StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
University Website for Intern Tracking System Information Technology Coursework
7 pages (1998 words) , Download 1 , Coursework
Free
Management digitalization has become the driving force behind the current automation of the online streaming tracking system to come with greater benefits for every success-oriented organization (Bishop 112). Virtual communities are making it necessary for firms to pass and get immediate feedback via search engines which have ensured better management.
Preview sample
Factors Favoring Digital Marketing Information Technology Essay
10 pages (3071 words) , Download 2 , Essay
Free
The traditional media is struggling to stay in the race of competition by the emerging new trends of portable devices available to consumers in the market. Thus, the traditional media is now transformed because of the rise of social Sites leads to favorable competition in an area that is dominated by the use of mobile devices and tablets.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
System Identification and Security Categorization Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
In order to protect information and information system, it is essential to acquire information security program. The major concern of the VA's is to maintain a revolutionary information system and it's information system which is the basis of this paper. The major drawbacks such as intrusion, interruption, unauthorized access, exposure. 
Preview sample
Description of Web Applications and Standalone Application Information Technology Coursework
14 pages (3755 words) , Download 1 , Coursework
Free
When your core determination is to grasp numerous clients to have a relaxed sustained and stress-free organized application able to be retrieved from distant computers with diverse operating systems you should choose the web based systems. It takes much time to execute an online system but in reoccurrence, the application is stress-free to access and bear up with.
Preview sample
Causes of IT Failure Information Technology Literature review
12 pages (3725 words) , Download 0 , Literature review
Free
Moreover, it has been found that IT has come to have a significant influence on the business trends of the modern world since many individuals have come to rely on it to gain the latest information concerning new products that have developed in the market (Clemons, Reddi & Row, 1993).
Preview sample
Addiction to Social Networking Sites Information Technology Research Paper
14 pages (4198 words) , Download 1 , Research Paper
Free
In this modern-day society, young adults and teenagers are frequently identified to be much addicted towards accessing various sorts of SNSs, which results in posing a greater threat to them. With this concern, the proposed research study will emphasise raising greater awareness about the currently observable addiction of young people towards various SNSs.
Preview sample
Ethical Issues in Technology Information Technology Case Study
5 pages (1620 words) , Download 2 , Case Study
Free
Regardless of the uncountable number of merits that information technology has brought forward, a significant number of ethical issues have always been raised in the work environment. To be precise, the ever-advancing use of information technology such as the internet is a great concern for employers, employees.
Preview sample
Effect of Online Video Gaming on Social Development Information Technology Essay
7 pages (2098 words) , Download 1 , Essay
Free
Online video gaming has become a popular technological adoption in playing, a fact that has resulted in its illumination to determine its impact. On socialization, it has elicited immense debate, with opponents arguing that it leads to antisocial behaviors and encourages disengagement from social circles.
Preview sample
Helpdesks in the Modern Corporate World Information Technology Essay
6 pages (1493 words) , Download 1 , Essay
Free
The whole experience left me impressed with how I had been set up. First of all, the call went through directly, at the first attempt. Usually either the line is busy and just won’t go through at all, or the line is busy and you have to wait in a queue, listening to some music tune or advertisement. The option of a second language was an impressive feature as well.
Preview sample
How to Create a New Project for Dicom Information Technology Essay
3 pages (750 words) , Download 2 , Essay
If the project is created successfully or if there is an error, the user will be notified. Clicking "Choose File" button will allow the user to select a Dicom file from their local computer. Once a Dicom file has been selected the user needs to enter an existing project name in which they wish to upload the file to.
Preview sample
Usage of Computers and Computer Software in the Animal Adoption Industry Information Technology Essay
8 pages (2136 words) , Download 0 , Essay
Free
These animal shelters house many animals coming in and out of the facility making it extremely difficult to remember each animal by name. This is where computers and computer software’s come in because they make it easier to keep track of animals with the help of an assigned identification number.
Preview sample
Interaction and Usability Information Technology Report
10 pages (3915 words) , Download 1 , Report
Free
Buying and selling processes in real life do not involve any metaphors, so none were used in the design. To address the limited memory of the elderly users, the application closely relates to real-life buying/selling tasks. For the users unfamiliar with the technology it can be done through the application settings as well. The interface has labels next to each icon.
Preview sample
Pervasive Computing for Assisting Individuals With Autism Information Technology Assignment
7 pages (1983 words) , Download 1 , Assignment
Free
In order to obtain information about the target group and their needs, detailed contextual inquiries in the field of autism shall be conducted. The explorations include interviews with caregivers, parents, teachers who interact with the children, and therapists. The information-gathering process also includes participating in therapy sessions as well as meeting teams of therapists.
Preview sample
Intels Internal Innovation versus Microsofts External Innovation Information Technology Essay
6 pages (1658 words) , Download 1 , Essay
Free
It is imperative for both Intel and Microsoft to use the two sets of innovations in generating ideas. This is important as perfect products would be generated when internal ideas are merged with external resources. This will also expand the public image of both the companies as sociable and community caring.
Preview sample
Comparing the Arguments Within Social Networking Papers Information Technology Research Paper
6 pages (1813 words) , Download 1 , Research Paper
Free
The first paper describes the theoretical and mathematical work to produce a software application to implement a call-rating and feedback-driven application for producing social networking recommendations - a key business marketing tool.
Preview sample
High-Speed Broadband Information Technology Essay
5 pages (1597 words) , Download 1 , Essay
Free
Generally, the country has been benefiting a lot from online business as more businesses start to make sales online. By the year 2009, Australia was deriving more than $123 billion from online business, which was an upsurge of about $42 billion from the previous study (In Taylor and In Schejter, 2013, p.79).
Preview sample
Hillman Group, Avnet and Quaker Chemical Information Technology Assignment
7 pages (2013 words) , Download 2 , Assignment
Free
This assignment also focuses on the strategies companies can use to overcome challenges affecting BI implementation, in which ways did the salespeople benefit from the new implementations and how important was their buy-into the success of these projects. It discusses alternative strategies for companies to foster the adoption of new systems like these.
Preview sample
Principles and Practice of Cloud Computing Information Technology Research Paper
5 pages (1250 words) , Download 1 , Research Paper
Free
Information technology is often applied in virtually all the organizations, be they profit or non-profit. It works well in a well-designed framework called IT infrastructure, which includes computer networks, database management, computers, information centres and systems that regulate data transmission.
Preview sample
How Hacking and Cyber-Attacks Compromise on Sensitive Information Information Technology Annotated Bibliography
10 pages (2600 words) , Download 1 , Annotated Bibliography
Free
Business security planning in the 21st century has become a critical issue ranging from small businesses to multi-million dollar businesses. External threats of data theft as well as hacking into a company’s security systems have become as real as a physical burglary in companies’ premises. Essentially, hacking is considered to be a cybercrime all over the world.
Preview sample
Market Entry of Lifekey Company Information Technology Report
5 pages (1496 words) , Download 0 , Report
Free
Lifekey is formed with the notion that in today’s busy world, everybody is under pressure due to a multiplicity of demands of life and certain difficult situations that are experienced during the daily course of business. Such situations make people lose their healthy mindsets and this warrants intervention in the form of professional help.
Preview sample
Exam Decision Support System and Business Intelligence Information Technology Coursework
5 pages (1543 words) , Download 1 , Coursework
Free
Hence, a data warehouse that is subject-oriented provides a comprehensive view of an organization. The integrated aspect of data warehouses allows them to put data from various sources inconsistent format and in accomplishing this, data warehouses first deal with naming conflicts and discrepancies in measuring units.
Preview sample
Online Human Behavior and Power Law Network Information Technology Assignment
14 pages (3698 words) , Download 1 , Assignment
Free
In systems theory, a Holon is something that has identity and integrity which is part of a larger system. It is simply a subsystem of a large system. Holons are independent units and handle contingencies without inquiry from the main large system. They are able to withstand disturbances. Examples of holons includes individual holons, social holons, artifacts and heaps. (Jackson, 2000)
Preview sample
Whether or Not the Internet Should Be Censured Information Technology Coursework
15 pages (3904 words) , Download 1 , Coursework
Free
A comparison of the advantages of the use of CCTV technology in monitoring activities within an organisation shows that although the use of CCTV cameras can lead to a reduction of crime within an organisation, the use of CCTV system, however, is an invasion on the individual right to privacy and on this ground it is unethical.
Preview sample
BitTorrent Communication Information Technology Essay
8 pages (2310 words) , Download 1 , Essay
Free
Revision3 Internet Television Network allows its viewers to watch a number of shows directly using their website. However, in order reduce their bandwidth expenditures, they have developed and maintained their own BitTorrent tracker. In this scenario, their viewers can access and download new episodes by making use of BitTorrent.
Preview sample
The Implications and Opportunities for Digital Marketers Information Technology Coursework
12 pages (3444 words) , Download 1 , Coursework
Free
This coursework also describes the reasons for which, the maximum extent of the entrepreneurs prefer the utilization of portable devices as compared to personal computers and laptops. Moreover, the ways by which, the transition from personal computers to portable devices affected digital marketers or individuals of this age. 
Preview sample
Analysis of Transition to IPV6 Information Technology Essay
10 pages (2663 words) , Download 1 , Essay
Free
ISPs and firms should adopt the version 6 network while upgrading their internet capabilities for compatibility measures. Even though problems arising from the migration are inevitable due to the lack of direct communication between the two versions, various mechanisms have been developed to ensure a seamless deployment of IPv6.
Preview sample
Immoral Activities in Video Games Information Technology Case Study
6 pages (1750 words) , Download 1 , Case Study
Free
The author of the following paper states that popular media today considers the influence of video games on children as an important subject to draw the attention of readers. Though the nature of video games has undergone a sea change over these years, the nature of allegations has not changed accordingly. 
Preview sample
The Efficiency of Clustering Algorithms for Mining Large Data Bases Information Technology Coursework
7 pages (2376 words) , Download 2 , Coursework
Free
Only Pro-CLARA give the highest probability that the prediction provided is correct. Pro-LEADER algorithm is not efficient when it comes to handling large data sets as shown on the DS4 data set. To complement these shortcomings, this study proposes the Pro-PAM algorithm to generate the maximal set of medoids.
Preview sample
Project Managers in Contracts Information Technology Coursework
14 pages (3908 words) , Download 0 , Coursework
Free
The paper "Project Managers in Contracts" is an outstanding example of information technology coursework. Contract managers in the Information Technology fields have huge tasks when it comes to procurement processes. This paper illuminates some of the functions including checking procurement processes, drafting documents in tendering processes, and assessing suppliers.
Preview sample
Why Information System Is Extremely Crucial for Hewlett Packard Information Technology Case Study
8 pages (2225 words) , Download 1 , Case Study
Free
The paper “Why Information System Is Extremely Crucial for Hewlett Packard” is a breathtaking example of an information technology case study. The chosen company is Hewlett-Packard (HP), which is a global provider of products that include personal computing products, printing and imaging products, services, software, technologies, and solutions to individual consumers.
Preview sample
Linux Server Environment Information Technology Case Study
5 pages (1561 words) , Download 1 , Case Study
Free
Linux server environment can be relatively unfriendly to gamers because most new games are commercial hence not possible to reproduce in a Linux environment. The introduction of Linux environment in a corporate world is also not easy since most workers are acquainted with the Windows environment and Microsoft programs (Bradford & Mauget, 2002).
Preview sample
The Progress of TV Shows Information Technology Case Study
7 pages (2013 words) , Download 1 , Case Study
Free
TV nowadays is the food and water of the generation at the same time it is the bread and butter of many. In short, TV holds a stable and strong position in all the societies of the world no matter what their culture exhibits. In the initial times when TV was invented and progressed a little, there were only a few channels showing programs.
Preview sample
Practical Indexing the ATED in Library Information Technology Assignment
8 pages (2000 words) , Download 2 , Assignment
Free
This study uses five articles for sample demonstration of the key concepts and terms of indexing in ATED (Macgregor & McCulloch, 2006). The significance of the indexing is to assist the library users in performing searches for library resources especially in the massive supply of library materials.
Preview sample
The History of Information Security Information Technology Term Paper
5 pages (1436 words) , Download 2 , Term Paper
Free
The history of information security stretches back to ancient periods, and it began with the creation of a bureaucracy in the administration competition. Aspects like interference of the encrypted messages drew much attention during the First World War, whereas other important aspects have remained considerably not covered.
Preview sample
Outputs in a Control Circuit Information Technology Assignment
4 pages (1051 words) , Download 0 , Assignment
Free
Whenever the pushbutton is un-actuated, there will be no power sent towards the X1 PLC input. The shown program displays an open x1 contact arranged in series with a Y1 coil. There would be no power directed to the Y1 coil hence the output of PLC Y1 will remain de-energized, and the lamp indicator that is linked to it would remain dark. 
Preview sample
Adaption of Ontologies in Business Process Management Information Technology Essay
8 pages (2259 words) , Download 1 , Essay
Free
Take on cloud-based services quicker: If anyone is willing to instantly innovate their processes by including a Software as a Service (SaaS) program or a professional Application Program Interface (API) from a cloud service provider? With the suitable SOA system available, both internal and external solutions are utilized the similar way at the process-step stage.
Preview sample
The Role of Information Security Policy Information Technology Coursework
5 pages (1455 words) , Download 1 , Coursework
Free
Information security is vital to a company since it stores most of its information in large servers, which have the capacity of storing large amounts of data. These servers are if left unprotected, can be targeted by hackers, or rival companies whose aim is to cripple the organization (Kenneth & Claudia, 2014).
Preview sample
Operational Research and Information Management Information Technology Case Study
9 pages (2525 words) , Download 1 , Case Study
Free
In position fixing, celestial navigation is employed through the use of sights and angular measurements instead of depending on estimated calculations (Grewal, Weill and Angus, 2007). These angular measurements are made between the main celestial bodies, which are the sun, moon, planet and the star and any visible horizon (Agnew and Larson, 2007). 
Preview sample
Tricks of the App WeChat Information Technology Article
6 pages (1560 words) , Download 1 , Article
Free
Walkie-talkie: Apart from chatting by text, one can also communicate in walkie-talkie mode by sending voice messages. The person needs to go to the recipient’s profile and click on the “plus” icon then select the walkie-talkie feature. If the other person joins the chat, one can hold the central wheel down and talk, one releasing the wheel the app automatically sends the message.
Preview sample
Business Information System in Ark Royal College Information Technology Coursework
9 pages (2389 words) , Download 0 , Coursework
Free
The paper “Business Information System in Ark Royal College” is an affecting example of information technology coursework. This report focuses on recognizing and analyzing the problems currently experienced by Ark Royal College. Based on the case study provided, it can be apparently observed that the college faced various organizational problems that encompass ineffective communication.
Preview sample
Tandem of GlobShop and ISS - Globalization of Software Development Information Technology Case Study
13 pages (3250 words) , Download 2 , Case Study
Free
GlobShop operates in the travel-retail industry across Asia, Australia, North America, and Europe. Headquarter of the company is located in Boston, the US. Since it operates in the travel-retail industry, any changes in the air travel flow of visitors and the consequent economic uncertainties have a significant impact on its performance.
Preview sample
Software Risk Identification Information Technology Book Report/Review
7 pages (1750 words) , Download 3 , Book Report/Review
Free
This model proposes the process of gathering requirement gathering is technical and deserves thorough consideration. It adds that the parties involved in this process should ensure effective communication at all the level. Communication should be made perfect both within the firm and also with the customer 
Preview sample
Risk Management Program for Data Mart Information Technology Capstone Project
44 pages (10268 words) , Download 5 , Capstone Project
Organizational risk management refers to risk management carried out at a strategic level (Lam, 2003). Concepts regarding risk management will often be discussed in the context of Technical Risk Management practice that provides a description of the activities and processes which are mandatory for risk management at a project level.
Preview sample
How Search Query Can Be Optimized to Guarantee More Customer Satisfaction Information Technology Literature review
8 pages (2155 words) , Download 1 , Literature review
Free
Coll Rank, Quality Utility Model and Metaphor system have been developed to help users in query formulation while interacting with a search engine. In essence, they help in the creation or recommendation of queries with the highest degree of relevance to the user. In turn, these can help them reformulate high utility queries or obtain alternative queries for them.
Preview sample
Storage System, Servers and Desktops, Client Operating System, and Network Security Information Technology Assignment
9 pages (2496 words) , Download 1 , Assignment
Free
An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. 3. What are the main differences between Windows, UNIX, and Linux?
Preview sample
Review of the Popular Association-Mining Algorithms - Apriori Information Technology Case Study
10 pages (2793 words) , Download 2 , Case Study
Free
Nonlinear mapping is used in the transformation of the available data to a higher dimension which is crucial in the location of a hyperplane that separates data from different classes (Christianini & Shawe 2000). In so doing, it comes up with the best function for classifying training data comprising of two classes.
Preview sample
Voter Security Authentication for Online Voting Information Technology Essay
7 pages (2030 words) , Download 1 , Essay
Free
Security design in the internet voting system is very important. Suitable methodologies including internal and third-party assessment of risk management competency, incorporating test process documentation, and compliance with the documentation can be applied. Responsible teams in the development and deployment of internet voting must have superior systems.  
Preview sample
Animation principle, cognitive, instructional design, learning theory Information Technology Research Proposal
7 pages (2050 words) , Download 1 , Research Proposal
Free
However the capacity and memory of human mind is limited on how many information it can process within a given time. The introduction of high computing information for instructional designs improves the cognitive theories. The use of animation principle
Preview sample
How ICT Technology Supports Individuals, Business and Legal Data Information Technology Case Study
6 pages (1801 words) , Download 0 , Case Study
Free
The paper “How ICT Technology Supports Individuals, Business and Legal Data” is an engrossing example of an information technology case study. This Overview sets out to do three things. Firstly, illustrate the scope of hardware and software currently in use and the technological advances taking place.
Preview sample
The Dilemma of Internet-Related Privacy Information Technology Coursework
5 pages (1530 words) , Download 0 , Coursework
Free
Ethical principles of confidentiality, autonomy and non-maleficence oblige all stakeholders to secure the information of medical records. It is analyzed that how three principles are used for personal and medical-related information of individuals over the internet. Stakeholders as well as federal governments can take action to hinder the individuals from illegal access to information over the internet.
Preview sample
2251 - 2300 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us