StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Comparison of Exception Hardware & Software in ARM Cortex-M3 & Altera Nios II Embedded Processors Information Technology Coursework
10 pages (2614 words) , Download 0 , Coursework
Free
The Nios II run-time environment provides for a choice between an instruction- related software exception handler and what Altera refer to as a software trap handler. It should be borne in mind that either one or the other is incorporated within the Nios II executable file, but not both. The software trap handler works in the following way. 
Preview sample
Evolution of Computer Technology Information Technology Essay
5 pages (1313 words) , Download 0 , Essay
Free
Much of the evolution that has seen the better performance of computers involves the improvement of the speed and performance of computers. Since computers process large amounts of data, most of the improvement is focused on processing speed, hence improving the performance of the computer.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Ubuntu Operating System in Smartphones Information Technology Essay
6 pages (1691 words) , Download 0 , Essay
Free
Ubuntu operating system comes in several distributions. These distributions differ in several aspects as follows. A Linux distribution is an assembly of the kernel and supporting software applications for a specific use. There are several Linux distributions available and include; RedHat, Linux CentOS, Fedora, and Ubuntu.
Preview sample
The Impact of Mobile Devices on Cyber Security Information Technology Essay
5 pages (1446 words) , Download 1 , Essay
Free
The widespread popularity of mobile devices such as Smartphones, tablets, iPhones, and iPads has made modern life more convenient and productive. These technologically improved mobile devices assist people to perform a variety of activities such as online bill payments, online purchasing, fund transfer, and data transfer, and internet browsing.
Preview sample
Information Technology Impact on Human Resource Management Information Technology Essay
15 pages (4105 words) , Download 0 , Essay
Free
The paper "Information Technology Impact on Human Resource Management" is an outstanding example of an information technology essay. Communication and Information Technology is very vital in Human Resource Management globally. Information Technology is important in all processes of Human Resource Management from recruitment to the retirement of employees.
Preview sample
Capacity Evaluation of Multi-User Multi-Cell WIFI Information Technology Coursework
12 pages (3615 words) , Download 1 , Coursework
Free
Generally, 802.11b requires a 22MHz band for a single network and can support up to 3 non-overlapping simultaneously Wi-Fi Networks with an 83.5MHz while 802.11a requires only a 16.6 MHz band for a single network and supports up to 12 non-overlapping networks simultaneously with a spectrum of 300MHZ.
Preview sample
Developing an Information Systems Architecture for Acme Engineering Information Technology Case Study
8 pages (2191 words) , Download 1 , Case Study
Free
On the handling of the client’s requirements, proper solutions are obtained in that the salesperson identifies the best expert for the particular task and uses his expertise. The chosen lead expert also chooses the most appropriate team to handle the customer request. This is ensured through effective communication and data availability.
Preview sample
IPSec and Cryptography Information Technology Essay
6 pages (1691 words) , Download 0 , Essay
Free
The major source of security for the IP network layer is the Internet protocol security (IP sec). This implies that the security of all the IP packets is granted, regardless of the superiority of the protocol being transported in the packet payloads. When using the internet security protocol, the applications do not require further reengineering.
Preview sample
Cloud Computing for Management Information Systems Information Technology Essay
9 pages (2525 words) , Download 2 , Essay
Free
Generally, examples of subscription-based systems also include pay-per-use systems, which also increase the potentialities of IT. These systems have the capacity to save the users and subscribers of the logistical inconveniences, which usually attend to the general application of the IT applications.
Preview sample
Challenges of Implementing Health IT on the African Continent Information Technology Case Study
7 pages (2002 words) , Download 1 , Case Study
Free
Lack of education and literacy hinders both the installation of the Health IT systems as well as their use, while also making the motivation for such implementation by the health providers and the health institutions minimal. Without the motivation to improve the management of the health system, it becomes difficult to create an opportunity for the introduction of the health IT systems.
Preview sample
Web Technologies & Management Systems Information Technology Assignment
5 pages (1250 words) , Download 1 , Assignment
Free
According to the study, millions of personal data items are routed daily to corporate databases and data warehouses through sales calls and credit checks. Millions of consumer records are collected and updated daily on the web. Such data are an important resource, such large data pools and the ways they are used threaten a fundamental human right: privacy.
Preview sample
Computer Impacts on Human Life Information Technology Research Proposal
8 pages (2318 words) , Download 1 , Research Proposal
Free
On the negative impacts of computing, I identified hacking as one of the problems. Measures on how they loop into the network system and obtain crucial information without being detected immediately, but rather after performing their fraud still remains an issue for most institutions that are networked (Huang, X., Radkowski, P. & Roman, P., 2007).
Preview sample
Malware Management in the Enterprise Information Technology Case Study
7 pages (2006 words) , Download 1 , Case Study
Free
A few antivirus programs can protect against malware however the first step in solving a problem is identifying it. For a long time, antivirus programs were not as familiar with the virulent malware as they should have been and malware scanners were overlooked however these days that is changing rapidly.
Preview sample
WAN Technologies Currently Used within the UK and European Markets Information Technology Report
8 pages (2265 words) , Download 1 , Report
Free
The technology was developed as an advanced version SONET which was common in the US. The technology brought about harmonization in terms of WAN standards.  SDH enables the transfer of a particular of converging local area network with different bitrates. To achieve multiplexing, a tributary stream is inserted in containers that are predefined to come up with one stream.
Preview sample
Introduction to Information Systems Information Technology Report
9 pages (2377 words) , Download 1 , Report
Free
Students in the field of IT and IS should develop an interest in the study of value in terms of the various influences that connect within the relationships between business and technology. Such a study should include an awareness that business processes are necessarily related to the manner in which systems and processes determine the levels of success for any business.
Preview sample
Computers Are More than Just an Artificial Need Information Technology Essay
8 pages (2146 words) , Download 1 , Essay
Free
The influence this machine has on the human race is undoubtedly unmatched. It is too hard to even imagine our lives without computers and that truly is a very difficult job now because of the ease this machine provides in daily life. The basic intention of inventing computers is to discover ease in calculations. 
Preview sample
Best Practices for Network Security Information Technology Report
8 pages (2434 words) , Download 1 , Report
Free
It is something that is so compromising for a network without a security policy. The responsibility of protecting the computer files and all information (e.g., employer’s information) in the network depends on the practices that are applied for security. There are those procedures that are followed to see that the network is fully secured to prevent it from attacks and threats.
Preview sample
The Proposed Network Architecture of Entex Insurance Company Information Technology Case Study
5 pages (1570 words) , Download 1 , Case Study
Free
The proposed network system is well designed with appropriate equipment specifications that should be followed during the installation of the network for its optimal performance. Security and data integrity should be maintained at all times using appropriate networking protocols. The network should also be maintained efficiently to uphold its already high availability.
Preview sample
Numerical Investigation of Single Phase Flow Oscillatory Baffled Columns Information Technology Coursework
13 pages (3363 words) , Download 1 , Coursework
Free
The representation of results in the current literature bank has been limited by certain aspects. Certain forms of research have presented their results through visual means, others have relied on graphing velocity and yet others have taken onto the more esoteric power density. The current research has used a number of different output parameters.
Preview sample
Protecting Intellectual Property Rights in Software Information Technology Coursework
5 pages (1466 words) , Download 0 , Coursework
Free
It is true that the digital age has made copying of other people’s works easier than before. As such, it has become very necessary for inventors and authors of software to consider seeking protection from intellectual property protection, as a way of guarding their inventions against pirates that are increasingly taking advantage of the digital revolution.
Preview sample
The BlackBerry Network Architecture Information Technology Case Study
6 pages (1738 words) , Download 1 , Case Study
Free
Wiping data is also limited by the device configuration in that it can only be performed if the device is remotely accessible, thus making password protection essential and the only defense mechanism for stand-alone devices (Hoffman 2007). In this regard, a device can be designed and configured to store remotely sensitive information such as emails and business contacts in the cloud.
Preview sample
Privacy Issues Related to Cyberspace Information Technology Term Paper
8 pages (2221 words) , Download 0 , Term Paper
Free
The paper will describe the organizations and their main missions in the industry, compare and contrast the privacy policies, and propose recommendations that better protect the privacy of the consumers and give the organizations flexibility. Verizon Wireless is a communication company, which is innovative, connects people and many businesses to wireless technology.
Preview sample
The Development of Information and Communication Technology: E-Governance in Saudi Arabia Information Technology Research Proposal
4 pages (1243 words) , Download 0 , Research Proposal
Free
A research study of this magnitude will have to consider both the quantitative as well as qualitative aspects of the implementation of the programs and evaluate their effectiveness in the overall development of the nation. Therefore, the study will envisage an assessment of the qualitative and quantitative aspects.
Preview sample
Understanding Digital Literacies Information Technology Literature review
12 pages (3298 words) , Download 1 , Literature review
Free
As a teacher of ICT, the practitioner finds himself using it more and more every day. In the context of formal education, ICT is recommended to be used by children from their earliest years. Siraj-Blatchford & Siraj-Blatchford (2000) position that since the early age children ought to be finding out as well as identifying the uses of ICT in everyday life.
Preview sample
Biometric Authentication Information Technology Assignment
6 pages (2113 words) , Download 1 , Assignment
Free
A combination of these security measures would be necessary at the DoD to ensure that not only authorized users access the system but also that their activities are authenticated and data transmitted in secure ways. This will help guarantee both authenticity and privacy of information and data at the DoD.
Preview sample
Ethical Issues Concerning Information Technology Information Technology Research Proposal
14 pages (3938 words) , Download 3 , Research Proposal
Free
The paper focuses on exploring ways through which qualitative and quantitative research methods are applied in conducting this research, thereby determining findings in relation to the hypothesis. In the other section, the paper has a discussion that seeks to compare and contrast the findings in qualitative and quantitative research.
Preview sample
Virtualize Desktop Infrastructure in the Work Environment Information Technology Literature review
6 pages (1705 words) , Download 1 , Literature review
Free
The system enables several users (desktop) to be hosted using remote servers connected to certain networks through a specific protocol. This means that a certain user can access data in the server despite his/her location. 
Preview sample
IT Implementation Plan for ProComm Technology Solutions Information Technology Business Plan
6 pages (1928 words) , Download 2 , Business Plan
Free
The IT infrastructure of a Firm provides the foundation for serving customers, working with vendors, and managing the internal firms’ business processes. ProComm Technology  Company’s IT infrastructure includes investments in both hardware, software, and services, such as consulting, education, and training, that are apportioned over the full spectrum of the business units in the firm. 
Preview sample
Interaction and Usability, Insurance Sales Tracking Information Technology Essay
5 pages (1497 words) , Download 1 , Essay
Free
Speech commands could be incorporated to make the system more interactive and personalized in order to suit each user individually (Kaur et al, 2003). In addition, the various sales entities and policies sold can be entered by a user which in turn will be used to verify the load of work that each user has.
Preview sample
The Impacts of Internet on Information Literacy and Library Skills Information Technology Annotated Bibliography
7 pages (2215 words) , Download 1 , Annotated Bibliography
Free
Little work has been done to research web applications in library websites to seek for information. The extent of web application prevalent in the library affects information acquisition because the seeking of information becomes reliable. Web applications such as Wikipedia have been used in the library in various ways. 
Preview sample
Impacts of the Internet on Culture Information Technology Essay
4 pages (1365 words) , Download 0 , Essay
Free
Pornographic videos and terrorist secretes or ideas can be shared over the internet and this undermines the moral and ethical foundations of cultures around the world (). Like all the others, this threat is potentially harmful to cultures but the potential of the internet as a source of information and a platform for information transfer and sharing is undoubtedly indisputable.
Preview sample
Information Systems and Processing Controls Information Technology Assignment
6 pages (1500 words) , Download 2 , Assignment
Free
Computer-assisted audits have increased speed because manually most time is spent on routine calculations. On the contrary, a computer program quickly runs through the financial statements and compiles the data and figures. It also reduces the cost of hiring as the cost of obtaining a computer auditing software is cheaper compared to hiring of an auditor. 
Preview sample
Wireless Technology Security and Its Types Information Technology Essay
6 pages (1758 words) , Download 0 , Essay
Free
Since setting up a wireless network must include means that ensure only authorized users can access and use it, the paper will also look at the security risks government and businesses run by using wireless networks with their associated security measures. A wireless network refers to the type of computer network not connected by any cables. 
Preview sample
Information Systems Portfolio Project - ExxonMobil Information Technology Case Study
11 pages (3025 words) , Download 2 , Case Study
Free
Information systems (IS) have played a major role in making sure the success of virtually all organizations in government, business, and defense. Moreover, awareness has also increased that such that success is dependent on the correct functioning and availability of large scale networked information systems that involve extensive complexity.
Preview sample
Should All Hacking Be Banned Information Technology Coursework
7 pages (2105 words) , Download 0 , Coursework
Free
The public is of the opinion that hacking should be banned forgetting the benefits derived from ethical or controlled hacking. Therefore, most people think that hacking is unconditional malicious and are of the opinion that all hacking should be banned. The benefits derived from controlled hacking are critical to national security as well as in maintaining a high standard in electronic products.
Preview sample
Contemporary Communication Technologies Impact on Economic Development Information Technology Report
15 pages (4433 words) , Download 0 , Report
Free
Right from ITES which has been declared as pillar of economic growth to the humble Pasha Centers in villages – ICT is making its marks in every aspect of life in Kenya. It is not only providing economic benefits but also empowering citizens through e-government initiatives.ICT in Kenya is bound to make a strong impact on the economic progress of Kenya in al spheres.
Preview sample
History of Computing Information Technology Essay
7 pages (1826 words) , Download 1 , Essay
Free
This discussion will focus on various timelines that saw the development and advancement of computers from the early days to modern times. During the early days, the computer was developed specifically for purposes of solving challenging societal tasks rather than for entertainment as well as for sending messages to inform of mails.
Preview sample
Aspectual Evaluation of Information Systems Information Technology Essay
8 pages (2222 words) , Download 1 , Essay
Free
The social aspect of the multimedia system reflects in various ways. First, education develops and improves through the use and of applications, simulations, or courseware. People are increasingly resorting to e-learning and quick information searching as the best-suited mode of education. Entertainment has immensely been central through the multimedia system.
Preview sample
Software Configuration Management Improvement and Security Information Technology Essay
8 pages (2237 words) , Download 1 , Essay
Free
The software configuration teams would produce a report on a regular basis to keep the software configuration management team informed about any updates and if any defects are found in the change. The security team needs to make sure that the software configuration team has carried out security-related tests on the product.
Preview sample
Transformation to NextGen Aviation Technology Information Technology Research Paper
35 pages (8750 words) , Download 4 , Research Paper
This project reviewed the conversion of the current air traffic control system to a modern air traffic controlled system called NextGen. A new aircraft traffic management system over the skies of the USA has been programmed to utilize satellite technology. It was in response to multiple weaknesses under the old way of facilitating flights 
Preview sample
History and Impact of Computing Information Technology Essay
5 pages (1533 words) , Download 1 , Essay
Free
Computers and Internet use have profoundly changed how people in society carry out their everyday life. From completing homework assignments to surfing the Internet and compiling data into business spreadsheets, computers have become a vital part of society’s daily life. Computers are used for communication, business tool, recreation, and also in the fields of medicine.
Preview sample
Strategic Information System Information Technology Assignment
13 pages (3498 words) , Download 0 , Assignment
Free
The paper "Strategic Information System" is an outstanding example of an information technology assignment. Before discussing the role of customer relationship management software in organizations, let us get a better understanding of what customer relationship management actually is. As Ueno (2006) states, “Customer relationship management (CRM) is a management strategy that unites information technology with marketing”.
Preview sample
Computer Use is the New Media Reader of Contemporary Society Information Technology Book Report/Review
5 pages (1250 words) , Download 1 , Book Report/Review
Free
That a society’s past information and experiences often shape both the present and future, thus as Man has progressed through civilization, so has his means/ mode and ways of communication. In the contemporary arena, a perfect example of the aforementioned would be the visible utility of computer technology and tools.
Preview sample
Algorithms for Breast Cancer Decision Phase Information Technology Coursework
11 pages (3033 words) , Download 0 , Coursework
Free
Breast cancer is one of the major causes of death among women. Digital mammography screening programs can facilitate early detection and diagnosis of breast cancer this reduces mortality and raises the chances of full recovery. Screening programs create a great number of mammographic images that radiologists have to interpret.
Preview sample
The Importance of Experience and Emotions During Product Design Information Technology Assignment
8 pages (2084 words) , Download 0 , Assignment
Free
Anyone who has experience of the products either directly or through the website appreciate these aspects of product design and becomes emotionally attached to it which therefore spreads to family members, professionals as well as the media in general. Therefore it becomes very important to look at these aspects of aesthetics in the design of any product.
Preview sample
Microcalcifications Detection in Mammograms Based on Ant Colony Optimization and Markov Random Field Information Technology Coursework
15 pages (3857 words) , Download 1 , Coursework
Free
In this paper, we presented the results of the application of our novel technique based on an ant colony optimization for microcalcification detection in a mammogram. When comparing the results of the conventional methods, ACO-MRF showed a better ability to find the best labeling and segmentation of microcalcifications.
Preview sample
Company Network Requirement Information Technology Case Study
11 pages (2869 words) , Download 1 , Case Study
Free
Fiction Corporation is a large company retail corporation, which implies that the company requires a unique network system, one that will easily synchronize with its specific operations. The process of designing a network system begins with the specific consideration of the use for which the network is designed. A retail outlet such as the Fiction Corporation requires a versatile network system,
Preview sample
Internet Security - Privacy in Context Information Technology Essay
11 pages (2912 words) , Download 1 , Essay
Free
The advance of innovations in telecommunication has resulted to increase in sharing of information via the internet (Nunziato, 2009). This exchange of information involves clients, internet providers, and website owners at different levels. Internet use has enhanced learning in the community, expanded trade, and banking services.
Preview sample
Cloud Computing - Local Development Agency, Computer Shop Ltd Information Technology Case Study
7 pages (2982 words) , Download 1 , Case Study
Free
Virgin Media not only offers the highest bandwidth which is 30MB but also there is no download limit. The connection demands no line rent as Virgin Media does not require a phone connection to install the broadband connection. The connection only requires a monthly fee of £17.50 which forms a total of £235 per month.
Preview sample
Security Protocols Information Technology Coursework
13 pages (3585 words) , Download 1 , Coursework
Free
Cloud computing seems like a more feasible option. Not only would cloud computing help the company improve its security, but would also provide it with better services and features. However, a more thorough analysis of the cost, requirements and benefits of cloud computing is needed before any decision regarding the future of the company is made.       
Preview sample
2501 - 2550 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us