , Coursework
Free
From the regression analysis, it can be observed that the coefficient of determination is equal to 0.027662. the regression analysis has an F(3,32557)= 308.741 with a p-value of 0.000 which is significantly less than the 0.05 level of confidence this means that there is a significant relationship between the dependent variables and independent variables.
Preview sample
The Spread of the Internet and the Diverse World Information Technology Essay
7 pages (2101 words) , Download 1 , Essay
Free
There is no doubt that the internet is causing more harm than good to the world population. Innocent people are suffering from violence that has been created by the internet. Funny enough there are people who claim that the advantages of the internet far outweigh its disadvantages. No wonder the world will always experience perennial wars thanks to the internet.
Preview sample
The Role of Communication between Technical and Nontechnical Departments Information Technology Article
2 pages (768 words) , Download 1 , Article
Free
It comes up with no surprise that this article is a well-researched and well-written article on the topic of technical communication and organizational change. This article consists of two main parts. In the first part, the author has mentioned three claims for information technology in her article.
Preview sample
Increasing Popularity of Tablets and its Effects Information Technology Essay
6 pages (1902 words) , Download 1 , Essay
Free
This way, the popularity of tablets is increasing, and, “according to a recent study by technological research giant Gartner Incorporated, worldwide shipments of tablets will grow to over 197 million units shipped annually”. (Stark, 2013). 
Preview sample
Comparative Analysis of the Systems that to Enhance Business Functions and Processes Information Technology Literature review
8 pages (2197 words) , Download 1 , Literature review
Free
Effective strategies and approaches often enable businesses to compete effectively in their industries, making them achieve and consolidate their respective market share. Research activities and studies on organization performance and effectiveness have led to the development of several strategies that are thought to be effective towards organizational performance when implemented.
Preview sample
Arguments for and Against Outsourcing Computer Security Services Information Technology Research Paper
3 pages (911 words) , Download 1 , Research Paper
Free
There are numerous costs associated with this, including costs of the IT infrastructure necessary, technical support, training, software licenses, and costs of compliance with public authorities, not to mention operations and
Preview sample
Should The Internet Be Censored Information Technology Research Proposal
5 pages (1550 words) , Download 2 , Research Proposal
Free
An endless debate has been going on whether the internet should be censored. This is because the internet has been accused of harboring and a platform of ‘offensive material.’ It is claimed that children are capable of watching inappropriate material like pornography from the internet, hence the need to censor the internet. 
Preview sample
Mac and Windows Security System Information Technology Literature review
7 pages (1953 words) , Download 2 , Literature review
Free
Thus, Mac and Windows differ in their systems of process management, management of files in the systems and also memory management, with windows allowing for memory sharing between processes, resuming to the open files after a power outage or forced reboot, some aspects that are missing in the Mac system, which makes Windows more vulnerable to security breach and attacks. 
Preview sample
ICT and Impact of ICT in Hotel Industry Marketing Information Technology Coursework
8 pages (2262 words) , Download 1 , Coursework
Free
With the use of technology and computers, information is stored in the form of data and exchanged through binary streams. Industries whose products have been digitalized have an advantage as they gain value in their product. The impact of hotel industry is recognized as one of the major changes in the hotel industry (Pease, 2007).
Preview sample
Progress Report of Social Media in the UK Information Technology Report
5 pages (1412 words) , Download 1 , Report
Free
The results of regression analysis show that the four factors together predict VOD booking significantly, F=105.635, p < .001 as illustrated in Table 1. The Second regression analysis results indicate that the three factors (Price, genre, tweets) together predict VOD booking, F=80.389, p < .001 as illustrated in Table 2. 
Preview sample
Audit and Control Security Technology Information Technology Case Study
7 pages (1854 words) , Download 1 , Case Study
Free
As for organizations, banks, in this case, stoppage of compromise to their data assets is given a priority. They have to emphasize their focus on forming a firm information security policy and consequently implement control measures that will prevent either access or/and manipulation of their data and systems. In the world today, banks have migrated fully to the digital realm. 
Preview sample
Introduction to Digital Forensics Information Technology Assignment
4 pages (1044 words) , Download 0 , Assignment
Free
As the lecturer, I must strategize on how to punish him without negatively impacting his behavior. This is best done by talking to him and advising him that cheating will only give him an unfair advantage in class over the others. In reality, he cannot defend what is on his papers, therefore, the best punishment would be to give him a zero.
Preview sample
Computers R Us Information Technology Book Report/Review
7 pages (1750 words) , Download 2 , Book Report/Review
Free
From this paper, it is clear that computer R Us is a company dealing with both the manufacture of computer and retail services for its clients. The company, however, noticed the demand for repair services by its clients and decided to create CompleteCare. CompleteCare was launched to provide quick response to technical inquiries.
Preview sample
1601 - 1650 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us