StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
How Packet Data Travels through the Networks Information Technology Case Study
8 pages (2255 words) , Download 1 , Case Study
Free
It's pointed out that while accessing an X-stream server from a remote location like home, several network and protocol processes take place in the network. This report is intended to provide an insight into how packet data travels through the networks, the role of various protocols, and about various processes that occur within the network.
Preview sample
The Decision-Making Process of Emirates Airline Information Technology Term Paper
10 pages (2942 words) , Download 2 , Term Paper
Free
The airline is the largest and most consistently profitable airline. This company is in the airline industry which is greatly affected by environmental factors such as politics and economics that decrease the number of passengers. Many companies in this industry develop strategies that enable them to be more effective.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Different Types of Programming Languages Information Technology Case Study
7 pages (2094 words) , Download 2 , Case Study
Free
In modern times advanced programming languages are in place that allows for fast interpretation and fast execution of operations. There are different types of programming languages subject to their usage and application. While some are restricted to advanced level operations and interpretations, others are relatively user friendly.
Preview sample
Effective Management of Data Tables Information Technology Case Study
7 pages (2160 words) , Download 1 , Case Study
Free
Data within tables can relate with each other and the database administrator has the responsibility of ensuring that there is the effective management of each data table. Effective management of data tables involves the accurate joining of single or multiple tables. Database administrators manipulate data in tables using Structured Query Language.
Preview sample
Connection to the X-Stream Information Technology Case Study
6 pages (1588 words) , Download 1 , Case Study
Free
Otherwise, computers connecting from local area networks are likely to have permanent IP addresses or be issued with a temporary address from Dynamic Host Configuration Protocol. All in all, any computer connected to the X-Stream will have an individualized IP address. Connection to the X-Stream might involve the conversion of alphabetic texts.
Preview sample
Denial of Service Attacks Information Technology Term Paper
8 pages (2253 words) , Download 1 , Term Paper
Free
The computer interconnectivity, which is dependent, on the global internet, however, makes its components an easy target for attackers who try to deplete their resources and launch denial of service attacks against them. The DoS attacks can be described as a single group or person’s spiteful attack to cause the site.
Preview sample
The Advent of the Internet as a Global Communication Mechanism Information Technology Case Study
16 pages (4581 words) , Download 1 , Case Study
Free
The Internet is an important tool for collecting knowledge and information. For that reason, it is viewed as a basic right for all human beings. Infringement of these rights has further given rise to cybercrime, privacy concerns digital insecurity and defamation issues. Governments are today grappling with ways of addressing these concerns.
Preview sample
The Application Process to the Online Virtual World Information Technology Case Study
8 pages (2080 words) , Download 1 , Case Study
Free
It's pointed out that several risks now surround businesses functioning in the cyberspace due to which business has to be extremely cautious by evaluating risks and implementing certain controls. As a core product, Mc Bride Financial Services aims to offer an efficient and user-friendly mortgage application process.
Preview sample
Software Change Management Process Information Technology Case Study
8 pages (2476 words) , Download 1 , Case Study
Free
It is common knowledge that rarely does anything tend to function according to plan and as such, it is found that program projects are no exception to this rule. In essence changes in program, systems are evidently bound to happen and the manner in which one deals with them will determine just how successful a given project will become.
Preview sample
Information Security as an Important Process Information Technology Case Study
12 pages (3481 words) , Download 1 , Case Study
Free
One of the most important ways of understanding and exploiting these opportunities is relying on important information sources to research and identify key aspects of prime importance. Realizing the importance that information and technology play in businesses, organizations have started making strategies.
Preview sample
Information Management and The Impact of Sociotechnical Systems Information Technology Coursework
8 pages (2000 words) , Download 1 , Coursework
Free
Sociotechnical systems are approaches that relate to organizational work design with complexities that takes cognizance of people and technology at their workplaces in the context of organizational development. It simply describes the manner in which the infrastructural complexities in the society interact with human behavior. 
Preview sample
Information Technology and Supply Chain Management of Phab Expansion Information Technology Report
12 pages (3570 words) , Download 1 , Report
Free
This report critically reviews the features of Information and Communication Technology and the Supply Chain Management issues relevant to the expansion. It identifies key issues that the owner, Ogonwe, needs to be sensitive to and provides logical recommendations on how to optimize resources and attain the best results in implementation.
Preview sample
Managing the Digital Enterprise of Amazon and Dell Companies Information Technology Case Study
7 pages (1945 words) , Download 1 , Case Study
Free
A business model is defined as an approach adopted by organizations to integrate the description of a product and services provided by an organization, the level of information movement within the organization. It demonstrates the degree of innovation of an organization and its responsiveness to consumer needs and changes in taste preferences.
Preview sample
The Sale of Handmade Crafts Online Information Technology Term Paper
12 pages (3286 words) , Download 1 , Term Paper
Free
This is the competition. Notably, these sites currently do not make provisions for clientele to design their own products. The proposed intends to stay unique by providing a platform for buyers to design their own products. This will be facilitated by having clients draw sketches or upload pictures of their preferred designs.
Preview sample
A Human-Computer Interaction Guide for the Implementation of a Mobile Web Information Technology Term Paper
10 pages (2804 words) , Download 1 , Term Paper
Free
The author of the following paper states that the students can access their personal and course-related material from all the widely used internet browsers through their desktop systems. The purpose of the mobile application is to allow the students to access the same resources through their mobiles as well.
Preview sample
Software Development Methods for White Horse Company Information Technology Case Study
9 pages (2269 words) , Download 1 , Case Study
Free
In today’s changing world, agile software development is accepted as the best way to deliver high quality and trusted software. Scrum method is one of the most popular agile methodologies. However, the scrum method does not support engineering practices. Extreme programming is regarded as the best practice of software engineering disciplines.
Preview sample
The Database Management Process Information Technology Term Paper
12 pages (3141 words) , Download 1 , Term Paper
Free
When data were processed with conventional files, it fulfilled the need existing during those eras. With increasing complexity in data as well as an enormous volume of data generation, users started to feel the need for data processing, filtering, monitoring and even controlling it. At present, almost every organization needs to access, monitor.
Preview sample
Impact of IT in the Music Industry Information Technology Essay
6 pages (1825 words) , Download 1 , Essay
Free
The market for music reflected numerous modifications and this change as a whole has been examined very minutely by the record labels for devising strategies (Barnet and Burriss 125). These strategies helped the record labels to understand the changing taste and preferences of the consumers and their nature of devotion towards music.
Preview sample
Software as a Service Information System Information Technology Essay
6 pages (1697 words) , Download 1 , Essay
Free
The opinions about cloud computing differ from one person to the other. For example, Schneier (2009) emphasized the fact that “cloud computing is nothing new”, but the contemporary version of the time-sharing model of 1960s. The author also mentioned that the notion of time-sharing eventually came to an end with the developments of a personal computer.
Preview sample
Issues Limiting the Possibilities of Artificial Intelligence Information Technology Case Study
9 pages (2639 words) , Download 1 , Case Study
Free
It can also be perceived as a branch of computer science concerned with the creation of brainy machines that have the capabilities to mimic human intelligence, thereby reacting like a man. Such aspects in contemporary computing as machine learning, voice recognition, use of computers to solve problems.
Preview sample
Inclusion of Windows Deployment Services Information Technology Case Study
10 pages (2712 words) , Download 1 , Case Study
Free
More versions of user friendly, machine friendly, and secure software packages are being released by vendors very now and then. For years, Microsoft has released different versions of their windows server. The different versions come with improved features and capabilities that suit the user requirements for competitive advantage.
Preview sample
The Flight of Unmanned Aerial Vehicle Information Technology Case Study
7 pages (2096 words) , Download 1 , Case Study
Free
Brooks explains that the launch and recovery method of a drone is always conducted by a task of an external operator who is on the ground or an automatic system that is computerized. On a historic note, UAVs are aircraft that are remotely controlled; however, autonomous control of the aircraft is on an increase.
Preview sample
How Smartphones Impact a Business or even Human Life Information Technology Research Paper
45 pages (11107 words) , Download 1 , Research Paper
The author of the paper points out that the fact that evolution is huge and it is happening continuously from multiple directions leads to a very complicated situation and a very difficult puzzle for the company's decision-making people that they have to decide in which direction they will lead their companies.
Preview sample
The Role and Importance of Technology Information Technology Term Paper
11 pages (2838 words) , Download 1 , Term Paper
Free
The author points out that the reason behind this has to do with the fact that the technology of several decades ago was much simpler than it is in the current time. For instance, understanding data management in the 1950s or 1960s was only a question of where information was physically stored and how it was organized.
Preview sample
The Acquisition and Growth of Unmanned Aerial Vehicles Information Technology Case Study
6 pages (1698 words) , Download 1 , Case Study
Free
It can be affirmed that UAVs help in enhancing the overall effectiveness of military tasks along with providing complete assistance to NASA for performing its operations effectively. UAVs are drones that are usually larger in size and require an airstrip for take-off. Since UAVs are quite expensive and risky in terms of collision.
Preview sample
The Application of Manned Aerial Vehicles on Warzones Information Technology Term Paper
8 pages (2577 words) , Download 1 , Term Paper
Free
It's pointed out that an unmanned aerial vehicle is an aerial vehicle specifically designed for use without the need of a pilot. The unmanned aerial vehicle is widely known as a drone. Drones are mostly used in the military zones by the U.S. and other developed states to provide surveillance for troops on the ground.
Preview sample
Process of Development, Design, and Validation of Apple Information Technology Case Study
6 pages (1809 words) , Download 1 , Case Study
Free
The author of the paper states that these products have been strong sources of fascination for decades given that it tends to defy long-held conventions of how it ought to work organizations as large as this. This article will delve into each aspect involved in this process of development, design, and validation in detail.
Preview sample
The Growth of E-Commerce Information Technology Case Study
8 pages (2367 words) , Download 1 , Case Study
Free
The author states that the revolution in computing in the past few decades is an indication that the use of information technology will continue at a rapid speed. The growth of e-commerce is creating fundamental changes in society, governments, and economies with political, social, and economic impacts.
Preview sample
The Most Appropriate Solution for MyBiz Information Technology Term Paper
16 pages (4204 words) , Download 2 , Term Paper
Free
It has been anticipated that the server will soon end up followed by an irreversible breakdown. Correspondingly, the current situation of the server has forced the organization to find alternative solutions for the issue that it might face later or sooner. In this regard, it has been reckoned that the organization has three possible alternatives.
Preview sample
A Network Solution for Sports Authority Field Information Technology Term Paper
18 pages (4881 words) , Download 1 , Term Paper
Free
The stadium runs as a business, independent of the teams that play there. The stadium management needs to gather for the needs of various users of the stadium such as guests, visitors, fans, and press officials. Currently, it is assumed that the stadium has no LAN connection to gather for the needs of the users.
Preview sample
The Strategy of an App for Pet Owners Information Technology Term Paper
15 pages (4111 words) , Download 2 , Term Paper
Free
The author states that it will be in every dog owner’s mobile phone. While it is not difficult to pet a dog, it is even easier if u can see all the data related to them and choose from various cool outlets, parks, and socializing areas on a single map on your cell phone. The app provides much more than just a social app.
Preview sample
The Corporate Strategy of Plunders Information Technology Case Study
6 pages (1749 words) , Download 1 , Case Study
Free
The term data-centric refers to software architecture in which databases play a huge role in defining the infrastructure, This can also mean Business Intelligence, data science, and other crucial elements that define the organization’s zeal to capture data. In addition, data-centric revolves around ERD.
Preview sample
Details Concerning the Virus Information Technology Case Study
6 pages (1751 words) , Download 1 , Case Study
Free
The author states that the virus causes devastating effects on the functionality of the operating systems leading to irreversible significant damages. The virus is intentionally created by computer expatriates with ill intentions and once its initial transmissions have taken place it becomes very difficult to regulate.
Preview sample
Development in the Field of Information Technology Information Technology Assignment
7 pages (2296 words) , Download 1 , Assignment
Free
Increased use of IT has affected societies in both positive as well as negative manner. The two positive societal effects of increased use of IT could be witnessed in the arena of education and sharing information. The education system with the implementation of IT is facilitated in providing education services to students in an effective way.
Preview sample
Application Layer and Applications - The Interface between the Networks Information Technology Literature review
7 pages (1928 words) , Download 1 , Literature review
Free
The layer under discussion in this paper is the application layer and applications. The application layer is the layer that provides the interface existing between the applications used in communication and the underlying network where messages are transmitted. This layer in the OSI model serves as the first step of ensuring that data is on the network.
Preview sample
History of LINUX Information Technology Literature review
6 pages (1913 words) , Download 1 , Literature review
Free
To make UNIX portable, Ritchie and Thompson were compelled to rewrite it in a novel programming language named C, something that led to its wide use in institutions (Negus, 2013). Richard Stallman, in 1983, began the GNU project with intent to create an operating system that was similar to UNIX, but free, and created the GNU General Public License (GNU GPL).
Preview sample
Differences Between Analog and Digital Signal Processing and Control Information Technology Literature review
8 pages (2275 words) , Download 1 , Literature review
Free
This paper explains the differences between analog and digital signal processing and controls. Analog signal processing and control can be carried out in real-time and takes up less bandwidth while digital signal processing and control does not assure real-time processing, but takes up more bandwidth to convey the same data. ASP applies analog circuit components like rheostats, capacitors, and transistors.ASP has been in use for numerous years.   
Preview sample
The Enormous Benefits of the Internet Information Technology Case Study
7 pages (2063 words) , Download 1 , Case Study
Free
The Internet has made lives easy by giving us a platform through which we can access information regarding any subject across the globe. On the other hand, it even serves as a tool through which we can easily communicate with our friends or relatives or even with unknown people located in any corner of the world.
Preview sample
The Software and Hardware Components of the Watson Supercomputer Information Technology Case Study
9 pages (2775 words) , Download 2 , Case Study
Free
The paper shows that in 2011, the IBM Watson supercomputer competed and won against two competitors, namely, Ken Jennings and Brad Rutter in the challenges of Jeopardy. This supercomputer has the power to retrieve a human's ability by using natural language with a higher accurateness, speediness, and confidence.
Preview sample
The IT Infrastructure of the Pharmacy Business Information Technology Case Study
8 pages (2117 words) , Download 1 , Case Study
Free
The author of the paper states that business units in the present day context have been under high alert with regard to their security towards information from cybercriminals. Likewise, companies have strengthened their cybersecurity procedures, so that confidential business data would be secured effectively.
Preview sample
The Concept of Free Software Information Technology Term Paper
6 pages (1925 words) , Download 1 , Term Paper
Free
The author states that in the conventional licensing method, the developer is the owner of the software copyright, but in the open-source, copyright belongs to a group or entity although the source code of the software must be open for scrutiny and any user or researcher can adapt and modify the software code.
Preview sample
Internet of Things - Features, Challenges, and Weaknesses Information Technology Research Paper
24 pages (6758 words) , Download 4 , Research Paper
The successful emergence of the IoT vision, however, will require computing to extend past traditional scenarios involving portables and smart-phones to the connection of everyday physical objects and the integration of intelligence with the environment. Subsequently, this will lead to the development of new computing features and challenges. The main purpose of this paper, therefore, was to investigate the features, challenges, and weaknesses.
Preview sample
The Development of Security Domains Information Technology Term Paper
17 pages (4770 words) , Download 1 , Term Paper
Free
In the present modern era ‘Information Security Management’, has been one of the most crucial factors with the help of which organizations can ensure their efficiency and effectiveness. Thus, most of the SMEs and large organizations are interlinking systems, which specifically aim towards safeguarding the digitized information.
Preview sample
Cyber Breaches in Different Companies Information Technology Term Paper
11 pages (2992 words) , Download 1 , Term Paper
Free
AT&T underwent a cyber breach in 2010 affecting one hundred and fourteen thousand accounts. A cyber security breach affected nearly forty three thousand to fifty five thousand customers of Bartell Hotels in 2014. Zendesk suffered a cyber security breach in 2013 that affected its three consumers, Tumblr, Pinterest and Twitter. The hackers attacking Booz Allen Hamilton in 2011 targeted ninety thousand military email addresses and passwords. The company, Vacationland Vendors Inc. underwent a cyber breach that affected nearly forty thousand people in 2011. 
Preview sample
Information Security Plan Information Technology Case Study
15 pages (4378 words) , Download 1 , Case Study
Free
The company that we have selected is The Telemarketing Company, people who provide service to other organizations. They have a lot of information data available to them regarding different organizations. It becomes their duty to ensure that the data is protected all the time and no confidential information is leaked through their portals.  
Preview sample
Impacts of Digital Media on Society Information Technology Term Paper
9 pages (2442 words) , Download 2 , Term Paper
Free
Digital media includes the information and contents that can be created, distributed, viewed, reserved as well as modified on computing devices. Due to the widespread use of personal computing and the internet, digital media has become very commonly used media for collecting and distributing content.
Preview sample
Securing Data Using IPSEC VPN over Satellite Communication Information Technology Research Paper
18 pages (4935 words) , Download 1 , Research Paper
Free
These aspects comprise elaborating the functions of VPN, techniques to be used for securing valuable data and analyzing the facets of VPN over the system of satellite communications. In order to determine the aforesaid objective of the study, a qualitative approach of research method will be used. 
Preview sample
Facebook as the Most Popular Social Networking Site Information Technology Case Study
7 pages (2073 words) , Download 1 , Case Study
Free
The development of web 2.0 is among the recent developments in web technologies that have transformed the way people communicate and collaborate. Unlike web 1.0, web 2.0 allows users to create web content and this way they are able to interact. Social networking sites, such as Facebook, Twitter, and various blogs are based on web 2.0 technology.
Preview sample
Software Engineering Principles in Ensuring the Forensic Integrity of Digital Forensics Information Technology Research Paper
20 pages (5640 words) , Download 3 , Research Paper
Free
Software engineers should identify a methodology that suites the project. Software engineering works through the incorporation of distinct phases and activities, which focus on the improvement of planning and management of a development project. Methodologies and principles used in software engineering include deliverables and artifacts that are created and completed during the process of developing an application.
Preview sample
The Development of Vehicular and Mobile Network Information Technology Personal Statement
17 pages (4332 words) , Download 1 , Personal Statement
Free
My Ph.D. research focused on the development of vehicular & mobile ad hoc networks, as well as artificial intelligence and real-time communications systems. I started my Ph.D. with strong knowledge in data mining and artificial intelligence fields that I gained during my master of computer science degree from UTM.
Preview sample
1751 - 1800 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us