StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
IT Admins in Small Companies Information Technology Essay
2 pages (695 words) , Download 0 , Essay
Free
In small companies, employees perform a wide range of activities while in bigger companies; employees are specialized to one task ("Small Vs. Large Companies"). The following paper
Preview sample
IP Phone Technology Issues Information Technology Essay
6 pages (1737 words) , Download 1 , Essay
Free
Digital IP based telephone systems use control protocols like the Session Initiation Protocol and different other proprietary protocols in its functioning. IP phones may be simple softphones that are based on specific software or purpose-built hardware devices which have an appearance similar to that of the ordinary telephone or a conventional cordless phone.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Matrix Project Information Technology Report
5 pages (1354 words) , Download 1 , Report
Free
This application, which is able to generate two random matrices X (A, B) and Y (B, C), and allow basic matric operations such as multiplication has been done using C++ using, first, the Strassen’s algorithm, and a sequential method, resulting in matrix Z (A, C). Strassen’s Algorithm is an important tool that can be successfully used in the multiplication of two random matrices.
Preview sample
Concepts of IT Security Information Technology Coursework
10 pages (2885 words) , Download 1 , Coursework
Free
This paper is going to give an analysis of the security background carried out by Enigma Security Services analyst about a particular company. Some of these will be the most likely security threats, physical protection of resources, personal issues involved in the security matter, some ways of security awareness, education, and training.
Preview sample
Lack of Information Information Technology Coursework
8 pages (2340 words) , Download 1 , Coursework
Free
Despite this general conception, the specifics of information and knowledge management tend to vary between entities, such as organizations. There are equally certain distinctions between the private and public sectors; their perceptions, actual initiatives, and effectiveness of information and knowledge management. These differences are attributable to key differences.
Preview sample
Governments ICT strategy and the Transparency Expenditure Information Technology Coursework
7 pages (2117 words) , Download 1 , Coursework
Free
Knowledge management is a concept that refers to the systematic means of gathering and management of information and knowledge within all levels of organizations (McAdam & Renee, 2000). As a general conception, the specifics of information and knowledge management are fundamental to effective service delivery in the public realm. 
Preview sample
Assessment of the Possible Uses of the World-Wide Website Belonging to Nash Jewelers Information Technology Case Study
4 pages (1164 words) , Download 0 , Case Study
Free
The paper "Assessment of the Possible Uses of the World-Wide Website Belonging to Nash Jewelers" is an outstanding example of an information technology case study. Internet marketing is growing fast and the creation of an interactive and modern website is the first step of embracing this trend. Many shoppers are going online in search of various commodities to buy.
Preview sample
Enhanced Sensor-Based Intrusion Detection System Information Technology Report
15 pages (3861 words) , Download 1 , Report
Free
To consolidate both systems i.e. Anomaly-based intrusion detection system, a Signature-based intrusion detection system, a Flexible Intrusion Detection, and Response Framework for Active Networks (FIDRAN) are suggested to give superior security. In addition, testing and evaluation of a probe on a stand-alone system are also demonstrated.
Preview sample
Current Attack Vectors and Secure Network Design Information Technology Coursework
4 pages (1324 words) , Download 0 , Coursework
Free
OS X features a seemingly limited number of attack vectors because the low number of Mac PCs naturally suppresses the incentives to create virus programs for the OS X. Basically, attackers also crave for a return on investment (ROI) as pertains to the manpower and time they devote to create virus programs.
Preview sample
Argos Management Information Technology Essay
7 pages (2102 words) , Download 1 , Essay
Free
Through consensus, the expectations and needs of the customers are addressed, opinions and ideas of professionals are incorporated, and the development of an information strategy that is highly integrated. Building consensus encompasses discussion at the initial stages after which proposals are fronted.
Preview sample
The Simulation of Disassembly Tasks Information Technology Annotated Bibliography
2 pages (500 words) , Download 0 , Annotated Bibliography
Free
The first path-planning technique is based on single translations, while the second one is based on the generation of a random search tree. The methods that are used in the support are adapted and modified from
Preview sample
Virtual Private Network Information Technology Case Study
7 pages (1788 words) , Download 1 , Case Study
Free
The virtual private network is delineated as networking which applies the use of public telecommunication infrastructure like the internet to provide individuals or remote offices with secure access to their individual or organizations network.  The main aim of the virtual private networks is to help in providing organizations with similar capabilities but at lower costs.  It works through the use of the shared public platform.
Preview sample
Information System and the Designing of the HT Enabler Information Technology Book Report/Review
4 pages (1000 words) , Download 0 , Book Report/Review
Free
The paper tells that various IT firms fail to manage threats of one kind or another, and these include such as physical security, suitable inner financial controls, and security of data. Each of these is dominant in upholding an institution’s status and, therefore, its aptitude to invite future projects (Paul, 2003).
Preview sample
How Information Technology Applications May Lead to Competitive Advantage in Hotel Industry Information Technology Research Paper
20 pages (5508 words) , Download 1 , Research Paper
Free
Many areas have to be in implementing and developing the projects of Information technology so that they can contribute to an advantage that is competitive in the hotel industry. There exist four areas that are to evaluating the decisions of Information technology in hotels. They entail the co-relationship between the decisions of Information technology and the strategy of the business, application types of information technology.
Preview sample
Emerging Technology and Innovation Information Technology Coursework
9 pages (2662 words) , Download 2 , Coursework
Free
Many companies are left with no other choice other than to innovate owing to the hypercompetitive global economy. The element of innovation cannot be overstated as it is risky and complex at the same time. This is quite evident as many innovations will always fail numerous times before they are adopted by top-level management. 
Preview sample
Harnessing Information Systems Information Technology Case Study
8 pages (2312 words) , Download 1 , Case Study
Free
The utilization of information systems is fundamental for any business to thrive under these conditions. An understanding of a building, a sound basis of information systems in business is utilized for e-business, e-commerce operations, enterprise collaboration, and management. Data and information are critical components of information systems employed by firms.
Preview sample
Disaster Recovery Information Technology Assignment
11 pages (3006 words) , Download 2 , Assignment
Free
Controls from NIST special edition have been discussed with rationale. Likewise, the gaps from the case study have been identified and controls are selected for the same. Different regulatory acts have also been discussed and a measure for making their compliance is also debated. The rationale for cost, resource management, type of contingency site and security posture is reflected in the controls. 
Preview sample
Linear Programming Information Technology Coursework
6 pages (1500 words) , Download 2 , Coursework
Free
The researcher states that linear programming is a response to situations that require the maximization or minimization of certain functions which are subject to limitations. These limitations are called constraints. A decision variable is a quantity that the decision-maker controls. Essentially, linear programming is to optimize (maximize or minimize) an objective function.
Preview sample
Information Systems and Transforming Business Information Technology Coursework
6 pages (1588 words) , Download 1 , Coursework
Free
Testing the software and training is needed so that all those exposed to the use understand the implementations. According to Dresner on his book ‘The performance management revolution’ ,using ATM for payment for the fast food will be convenient to the organization as there will be reduction of time wastage over the counter.
Preview sample
Human Attributes Study Information Technology Assignment
10 pages (2602 words) , Download 1 , Assignment
Free
Consequently, the designer must consider several aspects of the interface during design such as the visibility of the interface. The interface should be visible to the user at any given instance. Vision is mainly characterized by color, brightness, layout among other characteristics. The use of these aspects in design determines the effectiveness and efficiency of the user interface.
Preview sample
Network Assessment Issues Information Technology Assignment
7 pages (1998 words) , Download 1 , Assignment
Free
Only the DNS server and Eagle Server are on Subnet D. Switches are not allocated IP addresses in this network. PCs and servers are to be allocated the lowest IP addresses in each subnet. Router interfaces are to be allocated the highest IP addresses in each subnet. The subnets are to be allocated in the order A, B, C, D, and E.
Preview sample
Different Types of Memory Information Technology Essay
6 pages (1592 words) , Download 1 , Essay
Free
The short-term memory encodes data acoustically. On the other hand, long-term memory encodes data semantically. Baddeley discovered in 1966 that test subjects had difficulties recalling and recollecting words with similar meanings after 20 minutes (Tulving, & Craik, 2000). Another part of this form of memory is what is referred to as the episodic memory.
Preview sample
Hard Knocks School Database Information Technology Case Study
10 pages (2763 words) , Download 0 , Case Study
Free
The paper "Hard Knocks School Database " is an outstanding example of an information technology case study. Hard Knocks school has currently been experiencing an upsurge in the number of enrollments of pupils to the school. This has made it quite cumbersome for the management to effectively and efficiently manage the pupil’s records and services.
Preview sample
ICT in the Construction Industry Information Technology Article
9 pages (2790 words) , Download 0 , Article
Free
Specially configured systems can even be purchased specifically for different purposes ranging from speed to its ability to higher graphics. These PCs can likewise be connected with diverse hardware, for example, a projector for anticipating pictures (utilized amid presentations), printers, light pens, scanners, phones and fax and so forth.
Preview sample
Aspects of eBuy Pharmaceuticals IT Information Technology Coursework
8 pages (2091 words) , Download 1 , Coursework
Free
They are then able to get what they want from any part of the world without much hustle. This has been made possible by the efficient online platform of doing business. It is popularly referred to as e-business. eBuy Pharmaceuticals is an exclusively online-based business dealing in pharmaceutical products.
Preview sample
Social Network All over the World Information Technology Essay
4 pages (1232 words) , Download 0 , Essay
Free
Social networking has tremendously changed the way we, live in that, people no longer have to meet with others physically in order to socialize. Some of its advantages include; the ease of getting in touch with friends and also individuals can form a community that addresses their issues or connects for fun or simple socialization.
Preview sample
Business Analytics and Business Intelligence Information Technology Essay
7 pages (2070 words) , Download 1 , Essay
Free
About every business information is accessible in abundance as controlled data is getting build up over the years that are consequential from a variety of prepared information systems. Models of operations could not be able to use the new opportunities obtainable by this plenty of information.
Preview sample
Application of Fuzzy Logic in Financial Modeling Information Technology Research Paper
12 pages (3209 words) , Download 1 , Research Paper
Free
This research paper also addresses issues on how to buy and sell shares that will in the overall effect the wealth of its supporters and clientele. Finally, it maps out how liquidation can be in the organization. The way to approach this research is to explain the prediction mechanism to use and explore concepts of fuzzy logic and the way it relates to financing.
Preview sample
Software Design Specification Information Technology Literature review
8 pages (2091 words) , Download 2 , Literature review
Free
The software system will be a sales system for an online based business enterprise similar to eBay and Amazon. The system’s goals is to simplify the customer’s experience as well as the employees productivity by providing tools to ease the acquisition of the desired products that would otherwise be done manually and collected physically.
Preview sample
Role of Information Technology on Internal Audit Information Technology Essay
12 pages (3402 words) , Download 0 , Essay
Free
The benefits accessed by an internal audit from the roles of IT include more efficient auditing, enforcement of quality and internal audit standards, time-saving, resource efficiency use, better planning, adequate analysis, 100% audit data audit, and effectiveness of the internal audit among other benefits.
Preview sample
Advanced Network Management and Design Information Technology Coursework
9 pages (2478 words) , Download 1 , Coursework
Free
The primary objectives of Upgrade Announcement are a) Improving IT services and increasing collaboration enterprise-wide (throughout the organization). b) Reducing operating costs. c) Obtaining effective risk management for the protection of data. Following with methodology for implementing the IT service upgrade plan, primary tasks were distributed into stages.
Preview sample
Programming Team Methodologies Information Technology Coursework
9 pages (2250 words) , Download 2 , Coursework
Free
This research tells that the decisions on which approach is important in most cases depend on the type of programming teams that the business firms use. Programming is an important area of any organization that is determined to become successful in its operations. It helps the organization or business firms to be able to plan and avoid missing out some important things.
Preview sample
Approaching to Programming Team Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
This research will begin with the statement that programming is important for any organization or business firm. There are various methodologies that can be relied on for team programming. Good programming is important in ensuring there is proper flow of information into an organization’s operating systems.
Preview sample
Pair and Parallel Programming Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
This research will begin with the statement that many organizations are adopting the policy of having various programming methodologies in their operations. One of the new models is pair programming that is a concept of extreme programming approach. The concepts campaigns for forming of pairs to run programs for a group.
Preview sample
Disaster Software Recovery Plan Information Technology Assignment
6 pages (1693 words) , Download 1 , Assignment
Free
Organizations such as the ANBA are known to implement current security controls both physical and logical. The specific requirements are captured in the Disaster Recovery Plans when risks the entity has faced are assessed. The document, therefore, acts as a guide in capturing the system functionalities and requirements that may be adopted (Osofsky & Osofsky, 2013).
Preview sample
EBuy Control Station Information Technology Case Study
5 pages (1454 words) , Download 0 , Case Study
Free
The information system security is in two levels, and the cloud is used at both levels. First of all, there internet service providers (ISPs) must keep secure all the data of those they secure. Everything starts at this point. The cloud service used must be an encrypted one to ensure that there are no data leakages at all.
Preview sample
Mandarin Automation System Information Technology Case Study
5 pages (1349 words) , Download 0 , Case Study
Free
Mandarin M3 and mandarin OPAC are the two systems that offer complete automation functions that include circulation, cataloging, reports, searching, inventory, as well as modules. The Mandarin M3 library automation system is a search engine and native MARC database that has been designed specifically for library use.
Preview sample
Planning an Application Server Migration Information Technology Case Study
10 pages (2695 words) , Download 1 , Case Study
Free
The company has to implement a network application server through which employees will connect via remote desktop services. The preferred application server pool is windows server 2003 as it is able to provide load balancing, failover, and clustering capability that will give us the opportunity to put more emphasis on business logic.
Preview sample
Computer User Interface and User Productivity Information Technology Coursework
9 pages (2883 words) , Download 1 , Coursework
Free
Designing computer interfaces to allow immediate and largely unrestricted access to information will have a negative effect on the users and will not increase productivity. In fact, it is clear that this can actually decrease their productivity on top of putting them at risk of getting the psychiatric industry in the long term. 
Preview sample
Computers and Technical Devices in our Society Information Technology Essay
3 pages (839 words) , Download 1 , Essay
Free
Many people study and undertake different careers related to computers with businesses incorporating different aspects of computing in order to add value
Preview sample
Website Migration and Design Project Information Technology Report
11 pages (2998 words) , Download 0 , Report
Free
The project involves a company called Tonys Chips, which has been sold to a new independent company. The new company wants to move its old Website from an externally hosted solution to an internal host. The company has expressed concern about possible issues of data redundancy and emphasized having a back-up site as an alternative if the main site suffers a temporary failure.
Preview sample
Social Networks, Wikis and Blogs Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
The paper tells that today even business organizations are adopting the use of social networks to communicate across the globe. Therefore, social networks are now used in formal capacities also. Wikis are another technological move that organizations are picking. A wiki is a way of passing information and knowledge to your colleagues while giving room for updating the information.
Preview sample
Knowledge Collaboration in Online Communities Information Technology Report
8 pages (2313 words) , Download 2 , Report
Free
The collaboration that is instilled by social networks is very useful when it comes to building team relations. Wikis are also equally important when it comes to doing organizational works collaboratively. The paper has highlighted how members of a team or department can share documents for joint editing through the wikis.
Preview sample
The Committee of National Security Services Model Information Technology Case Study
6 pages (1609 words) , Download 1 , Case Study
Free
Physical security can be defined as the act that sees to it that hardware, software, personnel, networks, programs, and data are protected from potential physical threats that are in a position to cause extensive damage or losses to an agency, enterprise, or institution. The protection can be against natural disasters, fire, vandalism.
Preview sample
Advantages and Disadvantages of Hacking Information Technology Essay
2 pages (560 words) , Download 0 , Essay
Free
The individual who is consistently involved in hacking activities and has accepted hacking as philosophy and lifestyle of their choice is referred to as a hacker. Computer hacking is the most common form of hacking in present age, especially in the arena of computer
Preview sample
The Approval of the Purchase of Metasploit Testing Software Information Technology Case Study
4 pages (1297 words) , Download 0 , Case Study
Free
We have already fallen victim to the cyber-attacks which reduced our credibility by being accused of unethical research and development practices. Due to the tremendous growth of this company, it is imperative to put forward protective measures to prevent our valuable research from falling into wrong hands.
Preview sample
FAT32 File System for Computers Information Technology Case Study
5 pages (1378 words) , Download 1 , Case Study
Free
It's pointed out that the NTFS file system has been found to the most appropriate for use in desktop computers for workgroups. However, because NTFS is a new file system in the market, some people might not have known that this new file system is the most appropriate for use in computers for workgroups.
Preview sample
The Deep Web, Dark Web Information Technology Coursework
8 pages (2128 words) , Download 2 , Coursework
Free
The surface Web is the common section where the search engines are able to easily index the sites while the Deep Web is mostly inaccessible for regular searching, as it is denied from the indexes retrieved by the search engines. The exploration of the Deep Web in this research starts with the examination of the sufficient literature which provides more insights into the background information about the Deep Web and the Web crawlers.
Preview sample
DB Design From Existing Dataset Information Technology Report
20 pages (5117 words) , Download 1 , Report
Free
In the report, an attempt has been made to first establish an understanding of how the BBC ontologies work as it is important before embarking on any activity of representing their data in the database. With the knowledge of how ontologies operate, a sufficient foundation had been created that was used to design the database to hold the program ontology.
Preview sample
Database Design for Existing Dataset and Analysis Information Technology Business Plan
12 pages (2645 words) , Download 2 , Business Plan
Free
This project will realize a database design whose scope is not limited to a geographical area since it can be accessed through web interfaces using PHP and running on an Apache Web Server. The data are stored in MySQL on a turnkey LAMP server running Oracle’s Virtualbox. The design will allow for easy data access and entry across a number of separate places and continents.
Preview sample
1701 - 1750 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us