StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Causes and Effects of Internet Addiction Information Technology Research Proposal
11 pages (3214 words) , Download 2 , Research Proposal
Free
The research study is dedicated to investigating the causes and effects of internet addiction. The researcher formulated three hypotheses that will be tested and validated or nullified when carrying out the research study. The research takes a quantitative research design with questionnaires being the main tool of primary data collection.
Preview sample
Software Change Management Process Information Technology Case Study
8 pages (2476 words) , Download 1 , Case Study
Free
It is common knowledge that rarely does anything tend to function according to plan and as such, it is found that program projects are no exception to this rule. In essence changes in program, systems are evidently bound to happen and the manner in which one deals with them will determine just how successful a given project will become.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Supply Chain Management and Information Technology Information Technology Essay
13 pages (3250 words) , Download 3 , Essay
Free
With the emergence of the latest information technology-based tools, it is being possible to collaborate more and more processes either internal to the organization or external by keeping the focus on supply chain management. For more productivity, cutting costs and more quality enhancement, supply chain policies are being a major concern.
Preview sample
Network Management Deployment Plan Information Technology Research Proposal
10 pages (2657 words) , Download 1 , Research Proposal
Free
These sensors are limited in their capabilities and resources. It is required to optimize the usage of their resources for maximizing the network performance. We will not go deep into networking protocols, as our main concern will be at application level of networking only.
Preview sample
Wireless Security Policy Information Technology Assignment
5 pages (1468 words) , Download 1 , Assignment
Free
The initial guideline herein suggests that accessing wireless internet connection of one particular individual without his/her explicit permission is unethical. Thus, in order to restrict such unethical practices, the banking organization needs to follow certain ethical guidelines in the form of introducing anti-virus protection and developing easy e-mail communication.
Preview sample
The Application Process to the Online Virtual World Information Technology Case Study
8 pages (2080 words) , Download 1 , Case Study
Free
It's pointed out that several risks now surround businesses functioning in the cyberspace due to which business has to be extremely cautious by evaluating risks and implementing certain controls. As a core product, Mc Bride Financial Services aims to offer an efficient and user-friendly mortgage application process.
Preview sample
The Advent of the Internet as a Global Communication Mechanism Information Technology Case Study
16 pages (4581 words) , Download 1 , Case Study
Free
The Internet is an important tool for collecting knowledge and information. For that reason, it is viewed as a basic right for all human beings. Infringement of these rights has further given rise to cybercrime, privacy concerns digital insecurity and defamation issues. Governments are today grappling with ways of addressing these concerns.
Preview sample
Potential Smart City Project in Swansea Information Technology Case Study
13 pages (3371 words) , Download 1 , Case Study
Free
Usability engineering involves human-computer interaction; and especially developing human-computer interfaces that show user friendliness and high usability. A user friendly interface allows enables users effectively and efficiently perform tasks, and one that enables users to rate positively on emotional scales or opinion scales.
Preview sample
System Design Using UML Information Technology Report
7 pages (1913 words) , Download 2 , Report
Free
Analyzing the developed model will help designers and learners with the fundamentals of assigning responsibilities to the commonly used objects in UML, the frequently used notations, and specific design patterns. The reflective report will also deal with how UML is applied in relation to how objects should be thought about or how to carry out the process of designing object-specific systems.
Preview sample
Security in Bluetooth and other Mobile Devices Information Technology Coursework
5 pages (1363 words) , Download 1 , Coursework
Free
Potential security threats in the form of theft of data and information, control of the operating system, and access to the key and personal accounts require high and multiple layers of security. The introduction of biometric security in the form of retina security, fingerprint security, and heartbeat security has added value to the security framework.
Preview sample
Cell Phones Should Not Be Used While Driving Information Technology Report
6 pages (1707 words) , Download 0 , Report
Free
Texting, playing games, or answering phone calls while driving, not only endangers the lives of the drivers, but also the lives of other innocent road users. The essay endeavors to be persuasive in order to discourage the habit of using cell phones while driving. The essay will approach the issue of using cell phones while driving in the background of increased cell phone-related road accidents.
Preview sample
Denial of Service Attacks Information Technology Term Paper
8 pages (2253 words) , Download 1 , Term Paper
Free
The computer interconnectivity, which is dependent, on the global internet, however, makes its components an easy target for attackers who try to deplete their resources and launch denial of service attacks against them. The DoS attacks can be described as a single group or person’s spiteful attack to cause the site.
Preview sample
The Use of Different Development Techniques Information Technology Assignment
8 pages (2122 words) , Download 1 , Assignment
Free
Software scope describes the data and control to be processed, purpose, interfaces, and reliability. Purposes described in the declaration of possibility are evaluated and in some cases refined to provide more detail prior to the beginning of estimation. Since both cost and schedule estimates are functional oriented, some degree of decomposition is often useful.
Preview sample
Connection to the X-Stream Information Technology Case Study
6 pages (1588 words) , Download 1 , Case Study
Free
Otherwise, computers connecting from local area networks are likely to have permanent IP addresses or be issued with a temporary address from Dynamic Host Configuration Protocol. All in all, any computer connected to the X-Stream will have an individualized IP address. Connection to the X-Stream might involve the conversion of alphabetic texts.
Preview sample
Existing Communication Processes in IKEA to Stakeholders Information Technology Case Study
11 pages (3028 words) , Download 0 , Case Study
Free
Generally speaking, the paper "Existing Communication Processes in IKEA to Stakeholders" is an outstanding example of an information technology case study. The primary function of communication in organisations is to transmit information from one person to another for the purposes of decision-making.
Preview sample
Effective Management of Data Tables Information Technology Case Study
7 pages (2160 words) , Download 1 , Case Study
Free
Data within tables can relate with each other and the database administrator has the responsibility of ensuring that there is the effective management of each data table. Effective management of data tables involves the accurate joining of single or multiple tables. Database administrators manipulate data in tables using Structured Query Language.
Preview sample
The Importance of Machine to Machine Interaction Information Technology Case Study
5 pages (1570 words) , Download 1 , Case Study
Free
The author of the following paper states that connectivity is considered to be a way of life that usually drives expectations. The M2M device management provides a platform, which enables people to profit from this growth and also supports the new technology and devices that emerge in the marketplace.
Preview sample
Different Types of Programming Languages Information Technology Case Study
7 pages (2094 words) , Download 2 , Case Study
Free
In modern times advanced programming languages are in place that allows for fast interpretation and fast execution of operations. There are different types of programming languages subject to their usage and application. While some are restricted to advanced level operations and interpretations, others are relatively user friendly.
Preview sample
Error-Correcting Output Codes Information Technology Coursework
9 pages (2526 words) , Download 0 , Coursework
Free
Error-correcting output codes (ECOC) are used in addressing varied problems in pattern recognition. For instance, designing of combined classifiers, ECOC provides diversified classifiers by means of dichotomies that result in accurate classification. The main use of ECOC is to provide accurate classification of data in patterns, using dichotomies in computers.
Preview sample
The Design of a Server Computer Information Technology Essay
4 pages (1085 words) , Download 0 , Essay
Free
The proposed server will be able to serve 14 workstations to make it easy to manage and prevent the occurrence of any problem that might emerge during the process of its function. Few numbers of workstation also can be useful since it can be possible to identify the problem when it occurs without using a lot of resources (John & Maynard, 2000).
Preview sample
The Decision-Making Process of Emirates Airline Information Technology Term Paper
10 pages (2942 words) , Download 2 , Term Paper
Free
The airline is the largest and most consistently profitable airline. This company is in the airline industry which is greatly affected by environmental factors such as politics and economics that decrease the number of passengers. Many companies in this industry develop strategies that enable them to be more effective.
Preview sample
Security, Crimes, Compliance and Continuity of IT in Enterprises Information Technology Case Study
9 pages (2580 words) , Download 1 , Case Study
Free
Amazon is the world’s largest online retailer with huge databases and servers containing a pool of sensitive business data/information. Therefore, it is inevitably important for the company to establish advanced systems to improve network security and protect confidential customer information. The company already performs outstandingly in this regard despite some information security vulnerabilities identified recently.
Preview sample
The Rise in Cybercrime and the Possible Remedy Information Technology Research Paper
6 pages (1693 words) , Download 2 , Research Paper
Free
The Rise in the level of Cybercrime today is a big challenge for computer scientists and information technologists. There seems to a great need to develop more secure systems that will prevent hackers from accessing personal information. To provide a remedy to this problem, it is crucial to develop systems that use safe encryption algorithms that are hard to crack.
Preview sample
Approaches to Solve Email Spam Issues Information Technology Essay
2 pages (687 words) , Download 0 , Essay
Free
The paper "Approaches to Solve Email Spam Issues" is a good example of an essay on information technology. Email spam also is known as unsolicited bulk email represents a subset of electronic spam, which involves sending similar messages to different recipients (Schneider, 2010). When the recipient clicks on the email links, they send him/her to the phishing websites that host the malware.
Preview sample
Information Technology in the Health Sector Information Technology Coursework
4 pages (1382 words) , Download 0 , Coursework
Free
The medical record maintenances, either paper-based or electronically operated, is a communication tool that supports clinical decision making, evaluation of the quality and efficacy of care, coordination of services, research and education and legal protection through accreditation and regulatory processes.
Preview sample
How Packet Data Travels through the Networks Information Technology Case Study
8 pages (2255 words) , Download 1 , Case Study
Free
It's pointed out that while accessing an X-stream server from a remote location like home, several network and protocol processes take place in the network. This report is intended to provide an insight into how packet data travels through the networks, the role of various protocols, and about various processes that occur within the network.
Preview sample
Is Google Making People Stupid Information Technology Coursework
5 pages (1351 words) , Download 1 , Coursework
Free
People have for long, said that computers are making people dumber since computers existed. Internet was introduced, thus bringing Google into existence. For a while now, Google has been the heart of the internet. Does Google make people stupid? It is a subject for discussion and debate for many people and even researchers and scientists.
Preview sample
An Android App as a Guide of Injectable Medicines Information Technology Dissertation
32 pages (8290 words) , Download 1 , Dissertation
The author points out that the guide will contain a set of monographs of injectable medicines and the prescribing information that is needed by the doctors and the nurses to minimize the risks to patients when preparing injectable medicines. This is achieved through the use of an Android application.
Preview sample
4th Generation Based on IMT-Advanced Information Technology Coursework
11 pages (2908 words) , Download 0 , Coursework
Free
Modern times are driven by advanced digital technological devices. The introduction of 4th generation technologies is a similar concept that has prevailed in recent times. The 4th generation technology promises to provide a large number of features and functions that were not offered by the 3rd generation and its predecessors.
Preview sample
Branch Prediction Information Technology Coursework
6 pages (1743 words) , Download 0 , Coursework
Free
Branch prediction is a technique utilized by instruction pre-fetch processors in predicting whether a conditional branch is taken or not taken. Branch prediction remains an important area of research in ways of improving parallelism in computing. It is a central factor to parallelism for it has an influence on the performance of processors.
Preview sample
Information Management Needs Assessment Information Technology Essay
5 pages (1393 words) , Download 1 , Essay
Free
"Total quality management aims at realizing quality” (Sven, 2007). This management aspect cannot be under looked in the daycare business. The quality of the services to children needs reengineering regularly and the systems need regular updating and close relation. This will aid in keeping a good system that is ready for use at any time by the organization.
Preview sample
RFID Application in Port Operations Information Technology Report
10 pages (3014 words) , Download 1 , Report
Free
The need to keep ports secure and protect, and monitor cargo and infrastructure has resulted in the development of various security systems among them the radio frequency identification (RFID). The mechanism and concepts that enable the functioning of the RFID system are determined based on the fixed and recurrent costs of maintaining the technology.
Preview sample
Planning Stage in Computer Sciences and Information Technology Information Technology Research Proposal
14 pages (3410 words) , Download 1 , Research Proposal
Free
The management of the Systems Upgrade project for Clyde Valley Financial Solutions will two major milestones i.e. installation of the Windows Server 2008R2 Microsoft and installation of the Management Console (MMC). Windows Server 2008R2 will endow the company with a centralized tool for daily management of activities in the form of Server Manager.
Preview sample
The Idea of Expanding the Heathrow Airport in London Information Technology Case Study
9 pages (2610 words) , Download 2 , Case Study
Free
After a public inquiry that lasted 46 months, the construction of terminal 5 got a formal approval on November 20 in the year 2001 and commenced September of the following year. The entire planning process due to its lengthy nature consumed approximately £63m which was financed by BA and BAA since they were the two major players.
Preview sample
The Functioning and Uses of the Internet Information Technology Essay
5 pages (1388 words) , Download 1 , Essay
Free
Telecommuting is a situation in which workers operate from a virtual office. Meaning, under this arrangement, an employee does not need to go to their officers but can perform their duties right from the comfort of their homes by just using the internet to perform their tasks. This is one of the major benefits of the internet to individual employees.
Preview sample
Benefits of Implementing Information System in the Outback Tours Information Technology Business Plan
4 pages (1298 words) , Download 0 , Business Plan
Free
The company is working for the last seven years and now the company’s staff (employees) is increasing with the passage of time because their customers have grown and therefore, managing tours and customer bookings have become difficult. Currently, the company is managing manual records (hard copies) of departure, tours, and bookings.
Preview sample
IBM Paper on the Future of Email and Applications Information Technology Book Report/Review
6 pages (1545 words) , Download 2 , Book Report/Review
Free
The paper will evaluate two sources of information to determine their suitability for use in the research on the use of web-based social networking as a business tool. The first is an IBM Paper on the Future of Email and Applications and the second paper to be reviewed is a Cisco Internet Business Group Paper on the use of Web-Based Social Networking as a Business Tool.
Preview sample
Using Technology as Experience Framework Information Technology Case Study
2 pages (765 words) , Download 1 , Case Study
Free
HCI and related controls are not used to managing knowledge. Client experience framework perceives that all human encounters are all encompassing and social, and are embodied an equalization of sensual, cerebral, and
Preview sample
Analyzing the Big Data Information Technology Research Paper
5 pages (1374 words) , Download 1 , Research Paper
Free
Considering the explosion of data that has been witnessed in the current global economy among various organizations, the analysis of such large data sets (big data), has thus, been recognized as the core basis upon which different organizations will compete. As such, it will underpin the new waves of the growth of productivity.
Preview sample
Relation of Information Systems to Earthquakes and Volcanoes Information Technology Essay
5 pages (1530 words) , Download 1 , Essay
Free
As new pieces of data are being measured, the process usually grows more complicated. In addition to these added complications, the planner avoids being overwhelmed by the information through techniques that help him manage it. When maps that show different information regarding the same area are made, it constitutes a geographical information system.
Preview sample
IT Risk Analysis Information Technology Case Study
22 pages (5045 words) , Download 1 , Case Study
This paper begins by outlining the subject of risk analysis followed by an in-depth review of the organization's Information Technology risks. The third section focuses on the evaluation of the risks while the fourth addresses the targeted countermeasures. Lastly, it provides is a set of recommendations and conclusions necessary for protecting the business and its priorities.
Preview sample
The Application of Biometric Technology and the Convenience Information Technology Essay
5 pages (1378 words) , Download 1 , Essay
Free
Biometric technology has been used in offering better security and convenience when controlling access to facilities as well as other tangible resources. Moreover, the application of biometrics in “time and attendance” applications offer convenience to employees and provide a better way of protecting the employer from fraud.
Preview sample
System and Network Security Practices Information Technology Essay
7 pages (2298 words) , Download 0 , Essay
Free
The paper "System and Network Security Practices" is a wonderful example of an essay on information technology. In efforts to meet the ever-increasing demand for their products, many organizations have turned into using other firms to help them undertake some activities such as distribution, advertising, training of the workers, and management of information technology among others.
Preview sample
Enterprise Portal Information Technology Assignment
11 pages (3277 words) , Download 1 , Assignment
Free
This assignment also discusses the basic contrast between organized information and unstructured information is that organized information is sorted out in a very motorized and reasonable way. The term organized data discusses the information held in fields. It is known as organized on the grounds that its tendency and capacity are recognized by metadata labels.  
Preview sample
Comparison of 3 Airlines Sites Information Technology Case Study
7 pages (2090 words) , Download 1 , Case Study
Free
Websites are the most preferred mediums that can be used to reach new markets hence generate more sales. Without a high-class website that entices visitors and provides the company/business with a way that helps capture information then the business is not using the invention of the internet to the fullest. 
Preview sample
UNIX Operating Systems Information Technology Essay
6 pages (1685 words) , Download 1 , Essay
Free
This paper is organized into two parts named part 1 and part 2. Part one selects and discusses one aspect of computer systems (UNIX operating systems). Part 2 discusses the procedure for the design of a network that connects 20 workstations in one room plus 15 workstations in another room to a central server that provides high-quality printer and internet access.
Preview sample
Web Application Development Information Technology Coursework
8 pages (2395 words) , Download 1 , Coursework
Free
It is also comprised of a view that gives data representation output as graphs, diagram, or charts. Multiple views can also represent information as a bar chart and tabular. Thirdly, the controller gets inputs and changes them into commands for the views or model (Fournier, 1999). MVC also defines interactions between the model, view, and controller.
Preview sample
Ticket Distribution Firms Information Technology Assignment
5 pages (1601 words) , Download 1 , Assignment
Free
The author states that due to the importance of this, whole organizations such as the Ticketmaster have blossomed. Ticketmaster has been in business since1976 and has offered its services to entertainers in the area of ticket distribution. The firm offers these services to individual entertainers, music bands, organizations, etc.
Preview sample
Microsoft Dynamics ERP Information Technology Research Paper
3 pages (1013 words) , Download 0 , Research Paper
Free
In spite of companies have interests in management models but various CRM implementations fail (Chalmeta, 2006). One specific cause of failure is that existing methodologies are not adequate for CRM project and cannot integrate and
Preview sample
The Evolution of Windows Operating System Information Technology Article
16 pages (4245 words) , Download 0 , Article
Free
MS-DOS is a program that was designed to help in running a computer’s hardware system, it’s programs as well as act as a suitable bridge between these two. Although MS-DOS was quite effective, it is as a result of its proving to be too difficult for some people to use as a result of having numerous cryptic commands that the Windows Operating System was developed.
Preview sample
2151 - 2200 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us