StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Impacts of Electronic Health Record Systems Applied to Healthcare Processes on Physician Performance Information Technology Research Proposal
8 pages (2469 words) , Download 3 , Research Proposal
Free
The adoption of the electronic health care records (EHRs) in Riyadh, Saudi Arabia differs between the three tiers of the country’s entire health care sector: hospitals operated and owned by the Ministry of Health (MoH), government agency hospitals, and private hospitals. Such a difference is partly caused by the perception of Saudi physicians on the impact of EHRs on their job performance.
Preview sample
Business Requirements and Project Plan of eBuy Pharmaceuticals Information Technology Coursework
7 pages (1989 words) , Download 1 , Coursework
Free
The information system is the greatest investment because it is the biggest eBuy Pharmaceuticals employee. Therefore, the department mandated with coming up with installing the entire information system should come up with a comprehensive information systems package knowing it substitutes thousands of employees.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Encryption of Video over WiFi Information Technology Coursework
7 pages (2060 words) , Download 1 , Coursework
Free
This encompasses both audios, written as well as visual information that is vital and needs restricted access. Based on this subject, the growing quantity of video data modified in various forms has made it difficult to come up with standard algorithms that would see to it that all encryptions are impermeable
Preview sample
Interacting with ATM Services Information Technology Assignment
4 pages (973 words) , Download 2 , Assignment
Free
ATM services are well illustrated using the case diagrams describing how users interact with the system in various events, namely; deposit transactions, transfer transactions, withdraw transactions, and inquiry transactions. During the withdrawal transaction process, a bank customer is concerned with inserting an ATM card into the ATM machine and he or she chooses the withdraw option.
Preview sample
Rocky Mountain Outfitters Project Development Information Technology Assignment
10 pages (2526 words) , Download 1 , Assignment
Free
System integrity will be the main risk in implementing CSM. For example, currently, many other subsystems are part of the single system in which all other systems working in the main server located in the central office of RMO. Mail order, phone order, retail store systems, and web-based catalog and order system.
Preview sample
Database Security and Web Applications Information Technology Term Paper
12 pages (3459 words) , Download 1 , Term Paper
Free
As an effect of these challenges, businesses struggle to defend their intellectual property as well as stop the remediation costs as well as harm to brand that result unintended exposure of employees and customers data.
Preview sample
Key Aspects of Google Technologies Information Technology Coursework
10 pages (2649 words) , Download 1 , Coursework
Free
The information is somehow revealed by the staff of the laboratory with the confirmation of their working on the project. The elevator could move from the surface of the earth to the surface of the space. They have planned to work on the project on a serious basis but did not work on the implications of the planning and strategies. 
Preview sample
Devices of USB Communications Information Technology Report
9 pages (2620 words) , Download 1 , Report
Free
Devices of USB communications are within the class of Universal Serial Bus that might include interfaces such as data interface, audio, and other interfaces related to communications done in mass. The devices for communications are for fax machines, applications of telephones, and ISDN among others for voice call performances.
Preview sample
Big Data and Analytics Information Technology Coursework
6 pages (1668 words) , Download 3 , Coursework
Free
The examples of managers’ abilities to overcome the identified challenges were noted through the following applications: “decode human DNA in minutes, predict where terrorists plan to attack, determine which gene is most likely to be responsible for certain diseases and, of course, which ads you are most likely to respond to on Facebook”. 
Preview sample
XML Labelling Scheme Methodology Information Technology Research Paper
7 pages (2185 words) , Download 2 , Research Paper
Free
The methods followed in the usage of the research process onion have been summarised in the diagram below and subsequently explained in detail. The research philosophy basically explains how available knowledge influences the research and how the research seeks to develop new line of knowledge (Diriwächter & Valsiner, 2006). 
Preview sample
Does IT Really Matter Anymore Information Technology Book Report/Review
6 pages (1500 words) , Download 2 , Book Report/Review
Free
This essay analyzes that IT being an infrastructural technology, it can only be beneficial when shared and therefore cannot give a firm a competitive edge. Part three talks about commoditization and replication of IT. As pertains to commoditization, IT is a transport mechanism as it transfers digital information.
Preview sample
The Chief Information Officer Information Technology Essay
2 pages (638 words) , Download 1 , Essay
Free
The CIO is responsible for delegating technical decision to the staff in the IT department. They make decisions on the information system the organization will require to achieve its objectives and then develop a budget to implement it (Curtis).
Preview sample
Securing and Protecting Information Information Technology Coursework
5 pages (1304 words) , Download 0 , Coursework
Free
Information security, which entails the practice of defending information from unauthorized parties, is a major issue among organizations. Securing networks is a process that has continuously been applied by individuals and firms. Within the network, a vast and evolving collection of threats is noted to compromise and exploit the weaknesses of organizations.
Preview sample
Using Auto-Reclosers And Sectionalizers In Distribution Systems Information Technology Research Paper
6 pages (1500 words) , Download 2 , Research Paper
Free
The end users also enjoy myriads of benefit from the recloser controlled supply. With only a small back up plan for the momentary outages, the continuity of power is guaranteed. As a result of the intermittent power, losses are controlled to augment the circuit breakers of customer appliances and allows a brief time for any faults to be dealt with
Preview sample
Modularization of ERP Services in the Context of Cloud Computing Information Technology Thesis
76 pages (9025 words) , Download 1 , Thesis
Hosted ERP systems normally deliver compromise feature levels that are greatly pertinent either to on-premise ERP or cloud-based ERP. The literature review established some controversies among opinions documented in previous studies concerning several risks, benefits, limitations and drawbacks of modularizing cloud-based ERP modules from different manufacturers.
Preview sample
Influence Of Smartphones On Teenagers Information Technology Research Paper
7 pages (1750 words) , Download 2 , Research Paper
Free
The principle objective of this study is to determine the impact that texting or posting, as well as verbal communication through phone, has on the conduct of the students in the classroom. There is a possibility that the major observation will be the significant difference in the test scores among the students.
Preview sample
InterContinental Hotels Group Computer System Update Information Technology Assignment
8 pages (2064 words) , Download 1 , Assignment
Free
System software that performs a particular function. Some of the system software include; system software assembler, debugger, compiler, interpreter, file management tools, and operating system that can further be divided into multitasking, multiprocessing, multi-tasking, multi-threading, real-time. Application software such as spreadsheets, graphics, and databases.
Preview sample
InterContinental Hotels Group Computer System Update Information Technology Coursework
20 pages (5349 words) , Download 1 , Coursework
Free
The construction modeling of a processor is the most vital element to focus its execution and alludes to its essential configuration and unpredictability. A few processors are essentially more modern than others, with Intel (for instance) delivering "fundamental" processors called Celerons and Pentiums, and all the more compelling processors under its "Centre" processor gang.
Preview sample
Nova Cosmetics Shop Website Design Information Technology Coursework
14 pages (3741 words) , Download 1 , Coursework
Free
After the identification of the various user types, their requirements, and choosing the best model to follow, we should find out whether the proposed plan will meet our needs. In this stage, we try to correct the complaints raised during the initial phases of the development. In this case, we decided that we should design a website.
Preview sample
Human Factors and Social Aspects in Software Engineering Information Technology Case Study
7 pages (1893 words) , Download 1 , Case Study
Free
While one could view software engineering as an issue solely left for the engineers, surprisingly, the humans do influence how it is developed. In light of the definition offered, it is easier to see why humans play a pivotal role in the software engineering.
Preview sample
Value of Open Data Information Technology Case Study
5 pages (1593 words) , Download 1 , Case Study
Free
The study will also state the technical approach and feasibility of the available data during its utilization and provide a discussion regarding the applicability of open data in several fields. It is to be noted in this regard that the free data benefits or simply, the value of available data have been evaluated from a critical perspective to the issue to obtain better insight into the phenomenon. 
Preview sample
IT Risk Analysis Information Technology Case Study
10 pages (2764 words) , Download 1 , Case Study
Free
Risk analysis involves the techniques used in the identification and assessment of factors that may jeopardize the success of achieving business goals. The decision-makers need to be provided with information to understand the factors through risk assessment. Information systems have been at risk due to malicious actions and inadvertent errors brought about by computer users.
Preview sample
Information Security Protocols Information Technology Coursework
8 pages (2729 words) , Download 1 , Coursework
Free
To provide proper security to such applications, there is a need to develop various security protocols. Security protocols provide protection to communication that exists within a hostile environment. It does so by using cryptographic primitives to perform security-related functions. People realize that many protocols reveal flaws in computer security literature.
Preview sample
Critical Appraisal of Software Tools in a Commercial Environment Information Technology Research Paper
13 pages (3674 words) , Download 1 , Research Paper
Free
This particular study focuses on the implementation of management software tools in the business process along with understanding the benefits that are derived from the same. The advancement of Information Technology (IT) has therewith helped business organizations to carry out their operational activities easily with efficient results at the same time.
Preview sample
Cyrmru Capital Investments Information Technology Coursework
24 pages (6478 words) , Download 1 , Coursework
The discussion will specifically rely upon the report outcomes projected by the auditors based upon which suggestive strategies will be provided with the prime intention of improvising the flexibility and security associated with the spreadsheet usage by CCI. In addition, an attempt will be made in analyzing the prevalent risk factors and loopholes.
Preview sample
Emirates Group-Information Technology Information Technology Research Paper
10 pages (2552 words) , Download 1 , Research Paper
Free
The paper comes with the decision on installing a new considering financial appropriation or upgrading the current one that is used with the employees. The increase in productivity will also be identified and also lead to the improvement of its solutions which intern increasing the profitable income.
Preview sample
The Application of Cloud Computing To eLearning Information Technology Research Proposal
5 pages (1712 words) , Download 2 , Research Proposal
Free
They will employ the Multiple Regression analysis to access the most critical issues, and benefits, as well as the inductive approach, will be used to evaluate the consequences of cloud-based eLearning. The research will employ the mixed methodology by relating both qualitative and quantitative methods to justify the quality of research from both methodological perspectives. It is assumed that the study will be completed in approximately four months.
Preview sample
Angry Bird Video Game Personal Reflection Information Technology Essay
4 pages (4667 words) , Download 0 , Essay
Free
One characteristic of video gaming is the fact that it will demand the attention of the learner and provide what information is needed for any junction within the game. Every game maintains its own particular varying methods of problem-solving. Per se, the solving process requires an active mind that will aid in the process of completing a task successfully.
Preview sample
The Evolution of Digital Crime Information Technology Case Study
6 pages (1780 words) , Download 1 , Case Study
Free
Several people are now rushing to be part of the experience that this open network presents rather than learning about how to use it responsibly. The outcome of this is that before several users are aware, they have been swindled by others who have made the act of digital crime, including cyber crime their unauthorized business.
Preview sample
Uses Of The Contemporary Information Technology In The Business World Information Technology Research Paper
4 pages (1000 words) , Download 0 , Research Paper
Free
Communication technology and business and information became parallel with each other and this had a negative impact on the trading activities. In fact, people were compelled to cover long distances in order to fetch or send products. It is on this ground that the evolution of ICT facilities found a place in the modern business processes.
Preview sample
Learning Management System Information Technology Literature review
12 pages (3196 words) , Download 1 , Literature review
Free
The Learning Management Systems (LMS), during the last 15 years have become vital for e-Learning contributors as platform to hold course registration, substance storage and deliverance, evaluation, supervision and treatment (Lai and Savage 1-21). On the other hand, the LMS market has remained very disjointed. We cannot find any particular e-Learner organization that has get fame and analyst organizations that directs this industry such as Bersin & Associatesi, report that client can select from numerous sources.
Preview sample
Identity Theft Information Technology Literature review
7 pages (2101 words) , Download 1 , Literature review
Free
This form of theft involves the criminals obtaining and using the personal information of different people like their credit card data, bank account details and insurance information as well as social security numbers to make purchases of goods and/or services in a fraudulent manner without the consent of the owners.
Preview sample
The Reason for a Company to go to an Enterprise Solution Information Technology Literature review
11 pages (3042 words) , Download 1 , Literature review
Free
Meanwhile, the term “enterprise” is very broad and often encompasses virtually all aspects of computer technology for business solutions, including software, hardware, and the employees needed to successfully implement the requirements of particular organizations. Overall, marketing personnel have coined the phrase “enterprise solutions” to foster interest in various business solutions offered by specialists.
Preview sample
How Information Technology Influences the Success of Business Organizations Information Technology Case Study
7 pages (2120 words) , Download 1 , Case Study
Free
Information technology has made it easy for people to pass various kinds of information from one part of the world to another. This development has seemed to cement the fact that the world has indeed become a global village. Not only in people’s lives has these developments made a great impact, they have also enhanced the manner.
Preview sample
The New Paradigm Of ICT Information Technology Research Paper
4 pages (1000 words) , Download 0 , Research Paper
Free
E-commerce has existed in the business world over the last forty years. Its history is related to the electronic information transmission during the 1948 Berlin airlift. This electronic exchange opened up an era of e-Commerce development. In the 1960s, various industry groups initiated a cooperative effort to form common data formats.
Preview sample
Trouble-Shooting and Maintenance Plan of XYZ Company Information Technology Assignment
6 pages (1500 words) , Download 1 , Assignment
Free
The main aim of developing a database maintenance plan is to assist in the prevention of query performance drops, corrupt databases and the risk of servers running out of disk space. When the database maintenance plans are properly implemented, then the system can be able to give adequate protection or prevent a variety of problems that are database related.
Preview sample
The Correct Information for the Good of All Global Internet and Cyberspace Users Information Technology Assignment
8 pages (2123 words) , Download 1 , Assignment
Free
Every cyberspace user has a right to access coupled with freedom of expression, and hence they are responsible for ensuring propped use of cyberspace without transmitting untrue information that threatens the rights and privacy of other users. The freedom of expression and the right to access must be upheld without compromising.
Preview sample
The Concept of Latcham Direct Limited Information Technology Research Paper
8 pages (2464 words) , Download 1 , Research Paper
Free
The author of the paper states that the company has become globally renowned due to its exceptional quality of services. Over the last few years, the company has offered an array of services such as integrated digital printing, data processing, and multi-channel communication services to its consumers.
Preview sample
Networking the Small Office Information Technology Case Study
4 pages (1309 words) , Download 0 , Case Study
Free
The case study is on Leviathan, a construction management firm that acquired a long term with a small firm Wyvern (Campbell, 1996). The combination of the companies requires a data communication consultant to assist in the communication solutions for the companies who has three offices, two in Charlotte and one in Columbia.
Preview sample
Emerging Technology in the Education Sector Information Technology Essay
6 pages (1632 words) , Download 1 , Essay
Free
Mobile and tablet computing as an educative tool is also an emerging technology that is being embraced worldwide. However, mobile learning can also be highly disruptive, especially in learning as students misuse mobile phones in classes and outside. Research shows that the majority of social media users are young people.
Preview sample
The Internet In Everyday Life Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
The quality of cyberspace studies has also improved. He mentioned that internet has helped in the widespread of information. It has become the most important issue in everyday’s life. Many gossips and fantasy are associated with the development of communication through the internet. The internet has a vital role in advancing the society.
Preview sample
Accounting Information System. Data Base Information Technology Term Paper
4 pages (1237 words) , Download 0 , Term Paper
Free
A database is a set of computer files that minimizes data redundancy and accessed by more than one application programs. Data base approach applies when information grouped in data files aims to serve more than one type of user (Garcia, 2014).
Preview sample
Cybercrime Security Threat Information Technology Literature review
5 pages (1599 words) , Download 2 , Literature review
Free
Both government and private sector have been a victim. Despite extensive awareness of the impact of cyber crime, the attacks seem to be more rampant. According to a study conducted, a company in US uses $ 1.5 million to $ 36.5 million each year on cyber crime. Companies considered experienced 72 successful attacks per week (Ponemon Institute August 2011).
Preview sample
3D CAD Solid Models Information Technology Assignment
6 pages (1625 words) , Download 1 , Assignment
Free
Solidworks is the software that allows one to speed up in the designing process and whilst that ends up reducing the duration and development costs that are increased in the productivity of the Solidworks. In the 3D solid modeling, the evolving and most crucial aspect of the resulting products is the development of the founded designing procedures. 
Preview sample
Advertising on the Web: Options and Trends Information Technology Literature review
8 pages (2299 words) , Download 1 , Literature review
Free
While for profit organizations advertise so as to persuade and convince the audience to use their services and products, not for profit organizations use it to encourage behavior or perception change as well as raising awareness. This communication, generally with respect to commercial offerings, ideological or political support, is commonly via a range of forms of paid media that include the Internet, billboards, print media, and radio.
Preview sample
Social Networking In Everyday Life Information Technology Research Paper
6 pages (1500 words) , Download 2 , Research Paper
Free
Social networking supports free advertising. Social networks are convenient for business advertising. Many companies and organizations use the social sites to advertise their products. In this regard, the advertising costs incurred by companies and other organizations are reduced, thereby increasing the profit margins.
Preview sample
Correct Work with the Word Information Technology Case Study
7 pages (1310 words) , Download 0 , Case Study
Free
The basic navigation features provided by windows include open, edit, new, print, open with, share with, send to, cut, copy, create a short cut, delete and properties. 'Open' is a feature used to activate the open command to view the content of a document. 'Edit' is this choice enables the opening of a document to make changes in a document.
Preview sample
Hadoop is One Top Level Apache Project Information Technology Report
5 pages (1284 words) , Download 1 , Report
Free
The Hadoop Map Reduce happens to be a software framework for writing applications easily and can process data volumes that are huge (multi-terabyte sets of data), in parallel and on massive clusters of thousands of nodes for commodity hardware in a reliable manner as well as fault tolerant. 
Preview sample
SWOT Analysis of Internet Security Information Technology Essay
10 pages (3045 words) , Download 1 , Essay
Free
Technology is rapidly changing. Technology keeps on improving day by day. Moreover, it has much impact on our daily operations. The ever-improving technology has produced tremendous changes in communication. Institutions and governments have made good use of technology to enhance their operations. Individuals have also not been left behind.
Preview sample
Crowdsourcing Information Technology Literature review
15 pages (3902 words) , Download 1 , Literature review
Free
Throughout its growth, crowdsourcing has greatly affected the field of interface design. Regardless of a few challenges facing crowdsourcing, incorporating crowdsourcing guarantees several benefits that offset its shortcomings to project implementers.
Preview sample
1801 - 1850 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us