Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
9 pages (2903 words)
, Download 1
, Literature review
Free
The software development process involves applying a specific methodology to identify “who is doing what, where, why, how, and when” so as to better manage and guide it and deal with potential problems. Its fundamental components or stages are specifying, developing, validating, and evolving, but different needs and requirements mean that the generic process has to be adapted.
As we all know for all kinds of operations businesses are dependent on some or the other kind of information or communication technology. Information technology (IT) plays a vital role in achieving the company’s desired objective. Today, the most known and effective technology is “green IT”. Green information technology is an advanced technology used for reducing extensive or additional energy.
Preview sample
sponsored ads
Hire a pro to write a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
One of the most difficult challenges in developing Artificial Intelligence (AI) is to create a machine that “thinks” as intelligently as humans do. However, devising a definition for the word “think” itself is quite a task. This is because it is yet unclear as to what comprises a human being’s thoughts, and what is the driving force behind his/her intelligence.
The software would automate the customer relations, financial, and HR functions of the company. The company is a middle-sized firm catering to the printing and brand protection needs of its customers. There has been rapid expansion and the company needs automation to increase efficiency. They do not want to purchase the software as they are more complex and come with unnecessary modules.
A patient may require emergency resuscitation or services that require urgent attendance in order to save a life which is the key aspect of patient care. The services may not be available being that the doctor concerned is committed or attending to another procedure in a different place which may be far geographically (Louis E. Boone 13).
6 pages (1600 words)
, Download 1
, Literature review
Free
A central controversy that raised concerns among scholars studying the history of media or communication technologies is the extent to which technology conditions social change. Each of the scholars emphasizes on different factors associated with technological change. However, in the past years, scholars have criticized the concept.
The knowledge-based clinical statements are expected to reduce the workload on the clinician. They will also reduce the time they take to make decisions. Decisions made with these systems are also correct always. These positive factors will make clinicians in the future to accept the knowledge-based system.
Pay per click (PPC), also referred to as cost per click (CPC), is an internet advertising model where advertisers pay an agreed-upon amount to the publishers (website owners) each time their advertisements are clicked (Wikipedia, 2011). Rather than using the bidding system, the website owners commonly charge the advertisers a fixed amount or price for each click made on their advertisements.
The social web and social media are 21st concepts, although the idea of interpersonal connections has existed throughout history. Contrary to historical notions of social networks, contemporary social networks that exist in the space of the internet carry with them inherent risks to private information.
10 pages (2534 words)
, Download 1
, Book Report/Review
Free
According to Skyttner (2006), the scholastic paradigm revolved around religion, with all scientific and social developments supporting religion. In this era, religion was superior to all other factors, and nature was alive and mortal. In this case, theological considerations took precedence over all other factors.
Biometric systems will also be incorporated at the entrance/exit of the critical department for tracking employee existence and activity. IP based cameras will be installed on suitable locations for tracking critical server equipment and employee activities. For detecting potential and current threats, intrusion detection systems will be considered.
8 pages (2340 words)
, Download 1
, Literature review
Free
Medical practitioners are using technology-based tools and applications to treat patients and provide them with high-quality health care services. While computerized decision aids such as health information systems have made their presence felt in the industry and such systems are widely adopted by clinics and hospitals, there are significant barriers facing the optimal use of these systems.
With the increased use of computers and the Internet to manage our lives, cyber crimes have become a common term of use. Criminals have managed to adapt the traditional method breaking into a house to breaking into computer systems. Cybercrime is defined as "use of the Internet, computers and related technologies in the commission of a crime".
In recent years, the number of malware has increased significantly because of the use of automation, as well as kits to facilitate its distribution and creation. It is a type of crimeware that takes advantage of exploits that are unpatched with the view of hacking computers through malicious scripts that are planted on legitimate but compromised websites.
6 pages (1797 words)
, Download 1
, Research Proposal
Free
What are the current implications of high energy costs in the information sector and what is the potential significance of using cloud computing technologies to lower energy consumption? What is the concept behind cloud computing and data virtualization? What are the likely benefits of moving data centers to the cloud? What are some of the associated risks and mitigation measures?
7 pages (1979 words)
, Download 1
, Research Paper
Free
Basically the smart grid is a set of technology that people are utilizing to get efficient electricity delivery systems into the current era of technology, by making use of information technology supported remote control and automation. Additionally, collaborative communication mode is used to make possible the computer processing that has been employed for decades in a number of other sectors.
8 pages (2330 words)
, Download 1
, Research Paper
Free
Because of too many graphics/ pictures (which is a plus to the Nebula Website since it needs to display its products), a significant amount of time will be taken to load depending on connectivity wherever a user is. This may inconvenience an impatient visitor, hence not achieving his/her goals in visiting the site.
7 pages (2532 words)
, Download 1
, Research Paper
Free
Situation Awareness Research Initiative has the primary objective of collaborating to advance research and technology in relation to cyber functionality, security, efficiency, dependability, reliability and security situations awareness as initiatives aimed at improving and refining related metrics, standards, mission assurance practices and visualization of the cyber projects.
9 pages (2679 words)
, Download 1
, Research Proposal
Free
Situation awareness in cyber (CSA) defense entails the realization and recognition cognitively, of the performance of the technical enterprise, the relationship between technical performance and sets of missions that are under support, recognition of threats internal and external toward the enterprise, and have the activity awareness in relation to the broader agency.
There has been so much scientific and technological advances in the last few decades as compared to the progress achieved by humans in the last few centuries and millennia. This great leap in knowledge started more or less during the Industrial Revolution and has been accelerated ever since, resulting in an explosion of data, information, knowledge and wisdom.
VPN will encrypt the data before sending and it establishes a secure channel protected from hackers of cybercriminals. However, user credentials are required for authorization and authentication on the VPN server. Furthermore, for configuring multiple operating system environments on active directory, a domain server must be placed in Georgia, India, California, Canada, and New York.
A number of recommendations will be developed that will aid the Higher education sector in Libya inadequately integrating the use of e-books. These recommendations will essentially be based on both an extensive analysis of the stakeholder preferences and experience in relation to technology-based learning as well as on an overview of the key institutional contexts with respect to the same.
Domain extensions tend to help to obtain the required domain name in case the first choice of domain is not available in a particular extension for example if the preferred domain name is shivllc and shivllc.com has already been registered then there is a chance the company may be able to obtain the domain name shivllc.net or shivllc.org (Lowery, 2013).
This paper proposes an intelligent decision-making MCDM model that generates concept map ontology construction and decision-making in e-learning. The design and implementation utilize intelligent rules and integrates a myriad of techniques. Learning materials are classified and presented to the users depending on the constructed fuzzy ontologies.
8 pages (2171 words)
, Download 1
, Research Proposal
Free
The concept of traceability remains an essential component for all projects undertaken in software development. The identification of the various relationships and effects of attributes, upon others within the same project, remains essential in successfully implementing a software development project.
7 pages (1842 words)
, Download 1
, Research Proposal
Free
The most efficient method for a company to migrate to Windows 8.1 is through desktop virtualization. It is faster and cheaper than upgrading from a disk. This is because this method needs only one server to be upgraded to Windows 8.1 and the VM endpoints will run on an image generated by the server. Enterprise mobility will also be addressed through desktop virtualization.
14 pages (3410 words)
, Download 1
, Research Proposal
Free
The management of the Systems Upgrade project for Clyde Valley Financial Solutions will two major milestones i.e. installation of the Windows Server 2008R2 Microsoft and installation of the Management Console (MMC). Windows Server 2008R2 will endow the company with a centralized tool for daily management of activities in the form of Server Manager.
11 pages (3214 words)
, Download 2
, Research Proposal
Free
The research study is dedicated to investigating the causes and effects of internet addiction. The researcher formulated three hypotheses that will be tested and validated or nullified when carrying out the research study. The research takes a quantitative research design with questionnaires being the main tool of primary data collection.
The organization XUMUC is facing issues regarding networking throughout its new centers. It is advisable that the XUMUC should take into consideration the necessary changes that have been proposed for upgrading they're exiting the network setup. Further, the assignment also showed some of the measures that are required to be undertaken to reduce the high administrative overhead.
6 pages (1696 words)
, Download 3
, Research Paper
Free
Additionally, besides mobile phones, other related devices have also been devosed to add value to human life and increase efficiency in their communication and other social and economic functions. However, in as much as these technologies have brught many advantages in human life, they have also been cited as the potential causes of the many problems that continue to affect the quality of life.
10 pages (2855 words)
, Download 1
, Literature review
Free
However, the data that is analyzed via different techniques is fetched from data warehouses, where many databases are interconnected with each other. Major techniques that are involved in the process of knowledge management are regression, classification and clustering (Wu, Ming, He, Li, & Li, 2014).
8 pages (2262 words)
, Download 2
, Literature review
Free
This paper also outlines some of the main advantages those are presently attained through the robotics technology in the medical sector. Basically, a ‘robot’ is a reprogrammable, multifunctional machine intended to move material, tools, parts or particular devices through a variety of engineered motions for performing various tasks.
12 pages (3569 words)
, Download 1
, Literature review
Free
It helps the organizations in managing, accessing and updating their data in the best way possible with easy access as the data is saved in a systematic record. As new software is present with innovative technology for a database, the risk to secure the data from malicious sources is also a prime concern of the administration and the IT Department of any organization (Natan, 2005; Loch & Carr, 1992).
6 pages (1759 words)
, Download 2
, Literature review
Free
Since huge applications have a huge number of variables, direct utilization of computer experiments requires exceedingly large designed experiment as well as considerable computational effort. Naturally, variable selection can be conducted after executing small computer experiments. However, conventional techniques of variable selection cannot be applied in huge variables.
10 pages (2937 words)
, Download 1
, Literature review
Free
However, if quantity is achieved without quality, the outcome is not favorable. Instead of face-to-face, ‘Distance Learning’ involves learning from a computing interface. The distance between the learner and the educator is the basis for employing this means.
12 pages (3421 words)
, Download 1
, Research Paper
Free
The period saw great development in mainframe computers and numerous technology based companies had invested for development of computer languages. for training and supporting computer programming projects, which provided an easy access for codes modification.
11 pages (3120 words)
, Download 1
, Research Paper
Free
This paper has discussed the best practices of the Windows 7 Operating System and also some vulnerabilities of this system. It has two sections: the first section has elaborated a number of the best features in Windows 7 OS.
10 pages (2791 words)
, Download 1
, Literature review
Free
However, some users would be having intentions of accessing personal files of other users, corrupting public files or denying users access to printers forcing us to think carefully about network integrity. Contemporary society cannot allow us to continue using a centralized service delivery system where people crowd around one terminal to receive services.
6 pages (1635 words)
, Download 1
, Literature review
Free
The integrated technology entail portfolio that is project based. Technology can be defined as an integration of tools, people, knowledge and systems with a goal of improving the organizational performance and lives of people. Assessment of technology has to target knowledge, systems and tools, procedures, people and the new knowledge pertaining to technological innovation.
7 pages (2236 words)
, Download 1
, Literature review
Free
It allows the providers to deliver quality and low-cost services quite quickly, and the patients can improve their health issues by participating more with their very own health (Chaudhry, Wang, & Wu, 2006).In the recent years, there is seen much of the Federal struggle to increase the use of health information technology or electronic health information implementation to prompt innovation in Healthcare Delivery by health service providers (Buntin, Burke, Hoaglin, & Blumenthal, 2011).
10 pages (2634 words)
, Download 1
, Literature review
Free
Though Linux Kernel alone could not make an operating system, it is matching with GNU tools marked the starting point for the current Linux operating system (Carns, Ligon, Ross, & Thakur, 2000). Though Linux has enjoyed incredible achievement since the first request of Torvalds in 1981, it is in numerous ways still at the start of its potential.
21 pages (5460 words)
, Download 1
, Research Paper
With technological advancements in operations, organizations are often forced to digitalize their operations through the upgrading of systems and procedures used in conducting activities in the organization. One such area that firms have often sought to digitalize has been financial system in use by such organizations so as to accommodate all system’s functionality in relation to the generation of services by the system.
6 pages (1339 words)
, Download 3
, Research Paper
Free
This is to help to efficiently manage their utility distribution systems and replace the existing system. This will act as a learning point for other water and sewerage companies in other counties. Nairobi, the capital city of Kenya is the most important economic centers in Eastern and Central parts of Africa (Preston, 2013).
15 pages (3902 words)
, Download 1
, Literature review
Free
Throughout its growth, crowdsourcing has greatly affected the field of interface design. Regardless of a few challenges facing crowdsourcing, incorporating crowdsourcing guarantees several benefits that offset its shortcomings to project implementers.
8 pages (2299 words)
, Download 1
, Literature review
Free
While for profit organizations advertise so as to persuade and convince the audience to use their services and products, not for profit organizations use it to encourage behavior or perception change as well as raising awareness. This communication, generally with respect to commercial offerings, ideological or political support, is commonly via a range of forms of paid media that include the Internet, billboards, print media, and radio.
11 pages (3042 words)
, Download 1
, Literature review
Free
Meanwhile, the term “enterprise” is very broad and often encompasses virtually all aspects of computer technology for business solutions, including software, hardware, and the employees needed to successfully implement the requirements of particular organizations. Overall, marketing personnel have coined the phrase “enterprise solutions” to foster interest in various business solutions offered by specialists.
7 pages (2101 words)
, Download 1
, Literature review
Free
This form of theft involves the criminals obtaining and using the personal information of different people like their credit card data, bank account details and insurance information as well as social security numbers to make purchases of goods and/or services in a fraudulent manner without the consent of the owners.
12 pages (3196 words)
, Download 1
, Literature review
Free
The Learning Management Systems (LMS), during the last 15 years have become vital for e-Learning contributors as platform to hold course registration, substance storage and deliverance, evaluation, supervision and treatment (Lai and Savage 1-21). On the other hand, the LMS market has remained very disjointed. We cannot find any particular e-Learner organization that has get fame and analyst organizations that directs this industry such as Bersin & Associatesi, report that client can select from numerous sources.
While one could view software engineering as an issue solely left for the engineers, surprisingly, the humans do influence how it is developed. In light of the definition offered, it is easier to see why humans play a pivotal role in the software engineering.
Devices of USB communications are within the class of Universal Serial Bus that might include interfaces such as data interface, audio, and other interfaces related to communications done in mass. The devices for communications are for fax machines, applications of telephones, and ISDN among others for voice call performances.