StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
IT Organisation and Planning Information Technology Essay
13 pages (3425 words) , Download 0 , Essay
Free
The paper "IT Organisation and Planning" is a great example of an essay on information technology. Information technology has become omnipresent in today’s business world right from small enterprises to huge private or public sector organizations. Nowadays an organization’s business plans incorporate information technology as their integral part.
Preview sample
A Massive Growth of Electronic Commerce Across the Globe Information Technology Assignment
5 pages (1558 words) , Download 2 , Assignment
Free
Examples of avenues that draws on the use of electronic commerce include electronic data interchange, mobile business transactions, online transactions processing, internet marketing, supply chain management, systems of inventory management. Electronic commerce incorporates the use of the World Wide Web in some parts of its transactions.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Wal-Mart Information Technology Systems Support Information Technology Case Study
2 pages (500 words) , Download 21 , Case Study
Free
With headquarter in Bentonville, Arkansas; Wal-Mart is today the world’s largest retail store with over, 11,000 stores in 27 countries around the world. By revenue, it is the world’s largest company with 2.2 million employees. Wal-Mart’s IT system is so extensive that it comes second to that of the Pentagon by size.
Preview sample
Information System Auditing Information Technology Assignment
7 pages (2101 words) , Download 1 , Assignment
Free
The payroll system is a very sensitive system that handles the payment details of the employee's over a certain period called the accounting period. It encounters a number of challenges that include errors in the payroll and irregularities (Bragg, 2003). The system should, therefore, ensure accurate and timely payment.
Preview sample
How Serious Is Software Piracy Information Technology Essay
5 pages (1393 words) , Download 1 , Essay
Free
In terms of regions, the region with the highest overall rate of software piracy is Asia pacific with 62 percent and the region with the lowest rate of software piracy in North America with 19 percent. The three countries with the highest software piracy are Venezuela, Indonesia, and China, the rate of software piracy is 88, 86, and 77 percent respectively.
Preview sample
Specialized Automation in Manufacturing Information Technology Essay
7 pages (2005 words) , Download 1 , Essay
Free
Generally, we have discussed how technology has facilitated small-medium enterprises for the provision of industrial tools that can be utilized for new organizations. Likewise, radio frequency identification can enhance and streamline supply chain management powered by enterprise resource planning.
Preview sample
3D Printing Technology Information Technology Literature review
5 pages (1584 words) , Download 1 , Literature review
Free
At that point utilize a 3D printer to print the heart. This guided the specialists who repaired the child's heart with stand out operation, instead of settle on choices by ceasing the heart and looking inside. How enchantment 3D printing innovation is! Clearly 3D printing innovation gives a successful answer for the therapeutic business, and it was effective to spare an existence.
Preview sample
Internet Censorship Information Technology Assignment
9 pages (2546 words) , Download 2 , Assignment
Free
The author states that the Internet is easy to access and, therefore, even children are aware of it and use it since it has information on nearly all topics in the world. Despite the vast importance of the internet, certain restrictions like censorship have been contemporarily placed. Internet censorship is the manipulation of certain information.
Preview sample
Information Security Governance Information Technology Assignment
13 pages (3368 words) , Download 2 , Assignment
Free
Some suggestions for the security of the company’s network are required. Firewalls must not function as a router to protect the company at present. Institutions’ servers connected to NetBIOS are permitted from the off-campuses. The company’s policies have permitted the resistance towards any modification for faculty members.
Preview sample
Information Security Governance - Blackboard Inc Information Technology Assignment
13 pages (3748 words) , Download 2 , Assignment
Free
Some suggestions for the security of the company’s network are required. Firewalls must not function as a router to protect the company at present. Institutions’ servers connected to NetBIOS are permitted from the off-campuses. The company’s policies have permitted the resistance towards any modification for faculty members. New patches must be introduced.
Preview sample
Checking of FactCheck Information Technology Assignment
1 pages (430 words) , Download 0 , Assignment
Free
The paper "Checking of FactCheck" is a wonderful example of an assignment on information technology. The website is supposed to check the information and facts that currently are considered to be controversial in society. The website uses different sources and retrieves information about an issue from multiple databases, which guarantees the objectivity of an investigation.
Preview sample
Network Security and Control Mechanisms - Threats and Challenges Information Technology Research Paper
15 pages (4116 words) , Download 2 , Research Paper
Free
Although implementation of technological solutions is usually the most applied response to wireless security threats and vulnerabilities, wireless security is most basically a management issue. Effective threat management requires a sound and thorough assessment of the risk, with the environment and development of a plan to alleviate the identified threats.
Preview sample
Investigation of Crytolocker Information Technology Report
17 pages (4432 words) , Download 1 , Report
Free
This paper deliberates the details of an investigation of a Crytolocker malware attack using a network tool, Wireshark and by an application of other techniques parry to an investigation of this nature. The paper will examine Cryptolocker and its activities from a set of captured traffic from the network in question. 
Preview sample
Database Security - Threats and Challenges Information Technology Research Paper
15 pages (4164 words) , Download 1 , Research Paper
Free
This paper provides an insight on the kinds of attacks that are likely to happen, how they are likely to be perpetuated and by whom. It gives the security threats and challenges that are faced in databases. It also suggests means of prevention of these  attacks.  
Preview sample
Registration of Clinical Trials Information Technology Article
5 pages (1415 words) , Download 1 , Article
Free
The trials are carried to ensure that the information is safety for health purposes like diagnostics and therapy protocols. The correct information obtained through the trial registry is made to the public with a transparency tool for registration. Clinical registry trials can be accessed more easily since they can be searched according to the diseases, geographical location or even with the drug.
Preview sample
Analysis of Articles about IT in the Everyday Life Information Technology Coursework
5 pages (1250 words) , Download 1 , Coursework
Free
It was written by Braun and the core and published by Springer. Hence, the research tries to examine how the senior citizens can be trained by the use of technology to increase the quality of their livelihood and is in harmony with the authors. It encourages study as to the various impacts this has on the senior citizens
Preview sample
IT Controls Information Technology Case Study
7 pages (1862 words) , Download 1 , Case Study
Free
Furthermore, this case study takes into consideration the applicable regulations and standards and establishes the applicable control measures. Security and privacy controls of information systems are one of the primary strategies organizations and individuals implement to protect their operations, assets, etc. from various threats.
Preview sample
Wireless LAN: Traffic and Congestion Control Information Technology Case Study
3 pages (946 words) , Download 1 , Case Study
Free
Various studies have been conducted in a number of Campus networks to measure network traffic using different approaches. The studies try to
Preview sample
Usability Test Plan of the Sales Management System Information Technology Assignment
9 pages (2269 words) , Download 1 , Assignment
Free
The test measures the effectiveness of the user interface as it is and determines the changes needed to improve the user interface. The usability testing will investigate the sales system user interface prototype and use the results of the test to rectify and refine the user interface of the application. The usability test is basically directed at determining the functionality of the interface.
Preview sample
Comparative Characteristics of the Hybrid Networks on Chip and the Networks on Chip Information Technology Research Paper
8 pages (2226 words) , Download 1 , Research Paper
Free
However, in responding to this crisis related to interconnection, the Hybrid network-on-chip (WNoC) was envisioned as one of the most revolutionized approach. In this paper, it discusses how Hybrid network on chip is better than Network on Chip.
Preview sample
OPAC Evaluation Between Drexel Libraries & LAU Libraries Information Technology Research Paper
6 pages (1612 words) , Download 1 , Research Paper
Free
The online interface for system output and user input is among the elements of information retrieval (IR) system. Various online catalogs or online IR systems have diverse user interfaces that would permit user to search information or circumvent outside and within the library collections. 
Preview sample
Computer Crime File Content Analysis Information Technology Assignment
6 pages (1635 words) , Download 1 , Assignment
Free
They then get the numerical IP address such as 172.198.0.254 which isn’t risky. However, they can go on to use Ping to convert the IP address into a domain name. the DNS will then reveal the matching domain name. Ping is usually the initial step that the bad guys use to propagate their crimes. Since Ping uses ICMP to determine whether the destination is reachable.
Preview sample
Best Practices for Credentialing Post-Acute Providers Information Technology Essay
30 pages (7500 words) , Download 2 , Essay
According to the paper, the SNFs will provide services that maintain and obtains the well-being of the patient both physically, psychosocially and mentally. This will ensure a quality for the patient as well as moving to the next treatment stage. The SNFs in the medical care institution should be qualified and should have several skills.
Preview sample
Risk Analysis Methods Information Technology Research Paper
9 pages (2250 words) , Download 4 , Research Paper
Free
The factors that are used to differentiate in between the risk assessment methods are the target audience or the audience which the method addresses the scope of the risk assessment method, and the applicability of the risk assessment method. The discussed models are MSRAM, CARVER and DREAD model.
Preview sample
The Older People and Internet Technology Information Technology Essay
5 pages (1454 words) , Download 1 , Essay
Free
The research process will be done in three key stages; data collection, data analysis, and data presentation.  Data will be collected through interviews and data mining. Data mining will study the literature concerning the elderly and internet technology. Online journals will be used for data collection.
Preview sample
Computer Security Research Information Technology Essay
5 pages (1532 words) , Download 1 , Essay
Free
The NSA cracks the programs in use and can now monitor whatever goes on within the country (Shi, 2007). This hacking is done in the name of ensuring national security, although it faces a lot of rebellion from the public. Modern technology has changed the way in which criminal activities are carried out.
Preview sample
Malware Analysis Plan Information Technology Research Paper
10 pages (2639 words) , Download 1 , Research Paper
Free
As a result of the attacks of malware, large amount of losses are incurred every year. In order to overcome the challenge and threat of malware various techniques, tools, programs, applications, security based measures and other knowledge based techniques are used that enable overcoming the challenges of malware. 
Preview sample
ACD-IP PBX Request for Proposal (RFP) Information Technology Coursework
11 pages (2988 words) , Download 2 , Coursework
Free
The primary function of an ACD is to manage and process high-volume of incoming, internal and outgoing calls and distribute them to splits or hunt groups. Modern ACD also allows management  of emails and VoIP and has an administrative capability through the call management system then enables control of splits groups and efficiency reports.  
Preview sample
Operating Systems: Windows and Linux Information Technology Case Study
8 pages (2218 words) , Download 3 , Case Study
Free
The closed source nature of Microsoft limits the possibilities of rigorous scrutiny and testing and hence the reliability of this OS is questioned. In addition, Windows does not promote the customizability of programs, and therefore corporations are forced to purchase additional software products to meet their specific needs.
Preview sample
HCI Design Project Usability Evaluation Plan Information Technology Research Paper
11 pages (2951 words) , Download 1 , Research Paper
Free
The software system will be a sales system for an online based business enterprise similar to eBay and Amazon. The system’s goals is to simplify the customer’s experience as well as the employee’s productivity by providing tools to ease the acquisition of the desired products that would otherwise be done manually and collected physically. 
Preview sample
Exploration of Barriers to E-Learning within the Primary Schools in Saudi Arabia Information Technology Thesis
125 pages (9407 words) , Download 1 , Thesis
Saudi Arabian government or other authorized officials can also work towards developing various e-learning councils, which may contribute to enlarging and boosting the policies, creating a higher level of awareness amongst the inhabitants regarding the e-learning approach, monitoring and initiating the e-learning practices.
Preview sample
Computer Architecture in the 1970s Information Technology Coursework
9 pages (2540 words) , Download 1 , Coursework
Free
Computer architecture is a comprehensive subject that comprises everything from the affiliation between manifold computers to precise constituents inside a computer. The most vital sort of hardware scheme is a computer's processor architecture. The plan of the processor regulates what software might run on the processor.
Preview sample
Ethics in Information Technology Information Technology Assignment
4 pages (1244 words) , Download 0 , Assignment
Free
A moral code is a set of rules that establishes the boundaries of generally accepted behavior within a society (Reynolds, 2014). Morality hence stems from internalized individual rules that are as a result of societal boundaries, thus what is right or what is wrong by someone. Ethics, on the contrary, are standards or conduct of behavior expected of a person by a group.
Preview sample
Nine Myths That Threaten Software Projects Information Technology Case Study
3 pages (750 words) , Download 0 , Case Study
Free
that the author presents some new information, rather he just reminds the readers about the necessity to destroy some typical myths and to keep on a real side. It is important to remember that not everything can be automated and really should not be. Instead, for solving some
Preview sample
Financial Frauds on Web Information Technology Coursework
6 pages (1617 words) , Download 1 , Coursework
Free
This was before the internet was very entrenched in people’s lives and many people did not really understand the way it works. The Nigerian email scams are some of the oldest forms of online scams and they came to be known as the 419 scans, which refers to the code by which they are referred to in the Nigerian online fraud laws. 
Preview sample
Ethical Issues in Information Systems Security Management Information Technology Essay
5 pages (1485 words) , Download 1 , Essay
Free
Ethical issues also influence the level of forensic investigation of the computer crime scenes (Al-Omari, Deokar, El-Gayar, Walters, & Aleassa, 2013). In most cases, companies hire specialized consultants to investigate the information security issues though the personnel rarely understand the ethical concerns that might prevent them from fully investigating the crime scenes.
Preview sample
Architecture and Functionality of the Cisco 1006 Series Router Information Technology Lab Report
4 pages (1349 words) , Download 0 , Lab Report
Free
The physical architecture of the router comprises of SPA interface processor that can take up to 4 HH SPAs. The SPA slots can be used for utilizing existing SPAs. Moreover, there is an embedded services processor that has 40 cores along with a traffic manager. Further, there is a route processor that can support up to 16 GB DRAM with a speed of 2.66x2 GHz.
Preview sample
Bro: A System for Detecting Network Intruders in Real-Time Information Technology Essay
5 pages (1316 words) , Download 1 , Essay
Free
The real-time aspect of the Bro system helps to ensure that the damage that can be caused by the intruders are minimized since, with the real-time detection of the possible intrusion, the intrusions can be reacted to and stopped before they have caused any meaningful damage to the network (Paxson, 1999).
Preview sample
Technology and Knowledge Management Information Technology Assignment
7 pages (1826 words) , Download 1 , Assignment
Free
The system should be able to hold a collection of principles that are general and can apply to any situation (Liu, 2012). The system also involves holding a collection of numerous details that may be applied to the current problem. Both sought of information are developed by the inference engine. It is reasonable to include a knowledge base and an expert interface.
Preview sample
Computing Machinery and Intelligence Information Technology Essay
10 pages (2500 words) , Download 1 , Essay
Free
 It also studies artificial intelligence and how it affects our day to day lives. Its importance is also examined and the various ways in which it applies to our day to day lives. A patent refers to a right or authority to a particular thing or title (Bowyer, 1990). The licenses restrict others from using the same or duplicating the content or innovation for other purposes. 
Preview sample
Mobile Application Security Issues Information Technology Case Study
12 pages (2975 words) , Download 1 , Case Study
Free
The security of mobile devices is now one of the most critical success factors for an enterprise and ‘Information Technology’ decision-makers. As mobile applications and mobile devices are now ubiquitous in the corporate market, they bring a vast variety of security concerns with them. There are many poorly developed apps and mobile operating systems with lots of security vulnerabilities.
Preview sample
Hackers and How to Control Them Information Technology Coursework
9 pages (2675 words) , Download 1 , Coursework
Free
These steps include; the first thing is for the organization to understand its surrounding environment like the threats, risk, vulnerability that is at present in its environment. The second thing is for the organization to learn more about the existing problem so that they can build a strong defense mechanism for the problem.
Preview sample
Operating Systems for Mobile Devices Information Technology Coursework
10 pages (2882 words) , Download 2 , Coursework
Free
The paper considers, in the process, the following and more as aspects of mobile OS’s: the installation of applications, the management of memory, issues relating to the sizes of the screens, development history, standards, issues relating to security, concurrency, systems for the management of files, and privacy (Sharma et al. 2012; Vallina-Rodriguez.)
Preview sample
Concepts of Cloud Computing Information Technology Essay
6 pages (1713 words) , Download 1 , Essay
Free
It is still in its infancy yet owing to a large amount of potential and positive aspects, it is believed to be the technology that will virtually bring about a revolution in the field of digital technologies. It has its own benefits owing to the different environments and circumstances. It finds its usage among domestic users as well as corporate enterprises.
Preview sample
Cybersecurity and Mobile Devices Information Technology Essay
10 pages (2851 words) , Download 1 , Essay
Free
The world is a smartphone-based world, with an ever-increasing population getting attracted by smartphones. Multiple-use of the smartphone has led to the development and spread of several issues such as cybersecurity, which inhibits the ability to gain vital user data from smartphones and making it available for other users. 
Preview sample
3-D Printing Process and Innovation Information Technology Essay
5 pages (1332 words) , Download 1 , Essay
Free
Dr. Connor and Fintan MacCormack created specific Deposition Lamination (SDL) or paper 3-D printing in 2003. Dr. MacCormack initially found 3-D printing in 1986, when he was an auxiliary understudy in Ireland viewing a BBC exceptional casting. The innovation caught his creative ability in the same way that bikes, rockets, PCs and space travel now had.
Preview sample
ERP Implementation Best Practices Information Technology Literature review
6 pages (1649 words) , Download 1 , Literature review
Free
ERP achieves all the operations of the organization including product planning, development, manufacturing and even marketing. Moreover, firms that use ERP benefit greatly when it comes to competition in the market with other companies due to their being ahead in product development and marketing.
Preview sample
How Online Gaming Affects Ones Work Life and Personal Life Information Technology Coursework
19 pages (5168 words) , Download 0 , Coursework
Free
The paper "How Online Gaming Affects One’s Work-Life and Personal Life" is an outstanding example of an information technology coursework. In ancient times, people played with sticks and rocks. Life today is very different from ages ago in so many ways. Progress has improved the lives of people and the environment.
Preview sample
Online Content Owners Information Technology Essay
6 pages (1725 words) , Download 1 , Essay
Free
Most of the social media companies insist on having ownership rights of the content found on social media sites. However, social media users reserve the right to change their content. The users are the owners of their content, but once they upload it to the social media sites, they lose the 100% controlling rights of their data.
Preview sample
Facebook as an Effective Management Information System (MIS) Tool Information Technology Coursework
6 pages (1715 words) , Download 1 , Coursework
Free
Since data analysis can produce different information depending on the method of analysis therefore the system was further developed to make it individual-oriented (Ramachandra et al., 2012, p.125). With growing competition in the business, it became necessary for different groups of people to assess information whenever necessary. 
Preview sample
1651 - 1700 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us