StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Query Optimisation in Wireless Sensor Networks Database Information Technology Literature review
7 pages (2212 words) , Download 1 , Literature review
Free
There exists systems for the management of databases, which control big quantities of the data that can be recovered through stipulating several queries that are articulated in a query language. When considering the database, wireless sensor networks (WSN) are taken into contemplation for this paper.
Preview sample
The Formation of Colour Perception in Humans, Colour Blindness and Its Main Types Information Technology Literature review
9 pages (2779 words) , Download 1 , Literature review
Free
The cones on the other hand are located near the center of the retina or what biologists term as the macula. The cones also do not give good night vision but work on letting the human eye perceive color based on the conditions experienced during the day.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
The Interactivity of the Website and Overall Design Information Technology Case Study
8 pages (2215 words) , Download 1 , Case Study
Free
Jamila is a university graduate with a bachelor’s degree in computer science. She has a passion for technology. In addition to her degree, she has attended college and taken some professional courses in different fields such as website design, computer networks, software development, and application use.
Preview sample
Security Awareness Training Plan for MEMATECH Solutions Limited Information Technology Case Study
6 pages (1892 words) , Download 1 , Case Study
Free
Maintenance and Testing of the Physical Security process would provide adequate support to the agency to efficiently execute appropriate maintenance programs. The execution of the maintenance or testing of the physical security would also ensure that the access points within the physical security perimeter are performing effectively. 
Preview sample
Investigating Emerging Information Technologies, 3D Printing Technology Information Technology Essay
7 pages (2173 words) , Download 2 , Essay
Free
In the present day context, the price of the 3D printers has declined considerably as compared to its initial price. Thus, it has become more affordable for the consumers, which further enhances the chances of its usage in an extensive manner in the coming future to make toys, napkins and other household products (Evans, 2012). 
Preview sample
The Degree of Inherent Risks in Projects Information Technology Assignment
6 pages (1769 words) , Download 1 , Assignment
Free
Evidently, the pressures of information technology control of the development are more as compared to the pressures towards user dominance of system development (Applegate, 78). On the same point, with the current technological advancements, there has been an increased need to control information technology by curbing the instances of piracy.
Preview sample
Concerns and Disadvantages of Having Large-Scale Online Organisations Information Technology Essay
7 pages (1992 words) , Download 1 , Essay
Free
The emergence of social media is probably one of the most significant tech trends of the 21st-century. In the words of Clive Thompson and editor for the New York Times, social media is “The most significant intergenerational shift since rock 'n roll” (Rice, 2009, p. 85). It has already changed and shaped our lives.
Preview sample
Business and Technical Challenges for Transitioning Cloud Computing in Blah-Blah Telecoms Information Technology Case Study
8 pages (2302 words) , Download 2 , Case Study
Free
In order to completely realize the opportunities, Blah-Blah Telecoms must address the challenges and understand the requirements of this essential transformation of IT infrastructure. Blah-Blah Telecoms can gain several tangible and intangible advantages through enabling the cloud feature in the business operations.
Preview sample
Data Mart Company Information Security Policy Information Technology Case Study
21 pages (5355 words) , Download 1 , Case Study
Any party that uses DM Company’s computer resources in collecting, examining, analyzing, transmitting and storing research information which is required by regulation or law to be held confidential will remain responsible for taking measures to have such confidential research information protected from unauthorized modification and access.
Preview sample
Wealth Information Presented through the PMI Website Information Technology Case Study
7 pages (1996 words) , Download 1 , Case Study
Free
The resulting E-Accounting software application should take into account the possibilities of future growth. The main intention of the participating members of the project cycle is that the application remains accommodative of future changes while keeping a minimal effect of the future changes on the already working system functionalities.
Preview sample
Types and Categories of Threats to IT Systems Information Technology Essay
7 pages (2133 words) , Download 1 , Essay
Free
CSSLP is the newest type of certification that ensures security is maintained throughout the software lifecycle. It has seven domains that ensure security is highly maintained. The requirements are like those of CISM; the only difference is that you have to go through the CSSLP exam and pass and also accept the code of ethics.
Preview sample
Current Framework for Dicom Annotations and Viewer Information Technology Case Study
6 pages (1709 words) , Download 2 , Case Study
Free
Without overstating anything, none of the risks is a reason to disenchanter someone from building a project that is very secure for clinical practice. On top of the application-specific for the DICOM, there are various tools spectra like the policies, digital signatures, access logs, and VPN which are available in designing an almost near perfect DICOM annotations and image processing.
Preview sample
Information Technology Threats and Security Information Technology Assignment
6 pages (1757 words) , Download 1 , Assignment
Free
E-authentication includes passwords, local and remote authentication, physical tokens, and biometrics. The growing demand for dependency on information technology requires the high demand for the prevention of threats and improved security as McCarthy (2013) founded in his work on E-authentication.
Preview sample
The Role of Information System in Business - Decision and Types Information Technology Essay
6 pages (1795 words) , Download 1 , Essay
Free
The internet has completely transformed the hours of doing business in that it's now possible to have your shop open 24/7. Companies are operating from anywhere in the globe. Customers on the other are no longer tied by time and distance and can shop anywhere anytime; this has led to increased sales and profit margins.
Preview sample
System Design and Development Project - Voice over Internet Protocol Information Technology Essay
7 pages (1836 words) , Download 1 , Essay
Free
The introduction of VoIP has made the communication be cost-effective to enable technical account manager to communicate with clients (Shelly 1995, p.21). Currently, the organization spends vast resources on phone calls t its client. The purpose of the case study is to analyze the viability of removing PBX handsets and the use of VoiceIP software.
Preview sample
Social, Ethical, and Professional Aspects of Intellectual Property Information Technology Coursework
14 pages (4006 words) , Download 1 , Coursework
Free
Intellectual property consists of ideas, inventions, artworks, or any other thing that a person creates using his/her own imagination. Protection of intellectual property has been a critical issue for many years which has now become even more critical with the rapid technological progress all over the world.
Preview sample
IT & Entrepreneurship at Premier Ventures Limited Information Technology Business Plan
14 pages (4143 words) , Download 3 , Business Plan
Free
Premier Ventures Limited plans to enter into this market as a company to recon in matters such as cost-effectiveness, quality, authenticity and excellence in service delivery. It is projected that within our first two years of market entrance the firm shall be a point of reference in bringing internet solutions to over 5,000 customers.
Preview sample
HTML, SQL, and PHP Programming Languages Information Technology Essay
9 pages (2412 words) , Download 1 , Essay
Free
One of the proficiencies, which should be developed is being attentive and detailed to the language of programming. All through, most of the programs attempted have been unsuccessful due to the haphazard nature of their development. Despite the skills developed in the course unit, repeated mistakes always through leaving certain details of programming have proved costly.
Preview sample
Electronic Commerce Information Technology Essay
11 pages (2987 words) , Download 2 , Essay
Free
In marketing the venture I have employed the ACCESS model to assist me. My Audience in this case would have to be teenagers aged above 16 years. This is because youthful people are at the vanguard of the technical revolution and the existence of self-supportive children in the family unit seems to raise the popularity of workstation and internet entrance at home.
Preview sample
Benefits of the New IT Strategy to Smartz Information Technology Case Study
9 pages (2632 words) , Download 1 , Case Study
Free
Imran as the owner of Smartz has established a detailed plan for expansion in the European countries. It has planned to achieve this through an integrated system. The web-enabled services would help the company to capture more market share and at the same time would make it convenient for the buyers to purchase the product easily.
Preview sample
Wireless System Engineering and Deployment - RF Planning Information Technology Essay
10 pages (2788 words) , Download 1 , Essay
Free
Customer’s quality of service and capacity requirements specifies quality objectives. Monitoring continuously the quality of service is a basic requirement when undertaking a network quality survey. Then the network is compared against other networks of a similar nature and the results presented in a manner easy to understand.
Preview sample
Ethical Issues of BitCoins Information Technology Essay
9 pages (2518 words) , Download 1 , Essay
Free
Alternatively, individuals who make use of currencies as a store value and an exchange medium will always need Bitcoins as conservative characteristics. Stability enables investments and consumption in reliable amounts among counterfeits. In most cases, counterfeits do not seem to accomplish these aspects (Lempka, 86).
Preview sample
Etisalat IT Infrastructure Information Technology Case Study
6 pages (2545 words) , Download 1 , Case Study
Free
. Etisalat has the capacity to have an abridged infrastructure. Etisalat has better efficiency since Voice over Internet Protocol treats voice similar to any other type of data, so consumers can affix documents to actual voice messages or take part in virtual conventions using shared information and videoconferencing.
Preview sample
Analysis of Internet Protocol Networks Information Technology Coursework
13 pages (3452 words) , Download 1 , Coursework
Free
Protocols in data communication are the rules and procedures that govern communications between different devices on a network. They define the way in which devices communicate. They govern various aspects like how a modem and computer communicate, how files or e-mails are transferred over the internet r even how a telephone network connects to different telephones.
Preview sample
Issues and Implications of Cloud Computing Information Technology Essay
8 pages (2257 words) , Download 1 , Essay
Free
From a professional point of view, the IT industry is integrated with approximately all other industries across the globe and the growth and due to this reason, further development of the IT industry is inevitable. Improvement in applications and systems of cloud computing has played a huge role in the growth of the IT sector which represents a great career prospect.
Preview sample
Error Detection and Correction for ATM Technology - Reed-Solomon Detection Information Technology Case Study
17 pages (4625 words) , Download 1 , Case Study
Free
The permitted real maximum code rate depends on the used code of correction error. The actual information appears unaltered in the encoded Hamming Performance Evaluation as the Function of Redundancy data, due to the fact that RS is a systematic code. Some redundant bits are added for the detection and correction of errors.
Preview sample
Protecting Users from Phishing Websites and CheckBox Information Technology Essay
8 pages (2198 words) , Download 1 , Essay
Free
. The proxy handles a specific load that is directed to twitter accounts. Since the proxy identifies phishing websites in twitter accounts, the traffic monitored by the proxy will be less as compared to another anti-phishing proxy. The database is constantly updated with the latest phishing web site details and therefore provides genuine and valid checks.
Preview sample
Follow the Sun Workow in Global System Development Written by Carmel, Expinosa and Dubinsky Information Technology Article
12 pages (3385 words) , Download 1 , Article
Free
The authors have mentioned the recommendations for the future research which will help the ISD practitioners to implement FTS and increase the effectiveness of the field.  Among various recommendations, the evaluation of quality of informational system development with the implementation of ‘follow the Sun’ approach is the foremost.
Preview sample
How Should We Do Conceptual Analysis of Visual Images Information Technology Assignment
8 pages (2168 words) , Download 2 , Assignment
Free
Pasquinel was a coureur des bois (runner of the woods) and a solitary trader with Indians in his spacious canoe. He traded in beads from Paris, silver from Germany blankets from Quebec and bright cloth from New Orleans.  He ventured into the woods usually to trade various European items for furs, especially beaver pelts.
Preview sample
Conceptual Structure and Existential Graph Information Technology Assignment
9 pages (2361 words) , Download 1 , Assignment
Free
The contemporary world is characterized by a lot of inventions and innovations. A journey that would have lasted a few days or hours lasted 8 months across the jungle and the river. Sometimes when things seem unattainable, you have to be positive and keep on going. If you don’t believe me then you better believe Pasguinel.
Preview sample
Voter Security Authentication for Online Voting Information Technology Essay
7 pages (2030 words) , Download 1 , Essay
Free
Security design in the internet voting system is very important. Suitable methodologies including internal and third-party assessment of risk management competency, incorporating test process documentation, and compliance with the documentation can be applied. Responsible teams in the development and deployment of internet voting must have superior systems.  
Preview sample
Review of the Popular Association-Mining Algorithms - Apriori Information Technology Case Study
10 pages (2793 words) , Download 2 , Case Study
Free
Nonlinear mapping is used in the transformation of the available data to a higher dimension which is crucial in the location of a hyperplane that separates data from different classes (Christianini & Shawe 2000). In so doing, it comes up with the best function for classifying training data comprising of two classes.
Preview sample
How Search Query Can Be Optimized to Guarantee More Customer Satisfaction Information Technology Literature review
8 pages (2155 words) , Download 1 , Literature review
Free
Coll Rank, Quality Utility Model and Metaphor system have been developed to help users in query formulation while interacting with a search engine. In essence, they help in the creation or recommendation of queries with the highest degree of relevance to the user. In turn, these can help them reformulate high utility queries or obtain alternative queries for them.
Preview sample
Risk Management Program for Data Mart Information Technology Capstone Project
44 pages (10268 words) , Download 5 , Capstone Project
Organizational risk management refers to risk management carried out at a strategic level (Lam, 2003). Concepts regarding risk management will often be discussed in the context of Technical Risk Management practice that provides a description of the activities and processes which are mandatory for risk management at a project level.
Preview sample
Adaption of Ontologies in Business Process Management Information Technology Essay
8 pages (2259 words) , Download 1 , Essay
Free
Take on cloud-based services quicker: If anyone is willing to instantly innovate their processes by including a Software as a Service (SaaS) program or a professional Application Program Interface (API) from a cloud service provider? With the suitable SOA system available, both internal and external solutions are utilized the similar way at the process-step stage.
Preview sample
Analysis of Transition to IPV6 Information Technology Essay
10 pages (2663 words) , Download 1 , Essay
Free
ISPs and firms should adopt the version 6 network while upgrading their internet capabilities for compatibility measures. Even though problems arising from the migration are inevitable due to the lack of direct communication between the two versions, various mechanisms have been developed to ensure a seamless deployment of IPv6.
Preview sample
BitTorrent Communication Information Technology Essay
8 pages (2310 words) , Download 1 , Essay
Free
Revision3 Internet Television Network allows its viewers to watch a number of shows directly using their website. However, in order reduce their bandwidth expenditures, they have developed and maintained their own BitTorrent tracker. In this scenario, their viewers can access and download new episodes by making use of BitTorrent.
Preview sample
Whether or Not the Internet Should Be Censured Information Technology Coursework
15 pages (3904 words) , Download 1 , Coursework
Free
A comparison of the advantages of the use of CCTV technology in monitoring activities within an organisation shows that although the use of CCTV cameras can lead to a reduction of crime within an organisation, the use of CCTV system, however, is an invasion on the individual right to privacy and on this ground it is unethical.
Preview sample
Online Human Behavior and Power Law Network Information Technology Assignment
14 pages (3698 words) , Download 1 , Assignment
Free
In systems theory, a Holon is something that has identity and integrity which is part of a larger system. It is simply a subsystem of a large system. Holons are independent units and handle contingencies without inquiry from the main large system. They are able to withstand disturbances. Examples of holons includes individual holons, social holons, artifacts and heaps. (Jackson, 2000)
Preview sample
How Hacking and Cyber-Attacks Compromise on Sensitive Information Information Technology Annotated Bibliography
10 pages (2600 words) , Download 1 , Annotated Bibliography
Free
Business security planning in the 21st century has become a critical issue ranging from small businesses to multi-million dollar businesses. External threats of data theft as well as hacking into a company’s security systems have become as real as a physical burglary in companies’ premises. Essentially, hacking is considered to be a cybercrime all over the world.
Preview sample
Effect of Online Video Gaming on Social Development Information Technology Essay
7 pages (2098 words) , Download 1 , Essay
Free
Online video gaming has become a popular technological adoption in playing, a fact that has resulted in its illumination to determine its impact. On socialization, it has elicited immense debate, with opponents arguing that it leads to antisocial behaviors and encourages disengagement from social circles.
Preview sample
Description of Web Applications and Standalone Application Information Technology Coursework
14 pages (3755 words) , Download 1 , Coursework
Free
When your core determination is to grasp numerous clients to have a relaxed sustained and stress-free organized application able to be retrieved from distant computers with diverse operating systems you should choose the web based systems. It takes much time to execute an online system but in reoccurrence, the application is stress-free to access and bear up with.
Preview sample
Factors Favoring Digital Marketing Information Technology Essay
10 pages (3071 words) , Download 2 , Essay
Free
The traditional media is struggling to stay in the race of competition by the emerging new trends of portable devices available to consumers in the market. Thus, the traditional media is now transformed because of the rise of social Sites leads to favorable competition in an area that is dominated by the use of mobile devices and tablets.
Preview sample
The Impact That Web 2.0 Has on Political Participation Information Technology Essay
8 pages (2468 words) , Download 2 , Essay
Free
In some cases, the activities have a positive impact on political participation. For instance, the use of Web 2.0 tools such as ‘smart vote’ that provide voting advice and can lead to the user to vote for the recommended candidate. Furthermore, online activities can in certain cases impose political pressure e.g. the petition against censorship on the Internet in Germany.
Preview sample
Madura IT Systems Information Technology Case Study
20 pages (5418 words) , Download 1 , Case Study
Free
IT systems at Madura are fragmented in such a way that the essential features associated with information assurance, like confidentiality, integrity, and availability, are primarily compromised. For instance, the fragmented IT system is unable to adapt to strategic fronts when targeting the retail market because of its diverse function areas.
Preview sample
Recommendations for Improving IT Effectiveness - Maritime Costal Agency Information Technology Case Study
10 pages (2989 words) , Download 1 , Case Study
Free
I recommend training given that the new IS/IT Plan requires knowledgeable employees to implement successfully. With an eye on the Modernising of her Majesty’s coastguard project, it will be important and key that the staff is adequately trained to have in mind that some staff are going to overhauled after every six months to capture and reflect any changes.
Preview sample
The Evolution of Digital Crime Information Technology Case Study
6 pages (1780 words) , Download 1 , Case Study
Free
Several people are now rushing to be part of the experience that this open network presents rather than learning about how to use it responsibly. The outcome of this is that before several users are aware, they have been swindled by others who have made the act of digital crime, including cyber crime their unauthorized business.
Preview sample
Emirates Group-Information Technology Information Technology Research Paper
10 pages (2552 words) , Download 1 , Research Paper
Free
The paper comes with the decision on installing a new considering financial appropriation or upgrading the current one that is used with the employees. The increase in productivity will also be identified and also lead to the improvement of its solutions which intern increasing the profitable income.
Preview sample
Information Security the Using Business Impact Analysis Information Technology Report
21 pages (5669 words) , Download 1 , Report
The biggest challenge facing this method is the tuning of automated responses in avoiding extreme measures with false positives although it still provides protection against a form of information attack. APS will use the US-CERT general approach will help in narrowing the list of detecting true incidents and incidents candidates. It is vital to monitor network signals for any signs of intrusions.
Preview sample
A Reflective Learning Journal from Week 1 to Week 12 for Information Technology Information Technology Report
29 pages (7642 words) , Report
Nobody downloaded yet
Generation of computer graphics is made possible by the use of the concept of Cartesian coordination, the vertices are defined in 3D on x,y,z coordinates. Through different manipulation and modeling, different graphics can be produced. In modeling, an object in 3D meshes graphic commands are used and this is done on the CPU side.
Preview sample
2101 - 2150 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us