StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Aspects of Banking Sites Information Technology Case Study
8 pages (2284 words) , Download 1 , Case Study
Free
Stating precisely, these websites are linked to the World Wide Web, which is again based on the Domain Name System of the internet media. Banks have also not been away from making use of internet media through website portals. These portals have mostly been in use by banks and can create awareness among people about their works.
Preview sample
E-Diplomacy Implementation and Effects Information Technology Research Paper
21 pages (4492 words) , Download 1 , Research Paper
Many experts have also defined digital diplomacy as an electronic component of public diplomacy. Although Digital diplomacy is an emerging new field with a wide range of applications in international relations, a few studies have previously been conducted in this area and this has contributed to a significant research gap. 
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
ITIL for Managing IT Service in Terra Firma Information Technology Report
6 pages (1519 words) , Download 1 , Report
Free
As a supplier, Terra Firma also offers technical support services as well as integration assistance for the imaging systems with developed visualization software, analysis, and storage of important medical images. The company’s financial reports project it as a highly competitive and ultimately profitable one.
Preview sample
SNMP for Diagnostics and Troubleshooting Network Problems Information Technology Research Paper
18 pages (4977 words) , Download 1 , Research Paper
Free
 The results from the observation of executing of commands showed that files that do not have a proper set of properties such as extension, descriptive properties, and those out of an event’s limitation standard return error messages blacking the operations from continuing further. 
Preview sample
Next Generation Mobile Computing Information Technology Coursework
12 pages (3367 words) , Download 1 , Coursework
Free
The description above can be widened to comprise of other types of devices like PDAs, mobile phones as well as tablet technology together with other usage situations, with the definition further encapsulating the more traditionally commercial aspects of mobile computing. It is important to note that mobile computing is not a field that is new.
Preview sample
Human Motion Detection based on Background Subtraction Techniques Information Technology Coursework
6 pages (1500 words) , Download 1 , Coursework
Free
Extensive research has been done in this field to accurately extract the motion region of interest in order to use it for further processing
Preview sample
Information Governance in Business Information Technology Coursework
12 pages (3366 words) , Download 2 , Coursework
Free
Information governance has evolved as a new concept in recent years. This concept considers information as a strategic asset. It helps in formulating new strategies as well as plays a key role in sustaining a business position. Business value is eventually maximized through the approach of information governance.
Preview sample
Management of Information within a Law Enforcement Agency using Technology Information Technology Coursework
10 pages (2633 words) , Download 1 , Coursework
Free
 Law enforcement agencies usually have to deal with a wide array of information. Governmental police agencies are solely responsible for governing law enforcement agencies. The major purposes of such agencies are an investigation of criminal activities, transferring results to courts, and detention of any pending judicial action.
Preview sample
Security Issues in Wireless Mobile Communication Information Technology Coursework
7 pages (1849 words) , Download 1 , Coursework
Free
An area of interest is in the security threat that comes up as a result of wireless mobile communication technology. Mobile communication exposes its users to the violation of their privacy since the information might be shared without their consent. It poses a threat and risk to the users making them vulnerable. 
Preview sample
Aspects of Technology Update Information Technology Coursework
7 pages (2046 words) , Download 1 , Coursework
Free
Therefore, HIS Technology brought its experts who represented the supply chain of the technology from the components of making electronics to the finished products together across all the applications markets that range from media, consumer, and telecom; to medical, industrial, power.
Preview sample
Information Technology Security Information Technology Coursework
7 pages (2129 words) , Download 2 , Coursework
Free
However, the emerging information insecurity in organizations can be a drawback in many ways. Criminal justice has had to catch up and develop crimes and sanctions based on the usage of information communication technology. The discussion that follows will outline some of the challenges of information technology security. 
Preview sample
Effects of Internet on Politics, Youths and Westernization Information Technology Coursework
6 pages (1672 words) , Download 2 , Coursework
Free
Originally, the internet served the purpose of interconnecting laboratories taking part in government researches, and since 1994 it has been widened so serve a million users as well as for multiple purposes. However, in comparison to other communication mediums, it has within the very shortest period given the world a globalized dimension. 
Preview sample
Using Multimedia Metadata to Improve Network Efficiency Information Technology Research Proposal
10 pages (2692 words) , Download 0 , Research Proposal
Free
The availability of huge information online requires special computing for quality information extraction. Accessing these network resources is quite challenging therefore the need metadata. Metadata will help to improve network efficiency by ensuring the retrieved information meets the objective of the user of the internet.
Preview sample
The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy Information Technology Annotated Bibliography
7 pages (2188 words) , Download 1 , Annotated Bibliography
Free
Being one of the most recent developments in information technology, social networking sites poses tremendous dangers to social users. However, global society does not acknowledge the peril associated with using social media sites. The research expounds on the popularity of social media, the problem of cyberbullying to social network users, and the negative impact of social networking sites.
Preview sample
Augmented Reality Systems Trends Information Technology Assignment
8 pages (2185 words) , Download 1 , Assignment
Free
Promotion is not efficient to trigger engagement as far as the advertisement of Reese’s brand is concerned. Given that it is human beings that are being dealt with, it would be in order for Hershey Company to bear in mind that some promotional strategies must have been underuse and to make it worst, some customers might have got very accustomed to a particular promotional strategy.
Preview sample
Online Shopping Webpage Development Using PHP and MySQL Information Technology Assignment
8 pages (2214 words) , Download 2 , Assignment
Free
For this project to be successful, the relational database must be created first. The conceptual design will be divided into two parts i.e. data model and the process model. The data model will deal with the data to be stored in the database. The process model will in turn deal with the processing of the data.
Preview sample
Cloud Computing - Windows Server 2012 Information Technology Assignment
10 pages (2809 words) , Download 1 , Assignment
Free
For some time now, the different branches of the company have been connected through a WAN (Wide Area Network), with ample bandwidth being set in place in support of communication and connection for the different workers of the company located in different regions. The available bandwidth is strong enough to support expansion without further investment in the same.
Preview sample
Modelling of the Telecommunications and Networking Information Technology Assignment
11 pages (3334 words) , Download 1 , Assignment
Free
Wireless technology has created a persuasive and pervasive system and for enabling true mobility. Communications technology has used compact wireless technologies to emerge into a computation and collaboration system anywhere and anytime. The third generation or 3G technology in communications is widespread while WiMAX.
Preview sample
Successful Supply Chain Processes Information Technology Assignment
15 pages (4653 words) , Download 2 , Assignment
Free
The functions related generally involve a continuous flow of products and/or services from the suppliers of raw materials and end-product manufacturers. Specially mentioning, the functions determine how to effectively control the flow of operations required for the products purchased from diverse key sources.
Preview sample
Optimization of Personal Online Profile E-Commerce Module Information Technology Assignment
11 pages (3186 words) , Download 1 , Assignment
Free
In terms of independent service providers, the phrase “web design company” is searched 22,200 times and this came at a cost of £5.14 at a probability of 0.8. Through this, I can advertise my services independently and get a good chance of optimizing my reach through the payment of money to get hired independently by firms that might want independent contractors.
Preview sample
Social Marketing Enterprise - Blogs Information Technology Assignment
6 pages (1710 words) , Download 1 , Assignment
Free
Various factors prove the implementation of the value lever number 5 by the organization on the social platform. One of the factors includes the company’s advertisement of its products on social media. Social media marketing has contributed to the company’s growth. According to its leaders, the company’s sales continue to increase as its presence on social media becomes stronger.
Preview sample
Stuxnet: Dissecting a Cyberwarfare Weapon Information Technology Assignment
6 pages (1807 words) , Download 1 , Assignment
Free
Stuxnet was a strong computer virus since it was not lined up to any confidentiality. Unlike other computer viruses that erase or steal any information, Stuxnet's main aim was destroying a military target (Ralph, 49). According to Ralph Langner, the virus was aimed at industrial controllers as opposed to the common misconception that it was aimed at SCADA systems.
Preview sample
Information System Auditing Information Technology Assignment
7 pages (2101 words) , Download 1 , Assignment
Free
The payroll system is a very sensitive system that handles the payment details of the employee's over a certain period called the accounting period. It encounters a number of challenges that include errors in the payroll and irregularities (Bragg, 2003). The system should, therefore, ensure accurate and timely payment.
Preview sample
Social Network Sites: Definition, History, and Scholarship Information Technology Report
19 pages (4794 words) , Download 0 , Report
Free
This popularity is considered to play a very important role in bridging the bridges that existed in communicating across boundaries and seas. It is for this reason that this paper focuses on discussing whether the world would be a safer place if social media such as Facebook did not exist. It will initialize with a broad introduction that will discuss various social sites.
Preview sample
The Effects of Social Networking Information Technology Report
7 pages (1908 words) , Download 0 , Report
Free
One of the significant ways in which information technology has impacted and affected the lives of many people in contemporary society is through the enhancement of social networks in which people create relationships and friendships on social network platforms. Regardless of the distance, IT aids in communication through social networking sites.
Preview sample
Information Systems Development Information Technology Assignment
8 pages (2308 words) , Download 0 , Assignment
Free
Determination of the different categories of information depends on the relevance of that information to national security. In addition, the name by which the project that is involved goes determines the level of security for the information and that is why most of the police force that deals with matters of national security have a secured information system (Aviason & Guy, 2006)
Preview sample
Multi-Hop Wireless Networks Information Technology Coursework
8 pages (2264 words) , Download 0 , Coursework
Free
The frequencies that transmit data from one source to destination are exposed to Radio Frequency (RF) interface by nature from different sources. This frequency band is unlicensed hence the growing number of users which makes it overcrowded. The range of devices such as cordless phones, Bluetooth headsets, ‘WirelessUSB’ peripherals which operate in the 2.4GHz band is on the 802.11b/g networks.
Preview sample
Wireless Networks: Technology and Applications Information Technology Essay
7 pages (2198 words) , Download 0 , Essay
Free
Bluetooth was a technological idea conceived by Ericsson Mobile Communication in 1994, it is a wireless communication based on a radio system that enables devices to communicate in a short range. Other mobile device vendors such as Nokia, IBM, Toshiba, and Intel came up with a group known as Special Interest Group (SIG) (Erina & Francesco). 
Preview sample
Human Computer Interaction - Case of Apple Store Website Information Technology Case Study
6 pages (1767 words) , Download 0 , Case Study
Free
Apple store website is a consumer company, which deals with advertising, selling, and giving their consumers support concerning their products. The website gets its profits from marketing and selling hardware products that are in different forms but are mainly electronics. These products include iPod players, Mac computers, iPhone, and any other electronics.
Preview sample
Information Systems in Banking Information Technology Assignment
6 pages (1637 words) , Download 0 , Assignment
Free
Since its establishment in 1817, the bank and the government of Australia has become a partner in a number of roles such as supporting the local communities that are found in the country. As a major player in the banking industry in the country, Westpac Bank has fully accepted its responsibility in fulfilling its wider corporate social responsibilities in the country.
Preview sample
The Risks in a Web 2.0 World Information Technology Literature review
11 pages (3362 words) , Download 0 , Literature review
Free
This particular paper is being carried out to evaluate and present how the so-called benefits of Web 2.0 applications attract significant risks, as well as the vulnerabilities of the Web 2.0 environment. However, the paper does not delve into a technical discussion about Web 2.0 technologies or architectures.
Preview sample
Security in Computing Information Technology Assignment
6 pages (1665 words) , Download 0 , Assignment
Free
One of the aspects of consideration is eliminating the vulnerabilities of the computer system. An unauthorized individual, program, or computer system is in a better position to access information assets or resources. To control such there needs to be a robust information security system that has a level of integrity and confidentiality thus making data/information unavailable to illegitimate users.
Preview sample
Evaluation University of Western Sydney Online Library Website Information Technology Case Study
10 pages (2685 words) , Download 0 , Case Study
Free
In the actual evaluation, the website was visited and notes made about all the aspects that had been shortlisted. Another site of the same kind was evaluated using the same methodology and the results compared. The findings indicated that the site performs well and serves better. However, there was a need to make some changes to the site for it to serve students more efficiently.
Preview sample
Testing of the System User Interface Information Technology Case Study
22 pages (6445 words) , Case Study
Nobody downloaded yet
There are a lot of areas of the system testing that are incorporated to assess the system's best performance and error-free working and operations. In our system for MyPress Publishing Ltd, we have to deploy an effectively working and operational system that can manage and handle the Publishing tasks, human activities, and other associated activities.
Preview sample
Developing a Security Plan Information Technology Term Paper
15 pages (4072 words) , Download 0 , Term Paper
Free
Information security protects such information from any tampering or damages. Many organizations irrespective of their size gather and store a vast volume of information that is confidential only to them. The information could be regarding the organization’s employees, clients, research, products, or fiscal operations.
Preview sample
Technology Diffusion in a Software Organization Information Technology Assignment
14 pages (4229 words) , Download 0 , Assignment
Free
Usually, technology is related to the machination and automation of work based on established scientific principles to ease the burden of doing the work for economic and commercial gains. Recent technical developments, particularly the digital revolution, gave birth to Information Technology (IT) and Information Systems (IS).
Preview sample
The Role of the Command Line Interface in Modern Computing Operating Systems Information Technology Literature review
11 pages (3047 words) , Download 0 , Literature review
Free
Despite many terms used by scholars such as ‘text interface’ and ‘command screen,’ among other terms to describe the command-line interface (CLI), it is a user interface that involves typing of commands in a given computer operating system. It differs rather distinctively from the modern use of the mouse in performing commands.
Preview sample
Introduction to Computing - Actor Network and Assemblage Theory Information Technology Essay
6 pages (1626 words) , Download 0 , Essay
Free
Actor-Network Theory is a social type of theory developed in the 1980s by French scholars of Science and Technology Studies; Michel Callon, Bruno Latour, and John Law. ANT argues that for the existence of a network, it has to have both social and technical parts. These parts are the entities and are referred to as either actants or actors. Actants refer to either non-human or human actors.
Preview sample
Introduction to Computing - Building Information Systems Information Technology Essay
6 pages (2341 words) , Download 0 , Essay
Free
Building information systems is a very difficult task partly due to the exertion of ascertaining the intended users’ requirements, but majorly because of the complexity that arises from a large number of interactions between humans and machines. In modern computing, “every actant acts on or is acted upon by at least one other actant, in order to fulfill the aims of the assemblage”.
Preview sample
Ethical and Professional Issues for Computers and the Internet Information Technology Assignment
12 pages (3094 words) , Download 0 , Assignment
Free
Embracing Information Technology has resulted in a number of conflicting situations that necessitate the application of ethical principles and laws governing those situations. Privacy is a person’s right to maintain free space devoid of external interference. The latter aspect is not easy to implement owing to the fact that organizational needs often clash with private/ individual needs.
Preview sample
Mobile Apps and Applications: Emerging Technology Information Technology Term Paper
10 pages (2569 words) , Download 1 , Term Paper
Free
The basic and important benefit that is generated through mobile apps is that they have played a vital role in providing communication with minimum expenditure. This report explains the effects of mobile apps on society from an ethical perspective. Facts are stated that support the main concept of mobile apps as an emerging technology.
Preview sample
The Group of Technologies to Fulfill the Requirements of the Small Business Information Technology Term Paper
7 pages (2139 words) , Download 0 , Term Paper
Free
Numerous technological requirements are expected to be used to accomplish the requirements of the small business. Therefore, the report discusses some of the technologies that apply to a small business, and the recommendations are aimed at highlighting the group of technologies that can be used to fulfill the requirements of the small business.
Preview sample
Victimisation of Cybercrime in the United Arab Emirates Information Technology Case Study
13 pages (3704 words) , Download 0 , Case Study
Free
Information and communication technologies (ICTs) while has been providing a range of benefits to individuals, businesses, institutions, and governments it provides a platform on which opportunities for criminal activities are conducted. This research focuses on cyber victimization in the United Arab Emirates (UAE).
Preview sample
The Impact of Information Systems at Sultan Qaboos University Information Technology Term Paper
13 pages (4149 words) , Download 0 , Term Paper
Free
The higher learning instituting has been on a positive trajectory for a long time, and the author of the following paper seeks to determine and discuss how job performance, communication, and administrative performance have been influenced by the introduction of the integrated systems of information systems.
Preview sample
The Concept of Cloud Computing Information Technology Literature review
6 pages (1744 words) , Download 0 , Literature review
Free
Each organization should consider the various service and deployment models in order to approach cloud computing in an effective manner that will ensure optimum benefits. Businesses also ought to consider various factors as discussed above before choosing a service provider in order to ensure maximum benefits are derived from cloud computing.
Preview sample
Information Technology in the Business: Schneider National Information Technology Case Study
9 pages (2720 words) , Download 2 , Case Study
Free
Most business entities both small and large are on the verge of transforming their operations into digital based on the corresponding advantages of such systems. The sum total of implementation of such strategies is the encounter of management, organizational, and IT-related issues that are nearly impossible to avoid.  
Preview sample
MPLS Network Project for the Waljat College Faculties Information Technology Case Study
23 pages (6317 words) , Case Study
Nobody downloaded yet
Waljat College of Applied Sciences (WCAS) is an Oman technology college of higher learning that began in 2001 to prepare students for the modern and competitive business arena. The college offers international courses in Engineering, Information and Communication Technology (ICT), and business courses.
Preview sample
Effectiveness of Internet and Network Security Measures Information Technology Research Proposal
9 pages (2286 words) , Download 0 , Research Proposal
Free
A research design is highly dependent on the problem involved thus the focus is often on understanding the social phenomenon such as the perceived effectiveness of existing network security measures. Moreover, the research design is commonly based on the details of the problem, research objectives, and the target population.
Preview sample
Data Mining and How it Can Be Address Information Technology Assignment
14 pages (3682 words) , Download 0 , Assignment
Free
Data mining collects searches and analyzes large databases in order to identify the relationship and patterns within the large databases. A database refers to an organized set of information within a particular structure. The database contains several tables and the number of tables depends on the organization size.
Preview sample
High Availability Network for Orbital Health Care Information Technology Case Study
7 pages (2157 words) , Download 0 , Case Study
Free
The author of the paper will begin with the statement that a High Availability network is critical for Orbital Health Care. This is owed to the belief that such a form of network is secure and there support all forms of businesses that would require the use of voice, wireless, and other critical data applications.
Preview sample
2201 - 2250 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us