StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Access Control Methods in Information Security Information Technology Coursework
6 pages (1728 words) , Download 2 , Coursework
Free
Threats on their part can take up multiple flavors ranging from sabotage, deliberate espionage, leakage, or information extortion. As is evident with the masculinity of information technology as the contemporary means of capturing and storing information, access control systems must exist to protect information and information technology systems.
Preview sample
State Surveillance Practices by Edward Snowden Information Technology Essay
7 pages (1798 words) , Download 1 , Essay
Free
Privacy has become more complex and contentious with the emergence of the Internet. The emergence of the Internet has drastically changed people’s concept and way of communicating from the traditional oral face to face communication to virtual communication. Communications have become more internationally interconnected and unregulated.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Professionalism and Ethics in IT Information Technology Coursework
9 pages (2439 words) , Download 1 , Coursework
Free
The modern world revolves around Information Technology. The significance and relevance of IT in the world have grown steadily and rapidly over the years. The modern man is almost entirely dependable on IT. The increase in the use of IT systems in institutions that are highly reliable has increased the need to embrace the trend.
Preview sample
PLC Configuration and Programming Information Technology Lab Report
6 pages (1477 words) , Download 1 , Lab Report
Free
The use of the state-based design will enable us to effectively control the machine’s heating and cooling system. Furthermore, the state-based design can allow us to easily simplify the algorithm operations by creating less complicated ladder logic. The neutral state can use in gathering inputs and setting the machine to either heating or cooling state.
Preview sample
HCI Design Project: Final Paper and Presentation Information Technology Report
7 pages (1910 words) , Download 2 , Report
Free
Humans interact with computers and other computing devices to be able to accomplish their daily activities. Therefore, the applications and the computing devices' effectiveness depends on the user's ability to communicate with the system in a user-friendly, convenient, and effective manner (Heim, 2008). This is entirely dependent on the design of the interface.
Preview sample
E-Government Portals Efficiency and Performance in Saudi Arabia Information Technology Research Proposal
8 pages (2527 words) , Download 1 , Research Proposal
Free
A systematic literature review carefully examines vital pieces of information to be collected from different secondary sources including journal articles, periodicals, government websites, reports, surveys, etc. Case studies that contain detailed information about the portals in Saudi Arabia will be utilized for the research.
Preview sample
Global Rules for the Internet: International Coordination and Accord Information Technology Essay
8 pages (2277 words) , Download 1 , Essay
Free
The dynamism of the Internet, which in turn spawned commercialization, popularity, and ubiquity of cyberspace, has resulted in some common social dilemmas and conflicts on the Internet. The illegal downloading of video and music files and the disintegration of privacy are some of the examples of these dilemmas.
Preview sample
Pirate Kings User Testing Information Technology Research Paper
6 pages (1542 words) , Download 1 , Research Paper
Free
Two male and two female users were involved in the testing.  User 1 was a 22-year-old female student who used her smartphone mostly for staying in touch with her friends and acquaintances.  She had limited experience with smartphone gaming, with the only games that she mentioned being True or False and Words with Friends, both on Facebook.
Preview sample
The Alcan Organization focusing on the General System Theory and Social-Technical Theory Information Technology Case Study
8 pages (2942 words) , Download 1 , Case Study
Free
It is one of the world-famous cutting-edge enterprises having a remarkable combination of skilled and talented workforce with advanced technology, innovative products, as well as a decidedly focused customer-culture. The enterprise has operating facilities across 61 countries with a workforce of about 68,000 employees
Preview sample
The Major Security Threats Information Technology Term Paper
8 pages (2081 words) , Download 1 , Term Paper
Free
At the present, security professionals apply a variety of penetration testing techniques to determine the security level of various applications. This report presents a detailed analysis of some of the major security threats by applying penetration testing techniques in order to determine the risks that these security threats pose to users.
Preview sample
Data Warehousing and Business Intelligence Information Technology Coursework
6 pages (12318 words) , Download 1 , Coursework
Free
From the regression analysis, it can be observed that the coefficient of determination is equal to 0.027662. the regression analysis has an F(3,32557)= 308.741 with a p-value of 0.000 which is significantly less than the 0.05 level of confidence this means that there is a significant relationship between the dependent variables and independent variables.
Preview sample
A Network for Personal Use or an Organization Information Technology Essay
6 pages (1820 words) , Download 1 , Essay
Free
The Cam table regularly separates a change from a middle point. With no CAM table, all the edges got a framework switch would be resonated empty every single diverse port, as an Ethernet focus point. The CAM table is advised to settle on the packaging sending decision. They are the center of all the layer 2 framework attacks in the area.
Preview sample
Computer Networks and Security Information Technology Assignment
11 pages (2864 words) , Download 1 , Assignment
Free
In other cases, it is important because it alerts the persons in charge when there are dangerous problems looming. In regard to that, it goes further to intercept even data leaving the organization. Correctly setting up firewalls along with the anti-malware software will help counter-attacks by hackers and infection by viruses.
Preview sample
Implementing Database Security Information Technology Report
11 pages (3022 words) , Download 2 , Report
Free
The next plan is to receive the reports of the other groups, which will aid us to discover the weaknesses of our system. So, we can work to improve our system according to that. As we will have an opportunity to hack other team systems, we can learn from their work and apply what they did to our system too.
Preview sample
Logical File System and Physical File System Information Technology Assignment
6 pages (1518 words) , Download 1 , Assignment
Free
A MOVE operation from one device to another requires manipulation of the file itself due to the reference in-memory directory. The operations are somehow stored in the same drive unlike a MOVE operation from one place to another on the same device which definitely involves manipulation only of the directory.
Preview sample
Network Assessment Issues Information Technology Assignment
7 pages (1998 words) , Download 1 , Assignment
Free
Only the DNS server and Eagle Server are on Subnet D. Switches are not allocated IP addresses in this network. PCs and servers are to be allocated the lowest IP addresses in each subnet. Router interfaces are to be allocated the highest IP addresses in each subnet. The subnets are to be allocated in the order A, B, C, D, and E.
Preview sample
Security Risks on the Web Information Technology Term Paper
8 pages (2260 words) , Download 1 , Term Paper
Free
Internet is now a necessity and the world’s businesses are done through Internet communication. With this huge boom in its usage came Internet Security Threats. People who specialize in various computer programs and hacking logics have mastered the skills to breach Internet security. The Internet is not a safe place to transact money.
Preview sample
Heuristic versus Systematic Processing of Online Privacy Policy Information Technology Research Paper
10 pages (2541 words) , Download 1 , Research Paper
Free
Consistent with the HSM of heuristic processing, information perceivers’ process the information by relying on the positive heuristics triggered by the familiarity cue. Furthermore, information perceivers are more likely to make their judgment based on the familiarity cue. Finally, information perceivers’ adoption of heuristic processing leads to acceptance of privacy policy.
Preview sample
The Impact of Online Technology on Customer Satisfaction in the Hospitality Industry Information Technology Literature review
21 pages (6209 words) , Download 1 , Literature review
According to Nykiel (2001) implications of modern technology integration, have been of profound benefit to both customers and services/product providers. This is since various aspects and incidences are retainable, redesigned, and reconstructed through innovative technology within hospitality organizations.
Preview sample
The National WWII Museum vs Wikipedia Wensires Information Technology Essay
6 pages (1608 words) , Download 1 , Essay
Free
The internet comprises countless websites that provide information on a wide variety of topics. Today students, academic practitioners, business executives, researchers, and other professionals increasingly depend on websites to meet their data/information needs. However, it is to be noted that all websites may not necessarily be reliable and valid. 
Preview sample
The Impact of Communication Technology on International System Information Technology Report
9 pages (2612 words) , Download 1 , Report
Free
The effect on economic competitiveness as well as relations within the international system are unavoidable. Gauging by what happened to the Soviet Union, the impact of communication technology seems to grow every day, both developing, and industrialized countries would escape unless they risk elimination from the international system through natural extinct.
Preview sample
How Has Technology Ended the Physical and Intellectual Isolation of Americans Information Technology Case Study
9 pages (2530 words) , Download 1 , Case Study
Free
Technology is no longer the exclusive province of developed nations. In the current age of globalization, technology has become widespread and encompassing in its coverage. Moreover, it has infiltrated many countries regardless of their economic progress and access to resources. The Internet and the WWW have made access to technology universal.
Preview sample
Electronic Health Records Software Analysis Information Technology Research Paper
16 pages (4454 words) , Download 2 , Research Paper
Free
Electronic health records are implemented in many healthcare facilities worldwide to improve the quality and effectiveness of global healthcare (Borycki & Kushniruk, 2008; World Health Organization, 2005; Shortliffe & Cimino, 2008). EHRs make possible the well-organized management and efficient preservation of health records to improve patient care (Taylor, 2006).
Preview sample
University Website for Intern Tracking System Information Technology Coursework
7 pages (1998 words) , Download 1 , Coursework
Free
Management digitalization has become the driving force behind the current automation of the online streaming tracking system to come with greater benefits for every success-oriented organization (Bishop 112). Virtual communities are making it necessary for firms to pass and get immediate feedback via search engines which have ensured better management.
Preview sample
Developing Information Systems to Increase Productivity, Efficiency, and Profit Information Technology Essay
9 pages (2392 words) , Download 1 , Essay
Free
There is a need to allow for improvement in the current system. Thus, the facilities to be used, especially the hardware, should be able to support system upgrades. Organizations are striving to integrate several applications under one suite. The hardware should be able to support the multi-user, multi-tasking environment.
Preview sample
Desktop Publishing Applications Information Technology Essay
8 pages (2069 words) , Download 1 , Essay
Free
Because the publisher has column guides running from top to bottom, the only way to put headings was by inserting text boxes and creating the headings. As such the headings are not running in any uniform way rather they are randomly placed within the pages and the spontaneity brings out a very beautiful overall effect. This is also the same case with the pictures and the logos.
Preview sample
The Working of Bitcoins Information Technology Essay
7 pages (1925 words) , Download 2 , Essay
Free
The future of Bitcoin use in business and personal transactions are uncertain though the currency holds the potential to uplift the lives of people globally if adopted by all nations. The adoption would lower the barriers of trade and create a common international market whereby individuals would trade without the need to exchange currency.
Preview sample
Online Content Owners Information Technology Essay
6 pages (1725 words) , Download 1 , Essay
Free
Most of the social media companies insist on having ownership rights of the content found on social media sites. However, social media users reserve the right to change their content. The users are the owners of their content, but once they upload it to the social media sites, they lose the 100% controlling rights of their data.
Preview sample
Dungeon Master Video Game Personal Reflection Information Technology Essay
10 pages (2500 words) , Download 1 , Essay
Free
Video games provide virtual environments in which opportunities for action are manifested. Gamification involves the use of gaming elements to enhance learning. There have existed discussions of whether learning outcomes for students are enhanced by using serious games for education. The recent years have seen an increase in gamified education or presentation of a course context in a game-like context.
Preview sample
Developing an Information Systems Architecture for Acme Engineering Information Technology Case Study
8 pages (2191 words) , Download 1 , Case Study
Free
On the handling of the client’s requirements, proper solutions are obtained in that the salesperson identifies the best expert for the particular task and uses his expertise. The chosen lead expert also chooses the most appropriate team to handle the customer request. This is ensured through effective communication and data availability.
Preview sample
Data Security and Policy Assurance Information Technology Essay
6 pages (1702 words) , Download 1 , Essay
Free
Business continuity is a defined set of preparatory, planning, and any related activities to ensure critical business functions of an organization continue operating despite serious disasters or incidences that might interrupt. The activities will ensure that the organization is recovered to the operational position in a reasonable short period.
Preview sample
Information Systems in Business Information Technology Assignment
8 pages (2260 words) , Download 1 , Assignment
Free
It is essential to state that unlike the current more-restrictive approaches to decision support systems, future systems are likely to encourage innovation by featuring modern quality services-oriented structures complete with a progressive platform supporting several modular and convenient applications.
Preview sample
IT in Criminal Issues Information Technology Article
6 pages (1839 words) , Download 1 , Article
Free
Since the early 1990s, the internet services have been perceived to be a unique medium that diffused human history at a very high speed. Wang and Huang noted that currently, very few people are enjoying the benefits of internet services, rather, the internet as turned to be harmful with the introduction of the technology era (Wang, and Huang, 2011).
Preview sample
Understanding Digital Literacies Information Technology Literature review
12 pages (3298 words) , Download 1 , Literature review
Free
As a teacher of ICT, the practitioner finds himself using it more and more every day. In the context of formal education, ICT is recommended to be used by children from their earliest years. Siraj-Blatchford & Siraj-Blatchford (2000) position that since the early age children ought to be finding out as well as identifying the uses of ICT in everyday life.
Preview sample
How the Internet Has Changed the Way People Shop Information Technology Case Study
7 pages (2174 words) , Download 1 , Case Study
Free
Billions of people around the world are using the internet to carry out their daily activities; at the workplace, in school, at home and even when ‘on the go’. Online technologies have changed the way people communicate and share information. This has made the internet an integral part of our lives that we cannot live comfortably without.
Preview sample
Internet Impact on Culture Information Technology Report
6 pages (1681 words) , Download 1 , Report
Free
Now people use the internet for a variety of purposes. Like every technology, the internet is also just a technology and it depends on people how they make use of this technology for the betterment of their society and people. This technology can be used by people for positive purposes as well as negative purposes.
Preview sample
Security Plan for Riordan Manufacturing Information Technology Case Study
7 pages (1822 words) , Download 1 , Case Study
Free
The author states that Riordan is faced with specific security issues relative to network, data, and Web security. These issues are attributable to the recent Sarbanes-Oxley requirements. Compliance with these requirements is complex. Documentation and testing of a company’s internal controls are required.
Preview sample
The Effects of Information Technology on the Supply Chain Management Information Technology Case Study
7 pages (2267 words) , Download 3 , Case Study
Free
E-business supported supply chain management is the future of logistics and a current trend with some major corporations. The application of e-business in the supply chains is allied, but not limited to internet use. There are prominent case examples that illustrate that there are potential benefits due to this.
Preview sample
The Main Objective for Maritime and Coastguard Agency Information Technology Case Study
8 pages (2091 words) , Download 1 , Case Study
Free
The main objective of MCA is to be the maritime safety organization in the world. To achieve this objective efficiency in communication, data storage and access, system and data delivery to customers and efficient management are paramount. Business over the years has acquired new IT applications and systems to improve business delivery.
Preview sample
The Life Cycle Analysis of Cell Phones Information Technology Case Study
9 pages (2396 words) , Download 1 , Case Study
Free
Cell phones have a varied history but their increased use can be traced to the WWII where radio telephony links operating in the frequency range of 30 to 40 mega hertz were used by the military and police. They were bulky devices, ran on high power and not appropriately portable as is the case today.
Preview sample
The Security Issues that are Faced by a Particular Organization Information Technology Case Study
8 pages (2281 words) , Download 1 , Case Study
Free
The author points out that networking also helps in the sharing of the resources in an organization. Some of the resources that could be shared through the network include files, printers, and other computer resources. Networking also enables an organization to conduct its operations over the internet.
Preview sample
Motion Planning Knowledge Information Technology Case Study
6 pages (1719 words) , Download 1 , Case Study
Free
It's pointed out that the theory in the application of robots outpaces the practical implementation. The practical limitations are robots must deal with huge amounts of unclear sensor data, doubt, real-time demands, nonlinear dynamic effects, undefined models, and unusual objective constraints and functions.
Preview sample
Fundamental Advances in Video Gaming Technology Information Technology Case Study
8 pages (2296 words) , Download 1 , Case Study
Free
In addition to increasing sophistication and graphical displays, these improvements are largely characterized by advances in artificial intelligence. This report will explore fundamental advances in video gaming technology with respect to three fundamental areas that contribute to the present state of electronic simulations.
Preview sample
Types of Network and Various Devices Information Technology Case Study
9 pages (2961 words) , Download 1 , Case Study
Free
According to the LAN network, usually covers a short distance or limited area that may be an office, school, or residential area. However, sometimes LAN would consist of different rooms in a particular building or could be of various houses or buildings. Apart from operating in a limited area, LAN is usually privately owned, run by a single person.
Preview sample
The Execution of Different IT Tasks Information Technology Case Study
10 pages (2675 words) , Download 1 , Case Study
Free
The internship period involved diverse activities and responsibilities. These mainly included dealing with different issues in computers and IT, dealing with clients and staff pertaining to IT-related issues, and performing administrative tasks related to IT. Different challenges were experienced in the course of the internship.
Preview sample
RFID Application in Port Operations Information Technology Report
10 pages (3014 words) , Download 1 , Report
Free
The need to keep ports secure and protect, and monitor cargo and infrastructure has resulted in the development of various security systems among them the radio frequency identification (RFID). The mechanism and concepts that enable the functioning of the RFID system are determined based on the fixed and recurrent costs of maintaining the technology.
Preview sample
Privacy and Surveillance Information Technology Essay
6 pages (1770 words) , Download 1 , Essay
Free
Eric Schmidt who is Google’s CEO argued that most young people will have to change their names so as to disassociate themselves with their bad past which is recorded and stored online. Adults have embraced this method and mostly use aliases while online. Thirdly, change your security/privacy settings. Privacy settings over the internet enable you to decide who can see your online activities.
Preview sample
The Idea of Expanding the Heathrow Airport in London Information Technology Case Study
9 pages (2610 words) , Download 2 , Case Study
Free
After a public inquiry that lasted 46 months, the construction of terminal 5 got a formal approval on November 20 in the year 2001 and commenced September of the following year. The entire planning process due to its lengthy nature consumed approximately £63m which was financed by BA and BAA since they were the two major players.
Preview sample
An Android App as a Guide of Injectable Medicines Information Technology Dissertation
32 pages (8290 words) , Download 1 , Dissertation
The author points out that the guide will contain a set of monographs of injectable medicines and the prescribing information that is needed by the doctors and the nurses to minimize the risks to patients when preparing injectable medicines. This is achieved through the use of an Android application.
Preview sample
How Packet Data Travels through the Networks Information Technology Case Study
8 pages (2255 words) , Download 1 , Case Study
Free
It's pointed out that while accessing an X-stream server from a remote location like home, several network and protocol processes take place in the network. This report is intended to provide an insight into how packet data travels through the networks, the role of various protocols, and about various processes that occur within the network.
Preview sample
1701 - 1750 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us