Principles of Digital Computing
Principles of Digital Computing Information Technology Research Paper
7 pages (1750 words) , Research Paper
Nobody downloaded yet
An insight into the early years of the nineteenth century throws light upon the evolution of digital design theory. Research by various scientists made them believe that computation did not necessarily have to be analogue and that digital computation was also possible. The early implementation of a digital design was via mechanical components.  
Preview essay
Phone Credit Identity - a Multipurpose Gadget
Phone Credit Identity - a Multipurpose Gadget Information Technology Research Paper
17 pages (4250 words) , Research Paper
Nobody downloaded yet
Phone Credit Identity being a new product in the market will mean recording high sales after their first advertisement for the new product. This will be due to the fact that people will always be on the outlook for new products with the aim of testing whether they are effective as claimed in during their advertisement or not.
Preview essay
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
The Invention of Colossus Mark 1 and Other Important Events in History
The Invention of Colossus Mark 1 and Other Important Events in History Information Technology Essay
7 pages (1750 words) , Essay
Nobody downloaded yet
IBM was the originator of the punch card phenomenon. It was whereby the help of the punch cards that the IBM German Subsidiary was able to assist the Nazis in singling out the Jews from among the rest of the Germans. This enabled selective and timely execution and elimination of the Jews at the hands of the Nazis.   
Preview essay
Pair and Parallel Programming
Pair and Parallel Programming Information Technology Coursework
8 pages (2000 words) , Coursework
Nobody downloaded yet
This research will begin with the statement that many organizations are adopting the policy of having various programming methodologies in their operations. One of the new models is pair programming that is a concept of extreme programming approach. The concepts campaigns for forming of pairs to run programs for a group.
Preview essay
The Magic Touch
The Magic Touch Information Technology Thesis Proposal
10 pages (2500 words) , Thesis Proposal
Premium+
It is necessary to recognize the educational requirements and training preferred by employers. Many, if not all, employers require at least an associate’s degree in computer science--which can be earned at many two-year (community) colleges (“Computer”). Having an associate’s degree in computer science shows poise and commitment.
Preview essay
Amazons Recovery Procedures in Case of Disaster - Response, Resumption, and Restoration
Amazon's Recovery Procedures in Case of Disaster - Response, Resumption, and Restoration Information Technology Case Study
12 pages (3000 words) , Case Study
Premium+
Amazon Inc. developed the following disaster recovery plan for use in case of any disruption to its different components that allows for its standard day-to-day functions. This recovery plan aims to outline the critical recovery procedures that key personnel must perform during and after interference to ensure normal operations resume as soon as possible.  
Preview essay
Information Technology of Union Group of Companies
Information Technology of Union Group of Companies Information Technology Case Study
10 pages (2500 words) , Case Study
Nobody downloaded yet
The conclusion from this study states that to experience and ensure sustainable development of the business, the extensive use of information technology is a must. If any business organization does not have enough provision for information technology it is certain to get perished. But taking information technology in one’s side, one might expect to be the market leader.
Preview essay
3G System to Make the Life a Far Easier Walk
3G System to Make the Life a Far Easier Walk Information Technology Essay
15 pages (3750 words) , Essay
Nobody downloaded yet
The author states that the internet initially used to have a very slow speed but that didn’t matter since the time spent to wait was still lower than it used to be before. Gradually, the speed of internet-enhanced and today people can use it whenever they wish to at almost a fraction of the cost that was involved with telecommunications previously.
Preview essay
New Website System for Malak Jewellers
New Website System for Malak Jewellers Information Technology Research Paper
33 pages (8250 words) , Research Paper
Nobody downloaded yet
The purpose of implementing the internet for such a business is to enhance the business scope and management of the business operations. By viewing such an enhanced business development through the web-based structures, Malak that is running jewellery designing business desires to establish and renovate the customary business practice.
Preview essay
Computer Data Storage
Computer Data Storage Information Technology Research Paper
10 pages (2500 words) , Research Paper
Nobody downloaded yet
Primary memory of a computer controls such programs that enable essential functions such as startup and diagnostic performance checks. Primary data storage includes two types of memories, which are random access memory (RAM) and read-only memory (ROM). Khurshudov asserts, “RAM is the working area where programs are run and data is processed”.  
Preview essay
New Perspectives on Microsoft Office Access
New Perspectives on Microsoft Office Access Information Technology Assignment
9 pages (2250 words) , Assignment
Nobody downloaded yet
If the value for a member id is ‘Y’, the player is a member and if ‘N’, the player has to renew his membership. Based on the member ID and Player Id relationship, the player details are obtained from the player table. The parameter query to find all members of Team A is created using the ‘Create Query’ option of Access. 
Preview essay
Wireless Ethernet
Wireless Ethernet Information Technology Term Paper
9 pages (2250 words) , Term Paper
Nobody downloaded yet
The paper moves on to a discussion on the relationship of the wireless Ethernet standards and implementations to the OSI networking model, with emphasis on situating the standards elements themselves within that OSI framework. From there the paper discusses the wireless Ethernet standard as it relates to the physical layer. 
Preview essay
Cyber Crimes and Security on the Internet
Cyber Crimes and Security on the Internet Information Technology Research Paper
8 pages (2000 words) , Research Paper
Nobody downloaded yet
The internet has revolutionized the business landscape given that the information highways created by digital technology make it possible for different types of businesses to be conducted online. This space is commonly referred to as cyberspace and is not affected by any geographical or physical barrier (Hofman, 17).
Preview essay
Systems, Designs, Innovation of Amazon.com
Systems, Designs, Innovation of Amazon.com Information Technology Assignment
8 pages (2000 words) , Assignment
Nobody downloaded yet
This research will begin with the statement that one of the most important issues with modern business is that design of material such as the packaging, branding, logos, etc is very important. The way a product is designed determines how much market it can get. The same case applies to information systems.
Preview essay
Best Practices for Credentialing Post-Acute Providers
Best Practices for Credentialing Post-Acute Providers Information Technology Essay
30 pages (7500 words) , Essay
Nobody downloaded yet
According to the paper, the SNFs will provide services that maintain and obtains the well-being of the patient both physically, psychosocially and mentally. This will ensure a quality for the patient as well as moving to the next treatment stage. The SNFs in the medical care institution should be qualified and should have several skills.
Preview essay
Using the Internet of Things Device in the Hackinig Process
Using the Internet of Things Device in the Hackinig Process Information Technology Term Paper
19 pages (4750 words) , Term Paper
Premium+
It is evidently clear from the discussion that the assembly level program can be maintained, reconstructed and observed within its side channel. This can create a threat within its side channel. Crypto hardware or algorithm found within the secret data or keys are affected or attacked by the instructions of the traditional power side channel.
Preview essay
Human Computer Interaction
Human Computer Interaction Information Technology Dissertation
16 pages (4000 words) , Dissertation
Nobody downloaded yet
The paper talks about the UI design of a system for RACs, who do non-academic activities in assisting research students right from their induction to the college to their obtaining the PhDs. The will basically coordinate and liaise with different teams in the college, in preparing the various topics for which they admit students for their research work.
Preview essay
Model of Reasons for Use and non-Use of the Internet in Iraq
Model of Reasons for Use and non-Use of the Internet in Iraq Information Technology Research Paper
37 pages (9250 words) , Research Paper
Nobody downloaded yet
The stratified sample was taken based on a population registry under the Oil for Food Program of United Nations in 1996 in Iraq. The results revealed that human development indices, human capital, institutional and legal environment, existing technologies, government policy-making and income levels affect Internet accessibility in Iraq.
Preview essay
Agent-Based Modeling in Architecture
Agent-Based Modeling in Architecture Information Technology Term Paper
15 pages (3750 words) , Term Paper
Nobody downloaded yet
The research and development in the field of artificial intelligence have offered a lot of new technology infrastructures and paradigms. The implementation of the modern and up-to-date techniques of artificial intelligence has offered huge advantages regarding machine learning, robotics, and automation of a lot of operating behaviors.
Preview essay
E-Business Strategy of King Abdulaziz University
E-Business Strategy of King Abdulaziz University Information Technology Research Proposal
10 pages (2500 words) , Research Proposal
Nobody downloaded yet
The author of the paper states that the first initiative has been chosen to develop a detailed plan for its implementation. The objective of this report is to highlight the prominent VLEs in the market and evaluate them for their performance. The cost and features of each VLE are also analyzed.
Preview essay
Bluetooth Technology
Bluetooth Technology Information Technology Term Paper
8 pages (2000 words) , Term Paper
Nobody downloaded yet
The author states that the Bluetooth Special Interest Group (SIG) manages Bluetooth and oversees the specification and development of, protection of the trademark, and management of qualification program. SIG comprises of over 1,700 companies in the areas of computing, telecommunication, consumer electronics, and networking.
Preview essay
Computers R Us
Computers R Us Information Technology Book Report/Review
7 pages (1750 words) , Book Report/Review
Nobody downloaded yet
From this paper, it is clear that computer R Us is a company dealing with both the manufacture of computer and retail services for its clients. The company, however, noticed the demand for repair services by its clients and decided to create CompleteCare. CompleteCare was launched to provide quick response to technical inquiries.
Preview essay
Timeliness, Bandwidth and Other Factors Essential When Performing Scans or Enumeration
Timeliness, Bandwidth and Other Factors Essential When Performing Scans or Enumeration Information Technology Term Paper
12 pages (3000 words) , Term Paper
Premium+
According to Hsu and Marinucci (2013) increased technological advancement has brought about much higher cybersecurity threats. With most companies and governments being forced to adopt technological changes, so has the risk against unauthorized information access been elevated. In most cases, governments and organizations store, transmit and share private and confidential information across the vast network.
Preview essay
Internet Security: Privacy and Confidentiality
Internet Security: Privacy and Confidentiality Information Technology Research Paper
20 pages (5000 words) , Download 1 , Research Paper
The paper discusses the evolution of the Human Resource functions to internet-based applications, the implications of consequent present-day vulnerabilities like hacker attacks, and the ever-increasing rates of cyber crimes. Recent developments in the field of encryption of data and other forms of securing privacy of information are also discussed.
Preview essay
Distributed and Parallel Systems
Distributed and Parallel Systems Information Technology Research Paper
16 pages (4000 words) , Download 1 , Research Paper
Parallel processing is a key in modern computers. Parallel computing is explained as the simultaneous execution of the same task that is usually split up in smaller tasks, on multiple processors in order to obtain results faster. The idea is based on the fact that the process of solving a problem usually can be divided into smaller tasks.
Preview essay
Propaganda as Effective Arms in Information War
Propaganda as Effective Arms in Information War Information Technology Research Paper
7 pages (1750 words) , Research Paper
Nobody downloaded yet
Although information warfare has been a late development compared to propaganda, a study of a 1928 material on propaganda indicates that it has been weaponized or transformed into a weapon as early as 1928 in the work of Bernays. This is not to say that propaganda was not upgraded when it became information warfare in the last several years.
Preview essay
A Hybrid Shape Representation: Surface Modeling
A Hybrid Shape Representation: Surface Modeling Information Technology Research Proposal
14 pages (3500 words) , Research Proposal
Nobody downloaded yet
The author states that the number of CAD systems has magnanimously risen over the recent past. Four categories described the systems, which are Wireframe CAD, Surface CAD, 2D CAD, and Solid CAD. This paper narrows down its focus to solely Surface modeling although in a number of instances appropriate comparisons.
Preview essay
Tandem of GlobShop and ISS - Globalization of Software Development
Tandem of GlobShop and ISS - Globalization of Software Development Information Technology Case Study
13 pages (3250 words) , Case Study
Nobody downloaded yet
GlobShop operates in the travel-retail industry across Asia, Australia, North America, and Europe. Headquarter of the company is located in Boston, the US. Since it operates in the travel-retail industry, any changes in the air travel flow of visitors and the consequent economic uncertainties have a significant impact on its performance.
Preview essay
Airline Operations: The Impact of a Global Monitoring System on Safety and Finances
Airline Operations: The Impact of a Global Monitoring System on Safety and Finances Information Technology Coursework
10 pages (2500 words) , Coursework
Nobody downloaded yet
The use of navigation technologies such as Global Positioning Systems (GPS) in real-time tracking are technologies developed to ensure the ground crew receives data from an aircraft at all times, with respect to condition and position. In every system, it is elemental to consider the possibility of an error, which translates to the GPS system of aircraft tracking not being a hundred percent effective and efficient.
Preview essay
Information Technology in the European Countries
Information Technology in the European Countries Information Technology Assignment
15 pages (3750 words) , Assignment
Nobody downloaded yet
As the paper outlines, an excellent online tax system boasts of efficiency, simplicity, and decentralization which is best exemplified by an online tax filing system. Moreover, this online tax system is tasked to help taxpayers prepare and file returns in a simple, fast and secure manner. IT is a key enabler of delivering online taxation services. 
Preview essay
Web Site Development Process
Web Site Development Process Information Technology Assignment
9 pages (2250 words) , Assignment
Nobody downloaded yet
The Internet’s most important advantage is that of speed and ease. For that reason e-business, which makes use of the Internet as the center for carrying out business activities, can support make a corporation more customer-friendly as well as several other things, for instance creating a well-organized exchange of information and/or services?
Preview essay
Use of IT in Marketing
Use of IT in Marketing Information Technology Case Study
15 pages (3750 words) , Case Study
Nobody downloaded yet
According to the research findings, it can, therefore, be said that the soft-drinks industry and markets have been dynamic and ever-changing with a tie. They have exhibited life cycles and are usually ever attracting competitors in several numbers as well as various strengths and sizes regarding the stage in the life cycle.
Preview essay
Benefits and Drawbacks of Telecommuting
Benefits and Drawbacks of Telecommuting Information Technology Research Paper
9 pages (2250 words) , Research Paper
Nobody downloaded yet
According to the research findings, many people and organizations are experiencing the benefits gained for both parties that telecommuting offers. There are some occupations that cannot be accomplished by means of alternative scheduling or location. This discussion describes the pros and cons of employers offering telecommuting situations.
Preview essay
Evaluating Methods on the Basis of NIMSAD
Evaluating Methods on the Basis of NIMSAD Information Technology Term Paper
12 pages (3000 words) , Term Paper
Nobody downloaded yet
NIMSAD (Normative Information Model-based Systems Analysis and Design) is a reflective and problem-based framework meant to evaluate system design and analysis methodologies. It not only allows critical evaluation of the entire experience but also facilitates the user to learn from the conclusions and recommendations.
Preview essay
Management Information and Communication Systems
Management Information and Communication Systems Information Technology Research Paper
16 pages (4000 words) , Research Paper
Nobody downloaded yet
The author of the paper tells that the management of information and communication systems (MICS) involves the processing of raw data into relevant bits of information that help organizations in efficient decision making. Information required by organizations is collected through various online and offline sources that provide the managers with vital inputs on business processes and market trends.
Preview essay
Targets for Cyberterrorism
Targets for Cyberterrorism Information Technology Research Paper
42 pages (10500 words) , Research Paper
Nobody downloaded yet
The researcher states that technology, or to be more precise, the power of the Internet and high-speed computers distinguished the late 20th century and presented a dominant force early in the 21st century and up to now. Such force has been integrated by powerful factions around the world for increased competitiveness across industries.
Preview essay
Use of Contracts Transactions in E-commerce
Use of Contracts Transactions in E-commerce Information Technology Assignment
8 pages (2000 words) , Assignment
Nobody downloaded yet
The EU has tried to apply umbrella regulations in all contracts formulated in the member countries. However, new challenges have been emerging in line with the evolving online market, thus it is important for all jurisdictions to keep their regulations in line with the most immediate technologies being used for online transactions. 
Preview essay
Supply Chain Management and Information Technology
Supply Chain Management and Information Technology Information Technology Essay
13 pages (3250 words) , Essay
Nobody downloaded yet
With the emergence of the latest information technology-based tools, it is being possible to collaborate more and more processes either internal to the organization or external by keeping the focus on supply chain management. For more productivity, cutting costs and more quality enhancement, supply chain policies are being a major concern.
Preview essay
MS Excel and Access in Financial Calculations of Business Operations
MS Excel and Access in Financial Calculations of Business Operations Information Technology Coursework
8 pages (2000 words) , Coursework
Nobody downloaded yet
The Flyguys has several requirements that can be met through proper usage of Access and Excel both. However, each of those software has its own pros and cons. The Flyguys is interested in implementing a system that enables them to achieve three major goals; record keeping, reward system and reporting.
Preview essay
Book Promotion through the Worldwide Web
Book Promotion through the Worldwide Web Information Technology Dissertation
12 pages (3000 words) , Dissertation
Nobody downloaded yet
The author of the paper states that the Internet has largely changed the way in which we live. Not only has it enabled us to establish communication with people millions of miles away, but it has also become a platform for the exchange of views, opinions, and news on recent developments.
Preview essay
Network Security The Past, Present, and Future
Network Security The Past, Present, and Future Information Technology Research Paper
13 pages (3250 words) , Download 1 , Research Paper
According to the findings, it can, therefore, be said that the aim of ceasing any undesired intrusion in one’s system is encapsulated by one of the most vital areas of computer sciences- Network Security. Farlex Inc. explains that it can be defined as the process of authorizing access to information to validated users.
Preview essay
Developmwnt of Ergonomics
Developmwnt of Ergonomics Information Technology Term Paper
12 pages (3000 words) , Term Paper
Nobody downloaded yet
The complexity of organizational structure and introduction of new technology into the business have increased the risk of conflicts between workers and their supervisors, workers and their colleagues and workers and managers. For example, there might be a conflict of interest between workers and supervisors about the working hours, wages etc.
Preview essay
Pervasive Context-Aware Systems
Pervasive Context-Aware Systems Information Technology Term Paper
17 pages (4250 words) , Term Paper
Nobody downloaded yet
Pervasive environment is the emerging computing paradigm that aims to provide users access to services all the time, everywhere, in a transparent way, by means of devices installed in the surrounding physical environment or worn by the user. Smart environment represents the evolutionary development of pervasive environment.
Preview essay
The Future of Banking Information System and Its Impact on E-Banking
The Future of Banking Information System and Its Impact on E-Banking Information Technology Thesis
47 pages (11750 words) , Download 1 , Thesis
Premium+
The research focused on both previous findings (literature) and primary research (empirical study) on the impact that future banking information systems have on electronic banking in terms of banks adoption and acceptance by consumers. The researcher applied quantitative research design to collect and analyze data from the study population.
Preview essay
Importance of Testing in Software Engineering
Importance of Testing in Software Engineering Information Technology Research Paper
20 pages (5000 words) , Research Paper
Nobody downloaded yet
Testing is a necessary action in software engineering. In the easiest terms, it amounts to viewing the implementation of a software system to authenticate whether it performs as planned and recognize possible malfunctions (Bayse et al, 2005). Testing is extensively utilized in industry for superiority assertion.
Preview essay
Architecture and Operation of Microprocessors
Architecture and Operation of Microprocessors Information Technology Research Paper
9 pages (2250 words) , Research Paper
Nobody downloaded yet
On the other hand, the processor is like the common sense of a computer in the approach that it systematizes and accomplishes instructions that come from either the user or the software. In a computer, a processor generally comprises one or more microprocessors (also known as chips), which are silvers of silicon or other substance stamped with many little electronic circuits.
Preview essay
Wireless Personal Area Networks Opportunities
Wireless Personal Area Network's Opportunities Information Technology Article
8 pages (2000 words) , Article
Nobody downloaded yet
Through the use of PAN, it is possible to transfer data such as mails, files, digital audio, and media. However,  PAN range covers an only small area such as 10 meters or less . On a practical level, PAN translates to transferring or passing information from one person to another using touch which we do nowadays use infrared.
Preview essay
Advantages and Disadvantages of Information Systems Outsourcing: Risks and Benefits
Advantages and Disadvantages of Information Systems Outsourcing: Risks and Benefits Information Technology Research Paper
8 pages (2000 words) , Research Paper
Nobody downloaded yet
The corporations can develop and maintain information systems internally or in-house by utilizing their own resources or outsource it, which means they hire an outside firm for developing any of their information systems for them. However, several companies outsource only the information system development component of their IT activities.
Preview essay
Is The Internet Destroying TV as We Know It
Is The Internet Destroying TV as We Know It Information Technology Assignment
10 pages (2500 words) , Assignment
Nobody downloaded yet
Television is a device on which we see the videos that are transmitted in the form of signals through television stations.
Preview essay
Facebook and its Facilities
Facebook and its Facilities Information Technology Research Paper
8 pages (2000 words) , Research Paper
Nobody downloaded yet
Today, not only are all the above-mentioned endeavors are handled with much ease but also the ever-changing technology has made it more interesting and innovative. A product of such a technology, that has even earned itself the honor of being accepted as a word in the life of the common people, is Facebook. 
Preview essay
151 - 200 results of 6856 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you samples on subject Information Technology for FREE!

Contact Us