StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Stack and Buffer Attacks in Operating Systems Information Technology Essay
5 pages (1408 words) , Download 1 , Essay
Free
A buffer attack is a programming error that attempts to store data beyond the required maximum storage of a fixed-size buffer. Stack and buffer attacks occur when an application puts more data into a memory address such that it cannot handle. The results of buffer attacks may cause corruption in the neighboring data on the stack.
Preview sample
Justification for New Hardware for Windows 8,1 Information Technology Research Proposal
7 pages (1842 words) , Download 1 , Research Proposal
Free
The most efficient method for a company to migrate to Windows 8.1 is through desktop virtualization. It is faster and cheaper than upgrading from a disk. This is because this method needs only one server to be upgraded to Windows 8.1 and the VM endpoints will run on an image generated by the server. Enterprise mobility will also be addressed through desktop virtualization.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Business Data Communication and Networking Information Technology Coursework
5 pages (1602 words) , Download 1 , Coursework
Free
WAN Star network layout by its nature becomes the most common computer network design. The star network design consists of one central switch, hub, or computer. The central switch usually functions as a conduit to transmit messages. It entails a central node; all the other nodes are always connected to the central node.
Preview sample
The Execution of Different IT Tasks Information Technology Case Study
10 pages (2675 words) , Download 1 , Case Study
Free
The internship period involved diverse activities and responsibilities. These mainly included dealing with different issues in computers and IT, dealing with clients and staff pertaining to IT-related issues, and performing administrative tasks related to IT. Different challenges were experienced in the course of the internship.
Preview sample
GSM Phone Security Information Technology Coursework
10 pages (2875 words) , Download 0 , Coursework
Free
Recently, there have been cases reported of eavesdropping on cell conversations. These stories have made it to the news as a result of research that was published in late 2009. The research paper showed that it was possible for one to crack the encryption on a GSM cell phone. Today, GSM technology is the most popular as well as the most deployed.
Preview sample
Security and Implementation Concerns of Cloud Computing Infrastructure Information Technology Coursework
8 pages (2094 words) , Download 1 , Coursework
Free
These days, all business organizations are aimed at formulating a secure information technology environment. On the other hand, every business has severe concerns related to its data security and privacy. Hence in order to maintain data safely and reliably, they must have to implement a secure cloud computing environment.
Preview sample
Types of Network and Various Devices Information Technology Case Study
9 pages (2961 words) , Download 1 , Case Study
Free
According to the LAN network, usually covers a short distance or limited area that may be an office, school, or residential area. However, sometimes LAN would consist of different rooms in a particular building or could be of various houses or buildings. Apart from operating in a limited area, LAN is usually privately owned, run by a single person.
Preview sample
Fundamental Advances in Video Gaming Technology Information Technology Case Study
8 pages (2296 words) , Download 1 , Case Study
Free
In addition to increasing sophistication and graphical displays, these improvements are largely characterized by advances in artificial intelligence. This report will explore fundamental advances in video gaming technology with respect to three fundamental areas that contribute to the present state of electronic simulations.
Preview sample
Desktop Migration Proposal Information Technology Article
7 pages (1983 words) , Download 1 , Article
Free
The method is suitable because it supports both the stand-alone and network environment migrations. According to Lecrenski, this method suits the variants, which comprise of migration to remote systems. The method is favourable because it replicates the initial configuration into the targeted environment.
Preview sample
Motion Planning Knowledge Information Technology Case Study
6 pages (1719 words) , Download 1 , Case Study
Free
It's pointed out that the theory in the application of robots outpaces the practical implementation. The practical limitations are robots must deal with huge amounts of unclear sensor data, doubt, real-time demands, nonlinear dynamic effects, undefined models, and unusual objective constraints and functions.
Preview sample
Computer Interface Technology Information Technology Assignment
29 pages (7925 words) , Download 1 , Assignment
This assignment also the “Man-Machine interaction or interfacing” that is known as Human-Computer Interaction, the study of the interaction between the human and the computers that are known as Human-Computer Interaction and the use of Computer keyboards, PDA's, cell phones and other handheld devices has been widely claimed in the media to lead a variety of stress injuries. 
Preview sample
Internet Needs More Rules and Regulations Information Technology Essay
5 pages (1356 words) , Download 1 , Essay
Free
The Internet is simply a connection between various computer networks that facilitate the transfer of information. The Internet has become a world-wide global tool of communication, business, education, security, and research. Internet use has risen recently over the years. There are approximately forty million internet users in the United States of America.  
Preview sample
The Security Issues that are Faced by a Particular Organization Information Technology Case Study
8 pages (2281 words) , Download 1 , Case Study
Free
The author points out that networking also helps in the sharing of the resources in an organization. Some of the resources that could be shared through the network include files, printers, and other computer resources. Networking also enables an organization to conduct its operations over the internet.
Preview sample
Massively Multiplayer Online Role Playing Games Information Technology Essay
6 pages (1628 words) , Download 1 , Essay
Free
Although some effects are positive it has been found that a majority of people who partake encounter negative social outcomes. With the availability of fast and almost free internet in the present world, MMORPG’S experienced sharp growth in its fan base. This leaves the normal real-life games and even real-life relations in serious jeopardy.
Preview sample
Difficulties in Maintaining Order and Law in Cyber-Space Information Technology Essay
6 pages (1807 words) , Download 1 , Essay
Free
The use of highly coded databases in institutions has also enabled data prevention from probable criminals. Through site monitoring, it is now possible to detect the spread of hate in social media thereby subjection of the law. Currently, a wide range of technologies exists in support of justice systems to increase the efficiency in justice administration.
Preview sample
The Life Cycle Analysis of Cell Phones Information Technology Case Study
9 pages (2396 words) , Download 1 , Case Study
Free
Cell phones have a varied history but their increased use can be traced to the WWII where radio telephony links operating in the frequency range of 30 to 40 mega hertz were used by the military and police. They were bulky devices, ran on high power and not appropriately portable as is the case today.
Preview sample
The Opportunities and Limitations of Deploying an Open Source System Information Technology Essay
8 pages (2235 words) , Download 1 , Essay
Free
Open Source Systems assist in reducing organizational costs related to licensing and maintenance. It is also instrumental in ensuring competitive advantage through integrating superior technology with the products of a business; without incurring a lot of expenses associated with research, marketing and product development.
Preview sample
Information Systems in Transport and Logistics Information Technology Term Paper
14 pages (3887 words) , Download 0 , Term Paper
Free
Those systems applied by those companies involved in organizing transport operations that involve more than one mode of transport or participation of one or more transport companies. These systems may be referred to as transport chain management systems or supply chain management system in regard to their scope of operations and the functions carried out.
Preview sample
DynastyMotors Business Information Technology Case Study
8 pages (2238 words) , Download 0 , Case Study
Free
The paper "DynastyMotors Business " is an outstanding example of an information technology case study. Dynasty motors is a company that sells motor vehicles and motor bicycles all over the Middle East. It is also among the top five motor industries in the Middle East. It mostly deals with the manufacture of motor vehicles and bicycles, motor vehicle assembly and marketing.
Preview sample
Mobile Enterprise Information Technology Research Paper
10 pages (2876 words) , Download 1 , Research Paper
Free
Mobilization is one such technique adopted by businesses and it refers to the incorporation of the use of mobile device technology such as cellular phones, tablets or PDAs in the day to day running and operation of its core operation functions. Mobilization has many benefits. For instance, it opens foreign markets to prospective investors and facilitates the flow of information and ideas within and outside of organizations. 
Preview sample
Designing a Digital Tool Information Technology Report
4 pages (1112 words) , Download 0 , Report
Free
The application will be designed in such a way that it will provide information about the available hotels as well as the packages offered in each hotel at any location worldwide. This will enable the engaged couples to make an informed destination about the travel destination that will suit their preference through visiting the web site. 
Preview sample
Whats in IT For Me Information Technology Essay
6 pages (1588 words) , Download 1 , Essay
Free
Technology has helped to come with new production processes that would have otherwise taken a lot of time and specialization to realize. In addition, the development of technology has created a number of business opportunities that businesses should capitalize on. The use of computers has proved to be cheap, efficient, and time-saving (Reynolds 43).
Preview sample
The Main Objective for Maritime and Coastguard Agency Information Technology Case Study
8 pages (2091 words) , Download 1 , Case Study
Free
The main objective of MCA is to be the maritime safety organization in the world. To achieve this objective efficiency in communication, data storage and access, system and data delivery to customers and efficient management are paramount. Business over the years has acquired new IT applications and systems to improve business delivery.
Preview sample
Global Finance Inc Security Policy Information Technology Case Study
10 pages (2738 words) , Download 2 , Case Study
Free
The increasing need for mobility and where employees want to use mobile devices and are willing to bring their own introduces an additional security risk. Wi-Fi networks willing permit this flexibility but security over the networks is a source of concern. The company wishes to offer its products and services in the online framework and is worried about cloud security and customer database.
Preview sample
The Dynamics of Fan Culture in YouTube Information Technology Term Paper
7 pages (2193 words) , Download 1 , Term Paper
Free
A cursory look at the literature reveals that since that time and before a wealth of literature has sprung up exploring various aspects of the YouTube phenomenon, the participation of users in content generated, viewed, liked and made favorites by users, the general interactivity between YouTube content and its audience.
Preview sample
The Effects of Information Technology on the Supply Chain Management Information Technology Case Study
7 pages (2267 words) , Download 3 , Case Study
Free
E-business supported supply chain management is the future of logistics and a current trend with some major corporations. The application of e-business in the supply chains is allied, but not limited to internet use. There are prominent case examples that illustrate that there are potential benefits due to this.
Preview sample
How Smartphones Have Affected Our Consumption and Identities Information Technology Research Paper
20 pages (5000 words) , Download 5 , Research Paper
Free
The author states that smartphones have fairly impacted our identities. Social media penetration in the everyday life of people has greatly enhanced on account of huge smartphone consumption. It allows people to interact while they are on the go. Not only in the field of social media, have smartphones greatly impacted the educational field as well.
Preview sample
The Working of Bitcoins Information Technology Essay
7 pages (1925 words) , Download 2 , Essay
Free
The future of Bitcoin use in business and personal transactions are uncertain though the currency holds the potential to uplift the lives of people globally if adopted by all nations. The adoption would lower the barriers of trade and create a common international market whereby individuals would trade without the need to exchange currency.
Preview sample
Security Plan for Riordan Manufacturing Information Technology Case Study
7 pages (1822 words) , Download 1 , Case Study
Free
The author states that Riordan is faced with specific security issues relative to network, data, and Web security. These issues are attributable to the recent Sarbanes-Oxley requirements. Compliance with these requirements is complex. Documentation and testing of a company’s internal controls are required.
Preview sample
Local Area Networking Technologies Information Technology Assignment
12 pages (3228 words) , Download 1 , Assignment
Free
This project entails about installing a local area network infrastructure for the stadium, in order to support the lifestyle of sharing rich content among friends using smartphones as well as to counteract the closed captioning connectivity problem, the network connectivity will also reduce the areas covered by an access point when guests try to access the internet.
Preview sample
The Growth in Internet Use Has Affected Cultures around the World Leading to Westernised Homogenous World Culture Information Technology Essay
8 pages (2361 words) , Download 1 , Essay
Free
Internet connection realizes by Transmission Control Protocol / Internet Protocol which is the most momentous computer networking technology, computer language which assists people with the connection. The Internet started to exist in the 1960s in the USA. It was invented to connect scientist and named as U.S. Department of Defense network. 
Preview sample
Some Novels in Consumer Electronics and Software Information Technology Article
14 pages (3500 words) , Download 2 , Article
Free
The simultaneous launch of the two Android phones HTC One (M8) and Samsung Galaxy S5 has created quite a buzz as these are touted to be the most powerful at present. Each has its own special features with both phones supporting quad-core Qualcomm Snapdragon 801 processors which provides faster 4G LTE access, Wi-fi access, and image. processing.
Preview sample
Main Features of Big Data Information Technology Research Proposal
10 pages (2994 words) , Download 3 , Research Proposal
Free
Presently, multiple sources are accountable for generating big data in an immense manner in terms of volume. In this respect, big data might be used with the intention of deriving meaningful value or understanding through effective analytical skills and processing power. The management of business organizations with the aim of making better decisions uses big data.
Preview sample
WEP KEY and Its Vulnerabilities Information Technology Essay
5 pages (1318 words) , Download 1 , Essay
Free
Analysis of these security vulnerabilities calls for the need to safeguard the network against unauthorized access and cyber attacks proactively. Security mechanisms employed to safeguard networks against attacks include Wired Equivalent Privacy, 802.11i (WPA), and WI-FI protected Access (WPA).
Preview sample
Undeniable Merits and Limitations of Social Networks Information Technology Essay
5 pages (1533 words) , Download 0 , Essay
Free
Human beings have progressed and advanced as a social kind and have subsequently established an extremely refined social implementation, signaling, and execution mechanism that compensates and impose-compound forms of cooperative conducts. Evidence of human social character is evident in their ancestors as they used to live in groups.
Preview sample
Internet Impact on Culture Information Technology Report
6 pages (1681 words) , Download 1 , Report
Free
Now people use the internet for a variety of purposes. Like every technology, the internet is also just a technology and it depends on people how they make use of this technology for the betterment of their society and people. This technology can be used by people for positive purposes as well as negative purposes.
Preview sample
Development, Applications, and Future Trends of Telematics Systems Information Technology Assignment
18 pages (4500 words) , Download 2 , Assignment
Free
The effective use of the right system can help in significant improvements in the fleet security, productivity, and efficiency; this can help to reduce fleet mileage, operational costs and the fuel consumption. The improved efficiency can lead to an increase in profitability. The modern telematics is more complex and sophisticated.
Preview sample
Privacy vs Protection of Assets, Issues of Biometric Technologies in Organizations Information Technology Essay
5 pages (1402 words) , Download 1 , Essay
Free
It is clear that one cannot overlook the events of September eleventh have impelled an expanded action of private and open enthusiasm toward security and particularly, biometrics. Indeed, it is profoundly likely most individuals might be ready to relinquish some level of protection for insurance taking after those terrorist demonstrations.
Preview sample
Facebook and MySpace - Secrets of Popularity Information Technology Coursework
4 pages (1000 words) , Download 0 , Coursework
Free
There has been a widespread acceptance among children and particularly teenagers for the social networking sites as these sites provide them with unique chances to present themselves to the world,  build a group of acquaintances and friends, acquire knowledge and manage privacy. What it was that Facebook had and SixDegrees did not?
Preview sample
SubHub Requirement Specification Information Technology Report
5 pages (1363 words) , Download 1 , Report
Free
In a bid to search for knowledge and the reliability of the teacher, a new system called SubHub is proposed by the teacher. This system is aimed at meeting certain goals and objectives. However, in any kind of software development undertaking, user requirements are always very vital as they dictate the final system functionality.
Preview sample
Introduction to IT Security Management Information Technology Literature review
14 pages (3822 words) , Download 1 , Literature review
Free
Risk analysis is not a concept exclusive to the healthcare industry or the Security Rule. Risk analysis is performed using different methods and scopes. The risk analysis scope that the Security Rule requires is the potential risks and vulnerabilities to the confidentiality, availability and integrity of all the electronic storage media that a covered entity creates, receives, maintains, or transmits.
Preview sample
Evolution of Information Management Information Technology Report
5 pages (1502 words) , Download 1 , Report
Storage of information has been evolving to ensure the utmost protection of the same. It is through this that the current volumes of information are available in a redundant manner. The stored information can turn out to be useful for the people who understand it, while for the people who do not find any need for it.
Preview sample
Techniques for Dynamic Analysis for Understanding the Operation of Executables Information Technology Coursework
6 pages (1834 words) , Download 0 , Coursework
Free
Understanding the operation of executables is abridged when a blend of techniques for dynamic analysis is employed. Effective dynamic analysis necessitates that the execution traces be produced by executing states that are representative of the typical usage of the system. This paper provides a review of the techniques used to perform malware analysis on executables.
Preview sample
Computer Sciences and Information Technology Information Technology Assignment
12 pages (3167 words) , Download 1 , Assignment
Free
This assignment also focuses on what Technology Analysis is, describes and list the required activities for BPA, BPI, and BPR, what Activity Elimination is, what the objectives of Business Process Analysis Techniques are, what Outcome Analysis in BPR is and explains why Requirements Gathering using different techniques is important. 
Preview sample
Success of Different Traceability Tools Information Technology Research Proposal
8 pages (2171 words) , Download 1 , Research Proposal
Free
The concept of traceability remains an essential component for all projects undertaken in software development. The identification of the various relationships and effects of attributes, upon others within the same project, remains essential in successfully implementing a software development project.
Preview sample
Technological Innovations: Google Glass and iPads Information Technology Report
4 pages (1119 words) , Download 0 , Report
Free
The use of print media has been decreasing at an alarming rate. Magazines and newspapers that continually have to struggle to develop innovative ways through which they will be able to keep their subscription numbers steady or even cause them to grow are now regarding the iPad as the one technological innovation that will help them in the attainment of this objective.
Preview sample
How the Internet Has Changed the Way People Shop Information Technology Case Study
7 pages (2174 words) , Download 1 , Case Study
Free
Billions of people around the world are using the internet to carry out their daily activities; at the workplace, in school, at home and even when ‘on the go’. Online technologies have changed the way people communicate and share information. This has made the internet an integral part of our lives that we cannot live comfortably without.
Preview sample
Managing a Computer Security Incident Response Team Information Technology Research Paper
13 pages (3737 words) , Download 0 , Research Paper
Free
Therefore, the way forward is to take measures to mitigate the risk of ‘internal’ attacks.  The first principle is to indoctrinate the enterprise’s employees in Information Security (IS) being about people rather than hardware and software.  Employees must therefore always think about IS when performing their daily tasks.
Preview sample
The Impact That Web 2.0 Has on Political Participation Information Technology Essay
8 pages (2468 words) , Download 2 , Essay
Free
In some cases, the activities have a positive impact on political participation. For instance, the use of Web 2.0 tools such as ‘smart vote’ that provide voting advice and can lead to the user to vote for the recommended candidate. Furthermore, online activities can in certain cases impose political pressure e.g. the petition against censorship on the Internet in Germany.
Preview sample
Do Video Games Affect the Players Perception of Violence Information Technology Case Study
10 pages (2849 words) , Download 0 , Case Study
Free
Video games have turned into an integral part of peoples’ daily lives. Video games today have turned into the mainstream thing. Studies have revealed that playing violent games, and in particular, first-person shooter video games, have harmful effects on emotions, cognitions, and behavior, for instance, a decrease in prosocial behavior and empathy and a rise in aggression. 
Preview sample
2201 - 2250 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us