StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Mobile IP Operation Principles Information Technology Coursework
6 pages (1564 words) , Download 0 , Coursework
Free
Traveling business persons, corporate executives, and organizational employees demand unreserved and uninterrupted access to their office databases, personal files, office mail, video conferencing, and other office related communication while traveling between geographically disperse locations. The Internet Protocol (IP) has advanced the Internet.
Preview sample
Developments in IT: More Problems or Solutions Information Technology Essay
5 pages (1424 words) , Download 0 , Essay
Free
They provided more effective ways to do things even though in some cases, it does not solve the problem adequately. IT developments have changed the online gaming industry. IT has brought with its merits and demerits in which merits outweigh the demerits. Though, almost perfect creations the problems solved are less bound to errors.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Direct Stiffness Method Information Technology Article
5 pages (1408 words) , Download 0 , Article
Free
FEA uses the basic principles of DSM and this gives the best relationship between the two. While FEA is used for complex structures, DSM is usually applied for simple structures such as a two-node structure, simple frames, or truss that are rigidly supported. The rigid support is to ensure that, displacements and forces act only at the joints.
Preview sample
Differences between Various Video Coding Standards Information Technology Essay
4 pages (1355 words) , Download 0 , Essay
Free
Video compression allows for the reduction of data that is used to present video images. It's necessary for everyone to understand each standard, deriving similarities, and differences as well as find out how they work. This article will elaborate on how these standards enable images to be changed into a motion picture.
Preview sample
Historical Stages of Computer Development Information Technology Essay
5 pages (1532 words) , Download 0 , Essay
Free
Abacus is still in use in many parts of Asia. This simple device enables users to make computations through the use of sliding beads systems neatly arranged on a wooden rack. Records have shown that early traders used the abacus for proper record keeping of business transactions. However, the abacus lost its significance.
Preview sample
How Apple Changed our Lives Information Technology Essay
7 pages (1778 words) , Download 0 , Essay
Free
Founded in 1976 by Steve Jobs and Steve Wozniak, the company introduced the Apple II microcomputer way back in 1977. It was the first company developed to use the graphical user interface (GUI) in the product that it launched in 1983, the Lisa. However, its phenomenal success came with the launch of Macintosh (popularly known as Mac) in 1984.
Preview sample
Cell Phone, Cellular Antenna, and Wi-Fi Radiation Analysis Information Technology Essay
4 pages (1354 words) , Download 0 , Essay
Free
Currently, there are over 5 billion cell phones which are operating on the planet. By November 2012, the number of mobile phone users in the world stood at 6 billion. This means that cell phones usually exchange signals within seconds’ irrespective of the owner’s location. To begin with, the most basic concept of cell phones are electronic devices.
Preview sample
Internet of Things as an Emerging Technology Information Technology Essay
7 pages (1817 words) , Download 1 , Essay
Free
Internet of things also known as IoT is an emerging trend of technology today. It’s high in use today as its applications are found from schools, hospitals, governments' houses, and cars. Its applications are seemingly limitless and its demand is high. However, like every good thing in technology it has, its own cons.
Preview sample
The Truth about Internet Search Information Technology Essay
6 pages (1539 words) , Download 0 , Essay
Free
It is disconcerting when one gets online to get substantial information only to be harassed by advertisement pop-ups that are even irrelevant to the needs of the internet user. Sometimes, I get offended because some content that comes into view on my Facebook page does not align with my ethics and beliefs.
Preview sample
Windows 10 Inspection Tests Information Technology Essay
8 pages (1824 words) , Download 0 , Essay
Free
There is rapid development in the personal computing and technology sector accompanied by advancements in user interfaces that seek to improve user experiences. These tools provide a form of interaction between the user and the personal computer or mobile device, considering that machines and humans use different languages.
Preview sample
Worldwide Online Communities Information Technology Essay
7 pages (1901 words) , Download 0 , Essay
Free
Technology continues to change the world, and it does not show any signs of slowing down anytime soon. Apart from making the world a global village, it has moved socialization to another level where people are not limited to interaction through digital communities. People have formed a particular interest where members can join through via web links.
Preview sample
Terrorism on the Internet Information Technology Essay
6 pages (1533 words) , Download 0 , Essay
Free
The summary method of citation is has been used by the author in exploring the various aspects of cyber terrorism. Most of the referencing techniques or citing used in this literature is mainly the summary. This is primarily because all the in-text citation used are describing only the authors approach in several phases of cyber terrorism.
Preview sample
Modern Internet Trends Information Technology Annotated Bibliography
9 pages (2322 words) , Download 0 , Annotated Bibliography
Free
The article summarizes the nonsense of the internet. It highlights the multiple issues perceived by the internet and the various measures that can be adopted to ensure that the nonsense on the internet is stopped. Some claims on the internet are that once a technology is integrated into the internet, it loses its history and intellectual autonomy.
Preview sample
Computer Security Issues Information Technology Assignment
5 pages (1276 words) , Download 0 , Assignment
Free
As given in the code, arg is copied to the bufferer (filename) which can hold up to 128 bytes of data. However, the strcpy does not provide for checking of overflow as it fails to specify any specific number of characters. The second vulnerability is the fscanf function. The fscanf function reads the formatted output from the stream.
Preview sample
Information Security Map Study Information Technology Case Study
5 pages (1358 words) , Download 0 , Case Study
Free
Integrity: Ensuring that the information stored on the computer system is never altered in any way that is not appropriate. Availability: Ensures that the information can be accessed by people who should access it when they need it. Threats: Harm that can happen to an asset. Laptop: physical theft, since Mr. Jonah occasionally leaves his laptop in the car.
Preview sample
Introduction to Networking Information Technology Assignment
4 pages (1167 words) , Download 0 , Assignment
Free
It connects computers and devices in a limited geographical area and would be suitable for the office building due to several reasons. This network system allows the sharing of expensive devices such as laser scanners and printers. There is a sharing of data and an establishment of security as it allows network users to access certain files and applications.
Preview sample
Internet Business Plan Implementation Issues Information Technology Case Study
4 pages (1276 words) , Download 0 , Case Study
Free
Ideally, the current system only allows the listing of the time and place details of the regular classes, contact details, and competition. This can be improved greatly through an integrated website that provides customized, real-time solutions to both the business itself and its prospective client base at their convenience.
Preview sample
Top Ten Most Destructive Viruses Information Technology Essay
4 pages (1060 words) , Download 0 , Essay
Free
A virus is a deliberately written program to harm a computer or use it in an unauthorized manner. The activities of a virus in a computer involve replicating itself in single computer files harming (OECD, 2009). The categorization of viruses is based on how they affect a computer. Most of the new viruses are variations of the existing ones through code modification.
Preview sample
Ethics while Using Computer Technology Information Technology Essay
7 pages (1968 words) , Download 0 , Essay
Free
The above paragraphs briefly outline a chronology of how computers came to be and their evolution in smartness. Computers are smart brains from a few human beings shared out to the world. These ‘brains’ are, however, programmed to follow instructions by anyone who knows their language and getting to know how to operate a computer is not that hard.
Preview sample
Optimization of Defence as an Enabler for Cloud Services and Applications Information Technology Research Paper
14 pages (2771 words) , Download 0 , Research Paper
Free
Google Cloud Platform Marketplace is dominated by a wider range of SaaS brands, which has led to simplified software processes to attract more customers. In this type of cloud computing market, there is more than three hundred SaaS software, thus giving the consumers the liberty to select the best option for their business.
Preview sample
BBC News Website Review Information Technology Case Study
5 pages (1350 words) , Download 0 , Case Study
Free
The Internet dominates in all spheres of life starting from simple communications to the auctioning of things worth millions. E-commerce and information technology are the two main giants highly benefited from this massive growth. The main asset of any concern or organization to be successful in the portal is their website.
Preview sample
Database Management Issues Information Technology Report
4 pages (1215 words) , Download 0 , Report
Free
In the twenty-first-century information, assets are what distinguishes various companies today (Bertino& Sandhu 2005). Companies capture and store several pieces of information in their database which includes their strategic plan, business secret, customer details, supplier details, financial data among other sensitive information.
Preview sample
Current Trends in travel Technological Applications Information Technology Literature review
5 pages (1610 words) , Download 0 , Literature review
Free
Current trends in technology have seen a lot of applications developed for entertainment and learning about places while traveling. They enhance the experience of the travelers by achieving entertainment for them, in addition to giving their exact locations as they travel. Traveling by air or road, one could easily develop feelings of boredom and frustration.
Preview sample
Application Proposal for a Restaurant Information Technology Report
5 pages (1363 words) , Download 0 , Report
Free
The growth of mobile phones has made our life much easier in accessing information. Therefore, life in the 21st century has become very difficult without the use of technology. The Internet has greatly contributed to an ever-increasing global information database and has been used as a means to data-mine information.
Preview sample
Computer and Internet Usage in Australia Information Technology Report
5 pages (1242 words) , Download 0 , Report
Free
The current age has often been referred to as the Computer age owing to endless possibilities through which an individual can transfer information freely. One particular reason leading to the information age is the public acceptance of the computer and the Internet. It becomes necessary to read and analyze a country’s data in the mentioned field.
Preview sample
Advancements in User Interfaces by Example UX/UI Information Technology Case Study
8 pages (2106 words) , Download 0 , Case Study
Free
The windows 10 can compromise a user’s security through the collection of your browsing history, targeted advertising and recording location information. The location data can expose users to danger and identity theft while browsing history violates their privacy by exposing users to unsolicited advertisements.
Preview sample
The Nonsense of the Internet and How to Stop It Information Technology Lab Report
7 pages (1917 words) , Download 0 , Lab Report
Free
Globalization, Neoliberalism, and internet freedom have played a significant role in ensuring that there has been a shift in media regulations. Advancement of technology and apps such as Facebook has made it easier to pass information. However, it should be noted that the government is still central to media regulations.
Preview sample
Principles of Information Security Information Technology Assignment
5 pages (1454 words) , Download 0 , Assignment
Free
The information risks normally prevail both externally and within the organization, whereby external security risks prevail on the organizational networks and websites, this includes threats such as malware, spyware, pharming, phishing, and website attacks. The current and potential external challenges require companies to employ guidelines.
Preview sample
Information Security Concept Map Information Technology Coursework
4 pages (1459 words) , Download 0 , Coursework
Free
Information is a very valuable asset to any organization. Each organization has the responsibility of ensuring that the integrity, validity, and availability of information is maintained at all times. Due to the need to ensure the achievement of the mentioned attributes, there has been a need for the identification of possible attacks on information systems.
Preview sample
Effect of Increase in Mobile Phones Usage on Young People Information Technology Report
5 pages (1705 words) , Download 0 , Report
Free
Mobile phones among young people have increased significantly in recent years. However, this has been associated with several advantages like proper and improved communication and increased access to recent information. Nevertheless, there are cons associated with mobile phone usage like time wastage, access to pornographic materials among others.
Preview sample
Internet Security Advantages Information Technology Essay
7 pages (1888 words) , Download 0 , Essay
Free
With the prevalence of Artificial Intelligence-powered attacks, a shortage of IT security talent, and an explosion of Internet-connected devices, it’s going to take the speed of machines to counteract this perfect storm of increased internet threats. Lots of tasks transactions nowadays are performed online, using mobile phones, laptops, desktops, and tablets.
Preview sample
Cloud Storage Deployment Information Technology Report
7 pages (1970 words) , Download 0 , Report
Free
The advancement of technology has resulted in voluminous data in business enterprises, requiring the establishment of data centers to handle it. The establishment of these data centers requires high initial capital and maintenance costs due to the purchase of new equipment and a talented workforce.
Preview sample
How has the Internet Influenced Terrorism Information Technology Research Proposal
12 pages (2876 words) , Download 0 , Research Proposal
Free
The internet is a system of computers connected through a network such that, making use of transmission control protocol (TCP), the interconnected devices can send and receive information. The technology was established in the 1960s, where it was used by the united states department of defense.
Preview sample
Implementation of Web-Based Application for HR Personal Information Information Technology Literature review
5 pages (1256 words) , Download 0 , Literature review
Free
The major advantage of a web-based application is its availability because anyone can gain access to it provided they is a network connection and multiple users have the capability of accessing it at the same time (NMA Technologies, 2008). It will present an overview of the work done previously that provides the required background for this research purpose.
Preview sample
Investigating Mobile Wireless Security Information Technology Case Study
5 pages (1576 words) , Download 0 , Case Study
Free
It is used for communication like mobile phones, and computing functionality like computers. With the help of a smartphone, users can interact with the different applications at the same time. It is so small that you can put in your pocket, and install as much software in your smartphones, as you want (Laudon & Laudon, 1999). They operate using a wireless medium.
Preview sample
IT Management in Google Information Technology Article
5 pages (1343 words) , Download 0 , Article
Free
Google Inc uses online retail supply chain management, which is managed to use cloud computing-based enterprise resource planning. The Saat ERP is discussed as one of the resource planning tools used by Google in its online business processes and management of online applications for its customers. Information system management approaches are also discussed.
Preview sample
NBN Website Analysis Information Technology Report
5 pages (1569 words) , Download 0 , Report
Free
The company is mainly concerned with providing services - on wholesale - to Internet service providers and landline phone companies who offer NBN plans for homes and businesses. The company does not sell directly to the public since it is a wholesaler. An individual or company has to contact their Internet provider and select a plan that suits their need.
Preview sample
Australian Post Website Analysis Information Technology Report
5 pages (1380 words) , Download 0 , Report
Free
Internet is very handy and accessible, which serves best in the public interest but on the other hand manipulations and fake things get an easy hand too. Scrutiny of the content and context of certain information for sensitive use is very crucial these days. The selected website is an official post office website of Australia.
Preview sample
Gaming Industry Development Information Technology Report
5 pages (2167 words) , Download 0 , Report
Free
From the historical basing of human civilization, games have formed an integral part of life. The entertainment, relief, and psychosocial importance are appreciated. With the development of machines and the computer, gaming took a different level as it generated interaction through interfaces and available platforms (Squire and Jenkins 2011, p.17).
Preview sample
Computer Network and Server Issues Information Technology Assignment
7 pages (1804 words) , Download 0 , Assignment
Free
a) Print and file services regulate the sharing of files and printers amongst the clients within the network. b) Application services enable the execution of certain programs necessary within an institution's network. c) Gateway services facilitate the points at which networks merge with the other networks, hence performing network address translations.
Preview sample
Computer Literacy in Kenya Information Technology Business Plan
4 pages (1302 words) , Download 0 , Business Plan
Free
In this plan, one will be shown how to build and realize the Internet cafe, the expected costs, and the running costs to be incurred from time to time. Kenya is a country located in the African continent to the east. Kenya borders the war-ravaged Somalia to the east, Ethiopia to the north, and Tanzania to the south.
Preview sample
White Paper in Integration Testing Information Technology Report
4 pages (1312 words) , Download 0 , Report
Free
The different components can be tested either as a single group or arranged iteratively. Once integration testing is done on all the components, it makes them ready for overall system testing, which ensures the passage of information from one level to another and in the correct order. The modules are integrated and tested for the entire software to run successfully.
Preview sample
Information Systems Development Review Information Technology Term Paper
6 pages (1641 words) , Download 0 , Term Paper
Free
It assesses business systems and also designs computerized information systems that support them. Hirschheim et al (1995) state that systems development involves all activities encompassed in the processes of construction, implementation, and maintenance of the information system. It is thus important that any research on ISD should have those aspects.
Preview sample
Readiness of Faculty Members in Saudi Universities to Use Web 2,0 Networking in Education Information Technology Research Proposal
5 pages (1982 words) , Download 0 , Research Proposal
Free
Web 2.0 is a moderate reference to a variety of trends, developments, and points of view as part of the need for change in the mode of learning amid the digital revolution. It is more of an expression of the need to evolve with technology by incorporating social software into learning. The world is on the verge of technological breakthroughs in the field of ICT.
Preview sample
Political Economy of the Network Society Information Technology Essay
8 pages (2346 words) , Download 1 , Essay
Free
Networks and media that characterize network society are now used as social spaces that are in a position to mould power. A look at the outcomes of most protest movements dictates that social media and the internet could not have been adequately influential in transforming the real political situation in the manner they were intended.
Preview sample
The Convergence of Television and the World Wide Web Information Technology Essay
8 pages (2318 words) , Download 0 , Essay
Free
In order for the World Wide Web to be a distinct functional substitute to television, its immediate use should be focused on a similar set of objectives. Most notably, it is arguable clear that for these two media to converge then computers and televisions should be fairly-positioned to allow for content interchange-ability (Kang & Atkin, 1999).
Preview sample
Wireless Local Area Network Information Technology Report
8 pages (2302 words) , Download 0 , Report
Free
Additionally, it has made it easier to network computers even in the most remote areas by use of ad hoc networking thus allowing the exchange of vital data. Rack servers, on the other hand, have made networking in business entities and organization easier. This can be attributed to the fact that it does not require a complex setup while at the same time make use of minimal space.
Preview sample
Privacy for Google Glass Users Information Technology Case Study
5 pages (1643 words) , Download 0 , Case Study
Free
With its development, the comfort ability of the public is in question. Therefore it is very much necessary to create a principal to rank the privacy grade that Google glass has the right to collect information belonging to the users and the community to protect their privacy by 2016. This is a paper that will discuss the privacy issues surrounding Google Glass technology.
Preview sample
Awareness of Current Events: Saudi Aramco Attack Information Technology Case Study
6 pages (1524 words) , Download 0 , Case Study
Free
In essence, users searching for a manuscript or worksheet rather found a burning image of the American flag (Leyden, 2012). The virus, named after a phrase in its code, was intended to overwrite vital files with a burning image of an American flag. The researchers investigating the attack found instructions in Shamoon’s code, which is recognized as a “kill timer.”
Preview sample
Dungeon Master Video Game Personal Reflection Information Technology Essay
10 pages (2500 words) , Download 1 , Essay
Free
Video games provide virtual environments in which opportunities for action are manifested. Gamification involves the use of gaming elements to enhance learning. There have existed discussions of whether learning outcomes for students are enhanced by using serious games for education. The recent years have seen an increase in gamified education or presentation of a course context in a game-like context.
Preview sample
151 - 200 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us