StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Emerging Cyber Security Approaches and Technologies Information Technology Research Paper
18 pages (5009 words) , Download 2 , Research Paper
Free
Furthermore, these countries have invested heavily on methods that they can use for purposes of protecting their cyber space. This paper provides a review of technologies that can be used for purposes of protecting the cyber space, and the various efforts that government organizations have enacted for purposes of supporting the development and implementation of the technologies concerned. 
Preview sample
Data Mining and Knowledge Discovery in Database Information Technology Research Paper
12 pages (3198 words) , Download 2 , Research Paper
Free
The method is mainly used in understanding the phenomenon from the data, prediction and analysis. Data mining in the current situation has been important due to abundance of data that makes uses the knowledge of data discovery.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Data Mining and Prediction Modeling in Health Care Information Technology Term Paper
10 pages (2795 words) , Download 1 , Term Paper
Free
This gene facilitates the production of the HbS, the hemoglobin-sickle that converts the biconcave, disk-shaped, and soft, rounded red blood cells into rigid, brittle, and half moon-shaped red blood cells (Solanki, 2014).
Preview sample
Wireless PKI Security and Mobile Voting Information Technology Research Paper
6 pages (1651 words) , Download 1 , Research Paper
Free
It further highlights the operation, security and risks of the wireless PKI. A discussion on mobile voting (M-voting), and requirements and recommendations of the technology then follow. In general, the article explains the components and operation of the wireless public key infrastructure technology.
Preview sample
Comparison Research between Two Types of Wireless Transmission: Wi-Fi and Li-Fi Information Technology Research Paper
12 pages (3214 words) , Download 1 , Research Paper
Free
From a theoretical perspective, wireless fidelity (Wi-Fi) is defined as a renowned wireless networking based technology, which fundamentally executes radio waves for offering high-speed internet as well as networking connections to the end users. On the other hand, light fidelity (Li-Fi) is described as a wireless optical based technology, which typically utilises light-emitting diodes for transmission of data (Paul & Sharma, 2014).
Preview sample
Cyber Warfare as an Alarming Issue across the Globe Information Technology Term Paper
10 pages (2639 words) , Download 1 , Term Paper
Free
This aspect does not only encompass nation-state but even real world organizations. The organizations mainly comprise of terrorist groups, ideological or political extremist groups, criminal organizations, hacktivists, etc.
Preview sample
Public Switched Telephone Network: Switching from the 1900s to 2000 Information Technology Coursework
14 pages (3680 words) , Download 1 , Coursework
Free
The mid-20th-century subscribers required an individual pair of wires from the switch to the phone. A typical telephone company today has a large database that tracks information about each subscriber pair and the status of each jumper. Before the days of digital switches, Bell System records recorded this information in pencil by hand in an accounting ledger (the 1980s).
Preview sample
Software Design Defects Detection and Classification Information Technology Research Paper
10 pages (3181 words) , Download 2 , Research Paper
Free
Being a process run by humans, it is crucial to manage the software process to ensure success of the project. It follows that, the parameter to measure software success is software quality. This essentially refers to “fitness for use”. On a detailed elucidation of quality, software design defects come into the picture.
Preview sample
Analysis of VPN Tools Information Technology Term Paper
8 pages (2228 words) , Download 1 , Term Paper
Free
Choosing and managing a VPN system can sometimes be a daunting task to system administrators and also to end-users since different VPN tools come with different advantages and short coming. However, the determination of the best tool out of the four depend on a number of factors such as data security, availability, price, maintenance cost, installation complexity. 
Preview sample
Group Policy Software Deployments and GPOs, and Active Directory Maintenance and Disaster Recovery Information Technology Assignment
10 pages (2588 words) , Download 1 , Assignment
Free
By having in place a recycle pin for active directory, the whole process of deleting an object is changed by eliminating the features or the attributes that are the process can do without. The objects that are deleted are kept in a recycle pin for the rest of the server’s lifetime so that any time that the user needs he or she can get it.
Preview sample
Adopting Linear Wireless Sensor Networks for Border Monitoring Information Technology Literature review
9 pages (2609 words) , Download 1 , Literature review
Free
Any gap or monitoring loose within the borders might cause a severe damage to security of that country. In modern times the border patrolling has become a challenge and requires high degree of accuracy. 
Preview sample
Differentiation Between DOS and DDOS Information Technology Term Paper
8 pages (2117 words) , Download 1 , Term Paper
Free
Denial of service in general, as the name implies, takes the users offline from the network, deactivate their resources and connection, and strangulates their utilities. Their main tools are botnet and zombies that overtake the network and, on a proxy basis, may do anything they want. Their main targets are often the servers that control access and distribution.
Preview sample
Modern Operating Systems Information Technology Report
6 pages (1731 words) , Download 2 , Report
Free
The IBM z/OS provides a Workload Manager as well, which endeavors for optimizing system resources automatically without requiring any intervention from the system administrator. For instance, on a traditional UNIX/Linux system, the system administrator is able to log in to the system as a super-user by having the privileges overriding all the security measures.
Preview sample
Analysis of Embedded Infrastructure Experiment Information Technology Literature review
25 pages (6353 words) , Download 1 , Literature review
It is only too apparent that this system suffers from the typical problems with all large scale computer software projects. This has manifested itself through the number of Umrah processes and procedures that were either allowed to continue manually or stand-alone software systems presumably out in place before the overarching e-Umrah system was thought of.
Preview sample
Role of Network Security: How Does It Protect You Information Technology Essay
6 pages (1700 words) , Download 1 , Essay
Free
Every organization needs its own proper security system in order to maintain the reputation of their company. Once a reliable system is built everything that goes on with the network can be evaluated with respect to that policy.  Since security is absolutely a difficult topic, and everyone has their own ideas and approaches to it.
Preview sample
The Ethical and Moral Obligations that an Individual Has as a Computer Information Technology Case Study
7 pages (1846 words) , Download 1 , Case Study
Free
The employer normally expects his or her workers to meet certain organizational goals. Computing professionals engage in a number of activities including writing software requirements specifications for new software and hardware, making designs, programming, testing and validation, installation, and maintenance. 
Preview sample
Differences between Panopticon and a Plague Stricken Town Information Technology Assignment
6 pages (1552 words) , Download 1 , Assignment
Free
Panopticon is also a representation of how discipline and punishment cultures work tentatively in current modern societies. Hence, it portrays a sequence of power as exercised since by taking a look at the panopticon plan, a realization of how the processes of operation of observations and examinations are realized.
Preview sample
The Athletes Shack Wireless Upgrade Information Technology Case Study
12 pages (3087 words) , Download 1 , Case Study
Free
Cisco ASA 5505 Series recommends a strong business, sheer protection from the fast-evolving risk environment with the help of its unique combination of applications and software extensibility and its powerful Modular Framework (MPF). These applications are designed as a modern extensible multiprocessor.
Preview sample
The Rookie Chief Information Security Officer Information Technology Term Paper
9 pages (2316 words) , Download 1 , Term Paper
Free
Mitigating of risks like fire through the installation of smoke detectors and fire extinguishers. The organization should share the risk with insurance companies. It should take insurance covers against property theft and fire damage. The company should use the retention method. It should keep the money to use in case of disaster to ensure continuity of business operations.
Preview sample
Human-Computer Interaction for Commercial Applications Information Technology Case Study
6 pages (1573 words) , Download 1 , Case Study
Free
The phone on the exterior side has a clamshell case that features a large touch screen panel in accessing a number of quick launch buttons. The touch screen at the front as shown can be used to launch the camera, which as well as a hard quick launch button on one of its sides. The screen can also be used to launch TV streaming and TV viewing even without opening the flaps (Richmond, 2007). 
Preview sample
What Is a Distributed Database Information Technology Assignment
6 pages (1638 words) , Download 1 , Assignment
Free
The client-server model is used both in local area networks and on the internet. Some of the main examples of the client-server model include FTP servers and clients, Web servers and Web browsers, and the DNS (Mitchell n.d.). Modern companies make use of LANs, as well as the internet for carrying out their business processes.
Preview sample
DNS and XenApp Deployment Information Technology Case Study
8 pages (2320 words) , Download 1 , Case Study
Free
One central park is facing the problem of unreliable DNS service due to security and management concerns. This has crippled the company's performance in terms of communication and business. As a result director of the company has tasked me with accessing and recommending the potential benefits of implementing a DNS based infrastructure.
Preview sample
Role of Internet in Modern Era Information Technology Research Paper
9 pages (2744 words) , Download 1 , Research Paper
Free
Internet is fundamentally viewed as a strong network of different interlinked computer networking, which is broadly available to the users or the general public. Moreover, it is also regarded as a global network that connects a large number of computers and plays a decisive role in exchanging valuable opinions and facts.
Preview sample
The Ontology-based Software Co-Evolution of Cloud and Mobile Computing Information Technology Literature review
11 pages (3458 words) , Download 1 , Literature review
Free
Now when different systems and software applications are required to inter-network and communicate, problems arise due to the cross-platform differences, technical clashes and theoretical ambiguities.
Preview sample
IT Legistilation and Ethics Information Technology Assignment
8 pages (2167 words) , Download 1 , Assignment
Free
Privacy of data can be a concern for companies that use Cloud-based MIS. The issue is that expert network hackers may find some way to download the private information of companies from the Cloud MIS. Therefore, it is an ethical obligation of the cloud services providing companies to implement preventive measures to decrease or reduce the risk of data loss for their customers.
Preview sample
State of Software Development Information Technology Research Paper
13 pages (4460 words) , Download 1 , Research Paper
Free
The analytical research involved the collection of data from ninety-eight software developers. The statistical analysis resulted in the findings that there was no significant relationship among agility and the job satisfaction of the software developers. The overall well being and job satisfaction of the software developers were interrelated.
Preview sample
Risk Assessment Information Technology Case Study
7 pages (1750 words) , Download 2 , Case Study
Free
The C.E.O’s quest to outsource network and IT services to a service integrator and the slashing off half the staff places FDI at a challenging position. Boardroom issues involving the C.O.O., and the C.E.O., Jamie Pierce concerning my appointment is also a bone of contention. From the research of market trends, business trends, and analysis of FDI’s problems possible recommendations are derived.
Preview sample
Zara: IT for Fast Fashion Information Technology Case Study
8 pages (2115 words) , Download 1 , Case Study
Free
It is important for companies to know the role of information and technology especially internally. Information and technology are an important aspect of any company and its management should be handled with at most caution. This is because if the information technology of a company fails it will result in a lot of losses for the company.
Preview sample
Strategic Approach to Information Technology Management Information Technology Case Study
8 pages (2053 words) , Download 1 , Case Study
Free
Zara Fashion Company has a lot to learn from Cisco Inc. Cisco’s success can be attributed to the good management that has recognized the importance of management of information technology. Cisco moved from its traditional approach to a new approach that put management of information technology to be important.
Preview sample
Cyber Security, Imperfect Information Stochastic Game Information Technology Literature review
6 pages (1595 words) , Download 1 , Literature review
Free
Current approaches of game-theoretic security are based on games with perfect information, static game models, or games having absolute information (Liu, Comaniciu, & Man, 2006; Alpcan & Pavel, 2009; Nguyen, Alpcan, & Basar 2009). Nevertheless, there are dynamic games, which have curtailed and faulty information regarding the attacker.
Preview sample
What Makes IT-Production Skill Intensive Information Technology Coursework
12 pages (3269 words) , Download 1 , Coursework
Free
In general, the tendency of the Internet to empower the consumers, flatten the hierarchies with organizations, and facilitate the dynamic exchanges of information across organizations has caused new business models, operational strategies, management mechanisms, and modes of service delivery to the surface.
Preview sample
Pinewood Healthcare Limited - Social Computing Information Technology Case Study
14 pages (4025 words) , Download 1 , Case Study
Free
According to the present business performances of Pinewood, it has been observed that the company supplies its range of ‘Renal Care Products’ accumulating around 77% of the overall Irish market. Therefore, it is of utmost importance for Pinewood to effectively practice social media strategies in order to assimilate under its service jurisdiction the varied global healthcare.
Preview sample
Network Security - Information Assurance Information Technology Coursework
12 pages (3208 words) , Download 1 , Coursework
Free
It is important to state that the technology has grown leaps and bounds to provide multiple channels of access to various systems blurring the line between physical and logical systems. The use of hardware from across the world for developing systems has mandated the need to trust the suppliers of these products.
Preview sample
The Barriers of Using Technologies in Primary Public Schools in Developing Countries Information Technology Case Study
21 pages (6878 words) , Download 1 , Case Study
Children can easily learn technology skills, especially when trained teachers and resources are available (Alias, 2012; Shin et al., 2012; Batorowicz et al., 2012). Many youth are already excited or used to using technology for entertainment purposes, so this awareness and interest can be transferred to educational settings (Al-Awidi and Alghazo, 2012; Couse and Chen, 2010).
Preview sample
Aspectual Evaluation of Is in Use Information Technology Essay
11 pages (2853 words) , Download 1 , Essay
Free
The social aspect may present instances where perceptions and habits resulting from the application’s use affect other people indirectly. In the essay, Alex admitted that the application enhances his understanding of the harmful effects of cigarette smoking. As a result, he has grown to dislike and discourage smoking.
Preview sample
Mobile Application Interface - DailyLifeApps Information Technology Case Study
9 pages (3304 words) , Download 1 , Case Study
Free
The evaluation shows that the application is cognitively sound. Each click of a button is followed by the occurrence of the expected event, which can be traced back to the button that was clicked. In cases where the widget pressed is not traceable, it does not raise confusion. The goal behind each button click is achieved (See detailed evaluation in Appendix A.2).
Preview sample
Graphics Cards issues Information Technology Essay
10 pages (2817 words) , Download 1 , Essay
Free
In fact, in an ordinary setting, a computer screen can show more than a million pixels, however, the decision about what to do with each of the pixels is made by the computer. It is the computer that uses these pixels to generate an image. However, to deliver this image, a computer uses a translator, which gets input from the CPU.
Preview sample
The Impact of Mobile Phones and Tablet in Modern Business Information Technology Coursework
13 pages (3723 words) , Download 1 , Coursework
Free
Generally speaking, the researcher employed qualitative survey designs, where questionnaires were used to collect information from a convenient sample of 54 respondents. Modern society has recognized the opportunities within the environment and has imposed appropriate steps in developing these projects.
Preview sample
Economical Set of Recommendations to LDA for Implementing Suitable Logical Topology Information Technology Coursework
12 pages (3294 words) , Download 1 , Coursework
Free
Generally speaking, as bandwidth in CSL shall be mostly used for accessing Cloud-based services, including updating of online database. It is recommended to have a 10Mbps fiber connection with unlimited downloading as requirements. Requirements of bandwidth cannot be underestimated as it can cost a lot.
Preview sample
Security Protocols Information Technology Coursework
13 pages (3585 words) , Download 1 , Coursework
Free
Cloud computing seems like a more feasible option. Not only would cloud computing help the company improve its security, but would also provide it with better services and features. However, a more thorough analysis of the cost, requirements and benefits of cloud computing is needed before any decision regarding the future of the company is made.       
Preview sample
Cloud Computing - Local Development Agency, Computer Shop Ltd Information Technology Case Study
7 pages (2982 words) , Download 1 , Case Study
Free
Virgin Media not only offers the highest bandwidth which is 30MB but also there is no download limit. The connection demands no line rent as Virgin Media does not require a phone connection to install the broadband connection. The connection only requires a monthly fee of £17.50 which forms a total of £235 per month.
Preview sample
Microcalcifications Detection in Mammograms Based on Ant Colony Optimization and Markov Random Field Information Technology Coursework
15 pages (3857 words) , Download 1 , Coursework
Free
In this paper, we presented the results of the application of our novel technique based on an ant colony optimization for microcalcification detection in a mammogram. When comparing the results of the conventional methods, ACO-MRF showed a better ability to find the best labeling and segmentation of microcalcifications.
Preview sample
Software Configuration Management Improvement and Security Information Technology Essay
8 pages (2237 words) , Download 1 , Essay
Free
The software configuration teams would produce a report on a regular basis to keep the software configuration management team informed about any updates and if any defects are found in the change. The security team needs to make sure that the software configuration team has carried out security-related tests on the product.
Preview sample
History of Computing Information Technology Essay
7 pages (1826 words) , Download 1 , Essay
Free
This discussion will focus on various timelines that saw the development and advancement of computers from the early days to modern times. During the early days, the computer was developed specifically for purposes of solving challenging societal tasks rather than for entertainment as well as for sending messages to inform of mails.
Preview sample
Information Systems Portfolio Project - ExxonMobil Information Technology Case Study
11 pages (3025 words) , Download 2 , Case Study
Free
Information systems (IS) have played a major role in making sure the success of virtually all organizations in government, business, and defense. Moreover, awareness has also increased that such that success is dependent on the correct functioning and availability of large scale networked information systems that involve extensive complexity.
Preview sample
Numerical Investigation of Single Phase Flow Oscillatory Baffled Columns Information Technology Coursework
13 pages (3363 words) , Download 1 , Coursework
Free
The representation of results in the current literature bank has been limited by certain aspects. Certain forms of research have presented their results through visual means, others have relied on graphing velocity and yet others have taken onto the more esoteric power density. The current research has used a number of different output parameters.
Preview sample
Malware Management in the Enterprise Information Technology Case Study
7 pages (2006 words) , Download 1 , Case Study
Free
A few antivirus programs can protect against malware however the first step in solving a problem is identifying it. For a long time, antivirus programs were not as familiar with the virulent malware as they should have been and malware scanners were overlooked however these days that is changing rapidly.
Preview sample
Computer Impacts on Human Life Information Technology Research Proposal
8 pages (2318 words) , Download 1 , Research Proposal
Free
On the negative impacts of computing, I identified hacking as one of the problems. Measures on how they loop into the network system and obtain crucial information without being detected immediately, but rather after performing their fraud still remains an issue for most institutions that are networked (Huang, X., Radkowski, P. & Roman, P., 2007).
Preview sample
Challenges of Implementing Health IT on the African Continent Information Technology Case Study
7 pages (2002 words) , Download 1 , Case Study
Free
Lack of education and literacy hinders both the installation of the Health IT systems as well as their use, while also making the motivation for such implementation by the health providers and the health institutions minimal. Without the motivation to improve the management of the health system, it becomes difficult to create an opportunity for the introduction of the health IT systems.
Preview sample
Cloud Computing for Management Information Systems Information Technology Essay
9 pages (2525 words) , Download 2 , Essay
Free
Generally, examples of subscription-based systems also include pay-per-use systems, which also increase the potentialities of IT. These systems have the capacity to save the users and subscribers of the logistical inconveniences, which usually attend to the general application of the IT applications.
Preview sample
2001 - 2050 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us