Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
11 pages (3214 words)
, Download 2
, Research Proposal
Free
The research study is dedicated to investigating the causes and effects of internet addiction. The researcher formulated three hypotheses that will be tested and validated or nullified when carrying out the research study. The research takes a quantitative research design with questionnaires being the main tool of primary data collection.
It is common knowledge that rarely does anything tend to function according to plan and as such, it is found that program projects are no exception to this rule. In essence changes in program, systems are evidently bound to happen and the manner in which one deals with them will determine just how successful a given project will become.
Preview sample
sponsored ads
Hire a pro to write a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
With the emergence of the latest information technology-based tools, it is being possible to collaborate more and more processes either internal to the organization or external by keeping the focus on supply chain management. For more productivity, cutting costs and more quality enhancement, supply chain policies are being a major concern.
10 pages (2657 words)
, Download 1
, Research Proposal
Free
These sensors are limited in their capabilities and resources. It is required to optimize the usage of their resources for maximizing the network performance. We will not go deep into networking protocols, as our main concern will be at application level of networking only.
The initial guideline herein suggests that accessing wireless internet connection of one particular individual without his/her explicit permission is unethical. Thus, in order to restrict such unethical practices, the banking organization needs to follow certain ethical guidelines in the form of introducing anti-virus protection and developing easy e-mail communication.
It's pointed out that several risks now surround businesses functioning in the cyberspace due to which business has to be extremely cautious by evaluating risks and implementing certain controls. As a core product, Mc Bride Financial Services aims to offer an efficient and user-friendly mortgage application process.
The Internet is an important tool for collecting knowledge and information. For that reason, it is viewed as a basic right for all human beings. Infringement of these rights has further given rise to cybercrime, privacy concerns digital insecurity and defamation issues. Governments are today grappling with ways of addressing these concerns.
Usability engineering involves human-computer interaction; and especially developing human-computer interfaces that show user friendliness and high usability. A user friendly interface allows enables users effectively and efficiently perform tasks, and one that enables users to rate positively on emotional scales or opinion scales.
Analyzing the developed model will help designers and learners with the fundamentals of assigning responsibilities to the commonly used objects in UML, the frequently used notations, and specific design patterns. The reflective report will also deal with how UML is applied in relation to how objects should be thought about or how to carry out the process of designing object-specific systems.
Potential security threats in the form of theft of data and information, control of the operating system, and access to the key and personal accounts require high and multiple layers of security. The introduction of biometric security in the form of retina security, fingerprint security, and heartbeat security has added value to the security framework.
Texting, playing games, or answering phone calls while driving, not only endangers the lives of the drivers, but also the lives of other innocent road users. The essay endeavors to be persuasive in order to discourage the habit of using cell phones while driving. The essay will approach the issue of using cell phones while driving in the background of increased cell phone-related road accidents.
The computer interconnectivity, which is dependent, on the global internet, however, makes its components an easy target for attackers who try to deplete their resources and launch denial of service attacks against them. The DoS attacks can be described as a single group or person’s spiteful attack to cause the site.
Software scope describes the data and control to be processed, purpose, interfaces, and reliability. Purposes described in the declaration of possibility are evaluated and in some cases refined to provide more detail prior to the beginning of estimation. Since both cost and schedule estimates are functional oriented, some degree of decomposition is often useful.
Otherwise, computers connecting from local area networks are likely to have permanent IP addresses or be issued with a temporary address from Dynamic Host Configuration Protocol. All in all, any computer connected to the X-Stream will have an individualized IP address. Connection to the X-Stream might involve the conversion of alphabetic texts.
Generally speaking, the paper "Existing Communication Processes in IKEA to Stakeholders" is an outstanding example of an information technology case study. The primary function of communication in organisations is to transmit information from one person to another for the purposes of decision-making.
Data within tables can relate with each other and the database administrator has the responsibility of ensuring that there is the effective management of each data table. Effective management of data tables involves the accurate joining of single or multiple tables. Database administrators manipulate data in tables using Structured Query Language.
The author of the following paper states that connectivity is considered to be a way of life that usually drives expectations. The M2M device management provides a platform, which enables people to profit from this growth and also supports the new technology and devices that emerge in the marketplace.
In modern times advanced programming languages are in place that allows for fast interpretation and fast execution of operations. There are different types of programming languages subject to their usage and application. While some are restricted to advanced level operations and interpretations, others are relatively user friendly.
Error-correcting output codes (ECOC) are used in addressing varied problems in pattern recognition. For instance, designing of combined classifiers, ECOC provides diversified classifiers by means of dichotomies that result in accurate classification. The main use of ECOC is to provide accurate classification of data in patterns, using dichotomies in computers.
The proposed server will be able to serve 14 workstations to make it easy to manage and prevent the occurrence of any problem that might emerge during the process of its function. Few numbers of workstation also can be useful since it can be possible to identify the problem when it occurs without using a lot of resources (John & Maynard, 2000).
The airline is the largest and most consistently profitable airline. This company is in the airline industry which is greatly affected by environmental factors such as politics and economics that decrease the number of passengers. Many companies in this industry develop strategies that enable them to be more effective.
Amazon is the world’s largest online retailer with huge databases and servers containing a pool of sensitive business data/information. Therefore, it is inevitably important for the company to establish advanced systems to improve network security and protect confidential customer information. The company already performs outstandingly in this regard despite some information security vulnerabilities identified recently.
6 pages (1693 words)
, Download 2
, Research Paper
Free
The Rise in the level of Cybercrime today is a big challenge for computer scientists and information technologists. There seems to a great need to develop more secure systems that will prevent hackers from accessing personal information. To provide a remedy to this problem, it is crucial to develop systems that use safe encryption algorithms that are hard to crack.
The paper "Approaches to Solve Email Spam Issues" is a good example of an essay on information technology. Email spam also is known as unsolicited bulk email represents a subset of electronic spam, which involves sending similar messages to different recipients (Schneider, 2010). When the recipient clicks on the email links, they send him/her to the phishing websites that host the malware.
The medical record maintenances, either paper-based or electronically operated, is a communication tool that supports clinical decision making, evaluation of the quality and efficacy of care, coordination of services, research and education and legal protection through accreditation and regulatory processes.
It's pointed out that while accessing an X-stream server from a remote location like home, several network and protocol processes take place in the network. This report is intended to provide an insight into how packet data travels through the networks, the role of various protocols, and about various processes that occur within the network.
People have for long, said that computers are making people dumber since computers existed. Internet was introduced, thus bringing Google into existence. For a while now, Google has been the heart of the internet. Does Google make people stupid? It is a subject for discussion and debate for many people and even researchers and scientists.
The author points out that the guide will contain a set of monographs of injectable medicines and the prescribing information that is needed by the doctors and the nurses to minimize the risks to patients when preparing injectable medicines. This is achieved through the use of an Android application.
Modern times are driven by advanced digital technological devices. The introduction of 4th generation technologies is a similar concept that has prevailed in recent times. The 4th generation technology promises to provide a large number of features and functions that were not offered by the 3rd generation and its predecessors.
Branch prediction is a technique utilized by instruction pre-fetch processors in predicting whether a conditional branch is taken or not taken. Branch prediction remains an important area of research in ways of improving parallelism in computing. It is a central factor to parallelism for it has an influence on the performance of processors.
"Total quality management aims at realizing quality” (Sven, 2007). This management aspect cannot be under looked in the daycare business. The quality of the services to children needs reengineering regularly and the systems need regular updating and close relation. This will aid in keeping a good system that is ready for use at any time by the organization.
The need to keep ports secure and protect, and monitor cargo and infrastructure has resulted in the development of various security systems among them the radio frequency identification (RFID). The mechanism and concepts that enable the functioning of the RFID system are determined based on the fixed and recurrent costs of maintaining the technology.
14 pages (3410 words)
, Download 1
, Research Proposal
Free
The management of the Systems Upgrade project for Clyde Valley Financial Solutions will two major milestones i.e. installation of the Windows Server 2008R2 Microsoft and installation of the Management Console (MMC). Windows Server 2008R2 will endow the company with a centralized tool for daily management of activities in the form of Server Manager.
After a public inquiry that lasted 46 months, the construction of terminal 5 got a formal approval on November 20 in the year 2001 and commenced September of the following year. The entire planning process due to its lengthy nature consumed approximately £63m which was financed by BA and BAA since they were the two major players.
Telecommuting is a situation in which workers operate from a virtual office. Meaning, under this arrangement, an employee does not need to go to their officers but can perform their duties right from the comfort of their homes by just using the internet to perform their tasks. This is one of the major benefits of the internet to individual employees.
The company is working for the last seven years and now the company’s staff (employees) is increasing with the passage of time because their customers have grown and therefore, managing tours and customer bookings have become difficult. Currently, the company is managing manual records (hard copies) of departure, tours, and bookings.
6 pages (1545 words)
, Download 2
, Book Report/Review
Free
The paper will evaluate two sources of information to determine their suitability for use in the research on the use of web-based social networking as a business tool. The first is an IBM Paper on the Future of Email and Applications and the second paper to be reviewed is a Cisco Internet Business Group Paper on the use of Web-Based Social Networking as a Business Tool.
HCI and related controls are not used to managing knowledge. Client experience framework perceives that all human encounters are all encompassing and social, and are embodied an equalization of sensual, cerebral, and
5 pages (1374 words)
, Download 1
, Research Paper
Free
Considering the explosion of data that has been witnessed in the current global economy among various organizations, the analysis of such large data sets (big data), has thus, been recognized as the core basis upon which different organizations will compete. As such, it will underpin the new waves of the growth of productivity.
As new pieces of data are being measured, the process usually grows more complicated. In addition to these added complications, the planner avoids being overwhelmed by the information through techniques that help him manage it. When maps that show different information regarding the same area are made, it constitutes a geographical information system.
This paper begins by outlining the subject of risk analysis followed by an in-depth review of the organization's Information Technology risks. The third section focuses on the evaluation of the risks while the fourth addresses the targeted countermeasures. Lastly, it provides is a set of recommendations and conclusions necessary for protecting the business and its priorities.
Biometric technology has been used in offering better security and convenience when controlling access to facilities as well as other tangible resources. Moreover, the application of biometrics in “time and attendance” applications offer convenience to employees and provide a better way of protecting the employer from fraud.
The paper "System and Network Security Practices" is a wonderful example of an essay on information technology. In efforts to meet the ever-increasing demand for their products, many organizations have turned into using other firms to help them undertake some activities such as distribution, advertising, training of the workers, and management of information technology among others.
This assignment also discusses the basic contrast between organized information and unstructured information is that organized information is sorted out in a very motorized and reasonable way. The term organized data discusses the information held in fields. It is known as organized on the grounds that its tendency and capacity are recognized by metadata labels.
Websites are the most preferred mediums that can be used to reach new markets hence generate more sales. Without a high-class website that entices visitors and provides the company/business with a way that helps capture information then the business is not using the invention of the internet to the fullest.
This paper is organized into two parts named part 1 and part 2. Part one selects and discusses one aspect of computer systems (UNIX operating systems). Part 2 discusses the procedure for the design of a network that connects 20 workstations in one room plus 15 workstations in another room to a central server that provides high-quality printer and internet access.
It is also comprised of a view that gives data representation output as graphs, diagram, or charts. Multiple views can also represent information as a bar chart and tabular. Thirdly, the controller gets inputs and changes them into commands for the views or model (Fournier, 1999). MVC also defines interactions between the model, view, and controller.
The author states that due to the importance of this, whole organizations such as the Ticketmaster have blossomed. Ticketmaster has been in business since1976 and has offered its services to entertainers in the area of ticket distribution. The firm offers these services to individual entertainers, music bands, organizations, etc.
3 pages (1013 words)
, Download 0
, Research Paper
Free
In spite of companies have interests in management models but various CRM implementations fail (Chalmeta, 2006). One specific cause of failure is that existing methodologies are not adequate for CRM project and cannot integrate and
MS-DOS is a program that was designed to help in running a computer’s hardware system, it’s programs as well as act as a suitable bridge between these two. Although MS-DOS was quite effective, it is as a result of its proving to be too difficult for some people to use as a result of having numerous cryptic commands that the Windows Operating System was developed.