StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Emerging Technology and Innovation Information Technology Coursework
9 pages (2662 words) , Download 2 , Coursework
Free
Many companies are left with no other choice other than to innovate owing to the hypercompetitive global economy. The element of innovation cannot be overstated as it is risky and complex at the same time. This is quite evident as many innovations will always fail numerous times before they are adopted by top-level management. 
Preview sample
Open Stack System and Cloud Computing Information Technology Coursework
20 pages (5192 words) , Download 1 , Coursework
Free
The obstacles in communication associated with the system diagram are demonstrated by the ‘Cloud’ symbol. Cloud computing utilizes the inaccessible services to handle customer’s data, software, and working out for the requirements and mitigates the user in managing these prerequisites (O'Brien, J., Marakas, G., 2010).
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Cloud Storage and Bad Model in Terms of Security and Privacy Information Technology Coursework
10 pages (3099 words) , Download 1 , Coursework
Free
Cloud storage is a component of cloud computing without which cloud computing cannot be of any importance (Coyne, Gopalakrishnan, and Sing 2014). Therefore, it is a service model whereby data are remotely maintained, managed, backed up, and accessed via a network as is shown in figure 1 below (Nelson, Joos and Wolf 2011). 
Preview sample
Development of Student Collaboration and Communication Platform Information Technology Literature review
16 pages (5418 words) , Download 1 , Literature review
Free
In fact, the use of e-collaboration and e-communication technologies for work is commonplace today. They are becoming an integral part of people’s lives, at work, and at home (Kock, 2009).  Nowadays, for collaboration and communication, web-based tools are now extensively employed by both companies and individuals.
Preview sample
Efficiency between Tablet and Laptop Information Technology Research Proposal
8 pages (2398 words) , Download 1 , Research Proposal
Free
The education sector has been one of the beneficiaries of technological advancement with special attention paid on the gadget that enhances communication among students and their lecturers.  In this article, the advantages and disadvantages of both will be considered with special attention paid on the importance of gadgets to people in a university setting.
Preview sample
Google Driverless Car Information Technology Essay
6 pages (1715 words) , Download 1 , Essay
Free
The car is designed to steer up automatically on the identification of any obstacle on road. It is also planned to be able to regulate the speed and accelerate itself in accordance with its position on the road. To put it simply, the Google driverless car will be an electric car that can stop and go, obeying the traffic rules without the need for manual control. 
Preview sample
Human-Computer Interaction Information Technology Case Study
8 pages (2230 words) , Download 0 , Case Study
Free
In this increasingly competitive corporate world, it is important for firms to enhance their online presence. This is possible through the development of company websites in accordance with the human-computer interaction principles. Nevertheless, the success of a website depends on the appropriateness of its features.
Preview sample
Networking Essential Plan for Coal Corporation Information Technology Report
10 pages (2838 words) , Download 0 , Report
Free
In the network media, this plan has proposed the use of Radio Frequency wireless network media to facilitate the communication between the CBD office and the site. This was also facilitated by the fact that the company could not dig within the town. The subnet of the network and the IP address for every system was provided as was shown.
Preview sample
Understanding Data Communications Information Technology Assignment
8 pages (2161 words) , Download 1 , Assignment
Free
The securing of the company's wireless network will protect the company from unwanted security concerns and will control the individuals who can access the wireless network. Depending on the functions of each channel allocation, the company would like to exclude the other channels from access this network, therefore, security will be necessary.
Preview sample
The Technician's Basic Set up Guide for the Cisco Linksys e2000 Router Information Technology Assignment
8 pages (2315 words) , Download 1 , Assignment
Free
Network access translation or NAT is a security measure or setting for the network which is done on the router or firewall. What it does is set the user's systems apart from other systems not included in their network. It does this by setting the user's systems as an “inside” network while other systems are set at “outside” networks.
Preview sample
Business Systems Analysis and Design Information Technology Report
7 pages (1870 words) , Download 1 , Report
Free
During the development of the system, the different forms of maintenance had to be taken into consideration. The maintenance of the system has to start immediately it is deployed to the client. Adaptive maintenance has to be carried to make sure the system meets the client’s needs. This will also help in making it able to operate in the existing environment.
Preview sample
Website Design for Interactive Environment Information Technology Assignment
8 pages (2204 words) , Download 1 , Assignment
Free
The design for the children's medical center will be provided in two languages and will contain extensive and useful information that meets the purpose of the user. This will be to accommodate other communities living in the region that the hospital is located. The design of the site also needs to be simple and straight forward containing all the important contents and online services.
Preview sample
Network Management Systems Information Technology Essay
6 pages (1763 words) , Download 1 , Essay
Free
The ROSA network management system is a product of Cisco Systems. It falls under its network management and total equipment management products category. The ROSA network management system is responsible for managing equipment as well as network layers in video delivery systems.
Preview sample
Improvement of Cybersecurity Information Technology Coursework
8 pages (2376 words) , Download 2 , Coursework
Free
The first aspect is the issue of obscurity and the second aspect is the issue of the discrepancy. Due to the enormity of the internet, it becomes possible for people to breach security from a certain distance. Those who seek to protect themselves from such harm find it difficult to discriminate ex-ante between different kinds of invasions.
Preview sample
Key Features of Cyber Security Information Technology Coursework
9 pages (2506 words) , Download 1 , Coursework
Free
Cyber attacks can emerge from the Internet, internal networks, and/or other public systems as well as private systems. Mobile computing can be defined as a notion which relates to displaying, collecting along with transferring data from a mobile-based device to any information system by utilizing a particular or a combination of varied data transfer methods.
Preview sample
Aspects of Hardware and Software Systems Information Technology Coursework
23 pages (6581 words) , Download 1 , Coursework
The company is familiar with the Microsoft environment having had Exchange Server 2003 and Office 2000. Microsoft has a number of applications that are useful and that will allow for a more problem-free integration. Microsoft Exchange Server has upgraded its service Exchange 2012 and Microsoft Office has also been upgraded to Office 2012.
Preview sample
Professional and Ethical Issues in Information Systems Information Technology Coursework
8 pages (2408 words) , Download 1 , Coursework
Free
 Though, many researchers have presented a wide variety of ethical theories to deal with these emerging ethical trends. But still, there is not considerable progress in this regard. In fact, literature and researches carried out on information systems reveal comparatively small discussion of ethics in the information systems.
Preview sample
Mozilla Firefox 4 vs Internet Explorer 9 Information Technology Coursework
7 pages (2146 words) , Download 1 , Coursework
Free
Mozilla Firefox and Internet Explorer are two of the most prevalent browsers that are used to access the Internet. Both browsers have one major difference. The difference is that of one browser being built-in on the format of the Mozilla Firefox and the other being built on the format of being a "Closed System" (The Internet Explorer).
Preview sample
Web Development for Information Management Information Technology Case Study
9 pages (1930 words) , Download 1 , Case Study
Free
The delivery man receives the payment. Although the required functionality is simple, yet the user interface of the site and its functionality determines a major part of the customer’s experience with the company. Therefore, to design an efficient prototype and to guarantee a satisfying customer experience, the designs of three professional pizza ordering.
Preview sample
Digital Crime Investigation and Features of Steganography and Steganalytical Techniques Information Technology Coursework
9 pages (2683 words) , Download 1 , Coursework
Free
Nevertheless, the use of such open communication has greater susceptibility to security threats resulting in unapproved information access. Encryption has traditionally been used to realize security in information technology communication; but once protected information is decoded, it is no longer protected. 
Preview sample
Designing a Network Protocol Information Technology Coursework
9 pages (2406 words) , Download 1 , Coursework
Free
The manufacturer of road equipment wishes to develop a control protocol to enable multiple portable light units (TLU) to automatically manage a road junction with an arbitrary number of roads. The manufacturer requires to use of protocol specifications of finite state machine methodology to develop suitable controls for each TLU. Each TLU must be capable of interacting.
Preview sample
Management Information and Communication Systems Information Technology Coursework
18 pages (4815 words) , Download 1 , Coursework
Free
From a generalized perspective, the website of Vodafone can be said to be one that has been presented to bring the office of the company closer to its customers. This is because the website seeks to offer several forms of customer-based services and products that would have naturally been found at the various customer care centers of the company.
Preview sample
Mobile Application Design and Development Information Technology Assignment
7 pages (1859 words) , Download 1 , Assignment
Free
Context can be described as; Context (capital c), and context (small c). These two descriptions are used to distinguish the term ‘context.’ Context information can be used to create a personal mobile user interface. In my own view, Context is the understanding of a scenario. It is the mental model that users establish to form an understanding, by attaching additional information to it.
Preview sample
Storage System, Servers and Desktops, Client Operating System, and Network Security Information Technology Assignment
9 pages (2496 words) , Download 1 , Assignment
Free
An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. 3. What are the main differences between Windows, UNIX, and Linux?
Preview sample
Linking ITIL to IT Information Technology Case Study
11 pages (2809 words) , Download 1 , Case Study
Free
The main objective of this case study is to assess the significance of an organization’s ITIL on its business activities. This objective will be achieved through understanding the different purposes and goals that ITIL has in order to acknowledge the responsibilities of different organizations as well as the strategies they employ in meeting their objectives.
Preview sample
Software Piracy Problem in the IT Industry Information Technology Coursework
9 pages (2431 words) , Download 1 , Coursework
Free
Legal action should be taken against software pirates. They should pay heavy fines or face imprisonment for not less than five years for this crime. The public needs to be made aware of the dangers of pirating. The government and developers should also educate and create public awareness of the infringement of copyright and its legal consequences.
Preview sample
Ethical Hacking Information Technology Assignment
8 pages (2136 words) , Download 1 , Assignment
Free
This assignment also discusses classification of penetration tests, legal implications after obtaining access to the private information, strategies for Mrs. Soup-Dragon to reduce the possibility of access to private data, cause of performance problems, security issues arising from the use of old computers and actions to combat these security issues. 
Preview sample
Infrastructure and Security of Information Network Information Technology Coursework
7 pages (1897 words) , Download 1 , Coursework
Free
The paper the reason for the design of the layouts to the IT experts and to the management team of infrastructure and security systems. It provides the organization security policy for infrastructure protection through the use of CIA principals. The section provides a detailed discussion of vulnerabilities of infrastructure and security and provides solutions for the information network.
Preview sample
Database Design for Existing Dataset and Analysis Information Technology Business Plan
12 pages (2645 words) , Download 2 , Business Plan
Free
This project will realize a database design whose scope is not limited to a geographical area since it can be accessed through web interfaces using PHP and running on an Apache Web Server. The data are stored in MySQL on a turnkey LAMP server running Oracle’s Virtualbox. The design will allow for easy data access and entry across a number of separate places and continents.
Preview sample
DB Design From Existing Dataset Information Technology Report
20 pages (5117 words) , Download 1 , Report
Free
In the report, an attempt has been made to first establish an understanding of how the BBC ontologies work as it is important before embarking on any activity of representing their data in the database. With the knowledge of how ontologies operate, a sufficient foundation had been created that was used to design the database to hold the program ontology.
Preview sample
Advanced Network Management and Design Information Technology Coursework
9 pages (2478 words) , Download 1 , Coursework
Free
The primary objectives of Upgrade Announcement are a) Improving IT services and increasing collaboration enterprise-wide (throughout the organization). b) Reducing operating costs. c) Obtaining effective risk management for the protection of data. Following with methodology for implementing the IT service upgrade plan, primary tasks were distributed into stages.
Preview sample
Application of Fuzzy Logic in Financial Modeling Information Technology Research Paper
12 pages (3209 words) , Download 1 , Research Paper
Free
This research paper also addresses issues on how to buy and sell shares that will in the overall effect the wealth of its supporters and clientele. Finally, it maps out how liquidation can be in the organization. The way to approach this research is to explain the prediction mechanism to use and explore concepts of fuzzy logic and the way it relates to financing.
Preview sample
Argos Management Information Technology Essay
7 pages (2102 words) , Download 1 , Essay
Free
Through consensus, the expectations and needs of the customers are addressed, opinions and ideas of professionals are incorporated, and the development of an information strategy that is highly integrated. Building consensus encompasses discussion at the initial stages after which proposals are fronted.
Preview sample
Enhanced Sensor-Based Intrusion Detection System Information Technology Report
15 pages (3861 words) , Download 1 , Report
Free
To consolidate both systems i.e. Anomaly-based intrusion detection system, a Signature-based intrusion detection system, a Flexible Intrusion Detection, and Response Framework for Active Networks (FIDRAN) are suggested to give superior security. In addition, testing and evaluation of a probe on a stand-alone system are also demonstrated.
Preview sample
Installation of Wireless Solution Information Technology Essay
6 pages (1730 words) , Download 1 , Essay
Free
With enough, funds, the AAMC can organize with the administration to provide the students with i-pads and cell phones either for free or at a cheaper price. This is to ensure that all the students are able to make use of the availability of wireless internet service. With every student having their own gadget; it will be easier.
Preview sample
Information Management in Organizations Information Technology Coursework
14 pages (4175 words) , Download 2 , Coursework
Free
As a matter of fact, companies market their products to new customers as well as their consumers through sharing blogs, whitepapers, marketing strategies, and infographics. On the other hand, the customers respond to the respective organizations through social media (Carroll, 2011, p.180). In addition, it makes it easy for people to provide their views and endorsements.
Preview sample
E-Commerce Websites of the TechAvenue Information Technology Coursework
12 pages (3526 words) , Download 1 , Coursework
Free
Despite the success of the project, there were some hiccups that can be resolved with further research. If I had more time I would have integrated the website with eBay and Amazon. These sites are the ultimate in e-Commerce websites. Integrating my website with them would drive traffic to the site as well as generate increased revenue.
Preview sample
Design and Development of an Enterprise System Information Technology Coursework
17 pages (4614 words) , Download 1 , Coursework
Free
Sunrise gets orders from each client once a week via EDI then the received sales order is automatically channeled to a sales management system (SMS) supported by a database. As soon as the account manager confirms the sales order, Sunrise looks at its stocks. The order is directly produced in case there is sufficient stock remaining from prior purchase orders
Preview sample
Information Technology Outsourcing in Business Management Information Technology Coursework
17 pages (4350 words) , Download 1 , Coursework
Free
Information technology outsourcing can also be defined as the utilization of external service providers to efficiently deliver IT-enabled processes in business, solutions in infrastructure, and application service solutions for the business outcome. Outsourcing is also included in utility services, cloud-enabled outsourcing, and software as a service.
Preview sample
Preparing for a Company-Wide Migration to Windows 8 Information Technology Assignment
13 pages (3466 words) , Download 1 , Assignment
Free
The SWOT analysis covers the deeper look into a project including the strengths, weaknesses, opportunities, and the probable threats the project may bring about on its implementation. Zeroing into this project that is being undertaken by the Crescent Manufacturing Incorporation of upgrading to the Windows 8 platform there lies a number of advantages, weaknesses.
Preview sample
Operating System Theory Information Technology Assignment
6 pages (1595 words) , Download 2 , Assignment
Free
A bus is a list of wires and firmly organized protocols that distinguish a list of the messages that can be disseminated to the wires. These messages are expressed by arrangements of electrical voltages, introduced to the wires with distinctive measures. On the other hand, a daisy chain is a device design that one device is characterized by a cable, which links an added device.
Preview sample
Choosing an Appropriate Windows Server 2012 and Features Information Technology Assignment
12 pages (3671 words) , Download 1 , Assignment
Free
The security of data is the main concern of the servers. Therefore the Windows Server 2012 was not left out to address this critical issue. It has a number of inbuilt security features that make it a secure server to use. These features include the use of the ReFS file systems that ensures that the data in the disks is securely stored and retrieved
Preview sample
Considering the Features of Blackberry Messenger Information Technology Report
6 pages (1858 words) , Download 0 , Report
Free
With Blackberry 5.0, users can utilize the QR code to add friends to their friend’s lists instead of the usual numeric PIN identification or an email address linked with the user’s mobile device. The most recent Blackberry smartphones can allow users to exchange contacts using near Field Communication Technology.
Preview sample
NFCPowered Mobile Application for Taking Students Attendance in Class Information Technology Report
19 pages (5055 words) , Download 0 , Report
Free
The information is classified by the operator, which will be provided by the teacher for a specified class. The system will, therefore, aid in appraising the attendance eligibility criterion of a student. The objective of developing and the need for an NFC-powered mobile application for student attendance into automating the old approach of taking attendance (Alan Dennis, 2014).
Preview sample
Business System Analysis Information Technology Assignment
7 pages (1700 words) , Download 1 , Assignment
Free
The appraisal system as owned by Buckie cooperative society. The line managers will be necessitated to provide data on the working progress of their employees. The system will analyze the data and give a report on the production line and the unproductive line. The system will be used to identify the line of productions that will be shut and which to be maintained by senior managers.
Preview sample
Analyzing Security Issues in Online Games Information Technology Thesis
58 pages (9766 words) , Download 1 , Thesis
The thesis basically deals with Massively Multiplayer Online (MMOs) and the complexities being faced by them. A discussion on the different business models being used by online game developers and how they differ from the traditional video game market. These security threats are analyzed in detail with the help of available literature.
Preview sample
Current Issues for Strategic Information Systems Information Technology Report
10 pages (2938 words) , Download 1 , Report
Free
This report will present an overview of their strategic information system, its operational performance and possible issues regarding better corporate support and will also specify an improved IS/IM based strategy for business management. In fact, the strategic information system allows an organization to quickly respond to a change in its business environment.     
Preview sample
Website Design Proposal Information Technology Assignment
6 pages (1632 words) , Download 1 , Assignment
Free
There are a number of evaluation techniques that can be applied to the test site and the functionality of the system. These techniques evaluate the design and implementation and the goal is to access the extent of the system functionality. They also access the interface effect on the specific problem.
Preview sample
TechEstate Project Information Technology Business Plan
8 pages (2294 words) , Download 6 , Business Plan
Free
This project is from Unlimited Software Technologies for the development and implementation of a tenant management system. The project is named TechEstate 1.0. This project represents an agreement between Unlimited Software Technologies and the client company, MyHouse Real Estate Company.
Preview sample
Intelligent Email Analysis Information Technology Essay
6 pages (1760 words) , Download 1 , Essay
Free
An email analysis reveals the number of internet users, recovers facts and figures and maintains a full analysis even after the system is formatted. Email intelligent analysis provides services such as the acquisition and recovery of data, the collection of pieces of evidence and the examination of the results in a written report. 
Preview sample
2351 - 2400 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us