StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Design and Prototype of Usable and Interactive On-line DVD Rental System Information Technology Coursework
4 pages (1118 words) , Download 0 , Coursework
Free
It should provide a customer loyalty reward system that will provide clients with points based on user activity. These points will be used to give discounts to loyal clients. The movie inventory shall keep a record of all movies in the database. It should be able to locate each DVD disk and issue alerts when a DVD movie is due to be returned. 
Preview sample
Economical Set of Recommendations to LDA for Implementing Suitable Logical Topology Information Technology Coursework
12 pages (3294 words) , Download 1 , Coursework
Free
Generally speaking, as bandwidth in CSL shall be mostly used for accessing Cloud-based services, including updating of online database. It is recommended to have a 10Mbps fiber connection with unlimited downloading as requirements. Requirements of bandwidth cannot be underestimated as it can cost a lot.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Mobile Computing and Social Networks Information Technology Assignment
14 pages (3649 words) , Download 0 , Assignment
Free
The ability to gain access to their own data via mobile applications is greatly beneficial for customers. The major advantage of this system is that it would assist consumers to save a considerable amount of their time and money. Today, almost all people own a mobile device and the majority of them use one or other type of mobile applications.
Preview sample
Negative Social Effects of the Internet Information Technology Essay
4 pages (1242 words) , Download 0 , Essay
Free
Since the Internet’s breakthrough as a medium, it has become a topic of discussion because of its various implications on society. However, it is hard to dismiss the numerous cases of cyber-bullying and identity theft that are present on the Internet. In this light, there is a need to examine the Internet as a tool for human communication and clarify both its advantages and disadvantages.
Preview sample
The Impact of Mobile Phones and Tablet in Modern Business Information Technology Coursework
13 pages (3723 words) , Download 1 , Coursework
Free
Generally speaking, the researcher employed qualitative survey designs, where questionnaires were used to collect information from a convenient sample of 54 respondents. Modern society has recognized the opportunities within the environment and has imposed appropriate steps in developing these projects.
Preview sample
Graphics Cards issues Information Technology Essay
10 pages (2817 words) , Download 1 , Essay
Free
In fact, in an ordinary setting, a computer screen can show more than a million pixels, however, the decision about what to do with each of the pixels is made by the computer. It is the computer that uses these pixels to generate an image. However, to deliver this image, a computer uses a translator, which gets input from the CPU.
Preview sample
Mobile Application Interface - DailyLifeApps Information Technology Case Study
9 pages (3304 words) , Download 1 , Case Study
Free
The evaluation shows that the application is cognitively sound. Each click of a button is followed by the occurrence of the expected event, which can be traced back to the button that was clicked. In cases where the widget pressed is not traceable, it does not raise confusion. The goal behind each button click is achieved (See detailed evaluation in Appendix A.2).
Preview sample
Aspectual Evaluation of Is in Use Information Technology Essay
11 pages (2853 words) , Download 1 , Essay
Free
The social aspect may present instances where perceptions and habits resulting from the application’s use affect other people indirectly. In the essay, Alex admitted that the application enhances his understanding of the harmful effects of cigarette smoking. As a result, he has grown to dislike and discourage smoking.
Preview sample
Adaptive Computing in Design and Manufacture Information Technology Assignment
5 pages (1250 words) , Download 1 , Assignment
Free
These devices are also known as assistive devices. Individuals with visual or physical limitations may not if not impossible to use or operate a standard mouse and a keyboard input devices and,therefore, need this technology that ranges from alternative mouse and keyboard designs to visual or eye tracking devices.
Preview sample
Privacy, Security and Anoymity in P2P networks for Multimedia Distribution: Challenges and Solutions Information Technology Research Paper
6 pages (1500 words) , Download 2 , Research Paper
Free
This research will begin with the statement that recent decades have witnessed a swift development in the P2P networks and increased utilization of the technology, especially in the multimedia distribution. The popularity of these networks has elicited the need of examining the security consequences of the system to the users, networks, and institutions.
Preview sample
Virtual Private Network as an Appropriate Control Information Technology Case Study
8 pages (2105 words) , Download 1 , Case Study
Free
VPN will encrypt the data before sending and it establishes a secure channel protected from hackers of cybercriminals. However, user credentials are required for authorization and authentication on the VPN server. Furthermore, for configuring multiple operating system environments on active directory, a domain server must be placed in Georgia, India, California, Canada, and New York. 
Preview sample
Software Tools in the Computerized Accounting Information System Information Technology Assignment
6 pages (1653 words) , Download 0 , Assignment
Free
The paper "Software Tools in the Computerized Accounting Information System " is an outstanding example of an information technology assignment. Accounting Information System is a set of process and individual activities which a company uses to collect and transfer financial information between various departments.
Preview sample
Monitoring Use of the Internet and Privacy Information Technology Research Paper
5 pages (1250 words) , Download 1 , Research Paper
Free
This research tells that the Internet as a network connecting countless communication devices has brought many important and permanent changes in the way modern society operates. It has not only became the largest source of information, however, has made the society dependent upon technology also. More and more people are using the internet to access information as well as communication.
Preview sample
The Barriers of Using Technologies in Primary Public Schools in Developing Countries Information Technology Case Study
21 pages (6878 words) , Download 1 , Case Study
Children can easily learn technology skills, especially when trained teachers and resources are available (Alias, 2012; Shin et al., 2012; Batorowicz et al., 2012). Many youth are already excited or used to using technology for entertainment purposes, so this awareness and interest can be transferred to educational settings (Al-Awidi and Alghazo, 2012; Couse and Chen, 2010).
Preview sample
The Connection Between the Internet and Distributed Application Services Information Technology Essay
5 pages (1403 words) , Download 1 , Essay
Free
The term cluster is used in computer technology to refer to a group of loosely coupled computers that are configured to work as a unit. Every computer within the cluster often operates as a complete unit and not as a tightly coupled multiprocessing system. Clustered computers or nodes have independent Central Processing Unit (CPU), I/O, and memory.
Preview sample
Network Security - Information Assurance Information Technology Coursework
12 pages (3208 words) , Download 1 , Coursework
Free
It is important to state that the technology has grown leaps and bounds to provide multiple channels of access to various systems blurring the line between physical and logical systems. The use of hardware from across the world for developing systems has mandated the need to trust the suppliers of these products.
Preview sample
Operating Systems - Hardening and Security Information Technology Case Study
8 pages (2172 words) , Download 1 , Case Study
Free
With nearly 250 employees in 5 countries, the organization currently faces a number of security challenges. The vulnerability of NextGard technologies is further increased by the fact that all of their employees have internet access and are likely to visit unsecured sites.
Preview sample
Airport Terminal Hotspot Wireless Network Information Technology Assignment
15 pages (4191 words) , Download 2 , Assignment
Free
This security feature is integrated within the ‘Cisco Unified Wireless Network Architecture’. ‘WIPS’ provides specific threat detection methodology and improved protection against malicious code, unauthorized access, security vulnerabilities, and other sources that may disrupt the network performance. The ‘Cisco WIPS’ analyze and identify wireless threats and manages.
Preview sample
Global Rules for the Internet: International Coordination and Accord Information Technology Essay
8 pages (2277 words) , Download 1 , Essay
Free
The dynamism of the Internet, which in turn spawned commercialization, popularity, and ubiquity of cyberspace, has resulted in some common social dilemmas and conflicts on the Internet. The illegal downloading of video and music files and the disintegration of privacy are some of the examples of these dilemmas.
Preview sample
Radio Frequency Identification Information Technology Essay
5 pages (1602 words) , Download 1 , Essay
Free
Asset management and supply chain applications are expected to rein the industry growth of RFID in the next few years. As it has been forecasted, by late 2007 asset management and supply chain will account for 70% of the RIFD technology sales. In the last five years, the sales of RIFD has increased from 323 million units to 1621 million units.
Preview sample
Cyber Security: Regulations of Social Networks Information Technology Research Paper
6 pages (1500 words) , Download 2 , Research Paper
Free
Social networking is one of the most influential developments on the internet mainly because it affects the lives of a large number of people in the world. It is fast becoming a major source of communication, news, and entertainment, with many people relying on it to get news from all over the world, to do market research.
Preview sample
Information Systems Evaluation Information Technology Essay
10 pages (2767 words) , Download 0 , Essay
Free
The paper "Information Systems Evaluation" is an outstanding example of an information technology essay. The IT needs in the business and personal lives of people worldwide have made IT one of the areas where many resources are invested. The amount of resources invested in the acquisition and maintenance of technology makes it necessary for users to periodically evaluate its effectiveness.
Preview sample
Electronic Health Records Software Analysis Information Technology Research Paper
16 pages (4454 words) , Download 2 , Research Paper
Free
Electronic health records are implemented in many healthcare facilities worldwide to improve the quality and effectiveness of global healthcare (Borycki & Kushniruk, 2008; World Health Organization, 2005; Shortliffe & Cimino, 2008). EHRs make possible the well-organized management and efficient preservation of health records to improve patient care (Taylor, 2006).
Preview sample
IT in Criminal Issues Information Technology Article
6 pages (1839 words) , Download 2 , Article
Free
Since the early 1990s, the internet services have been perceived to be a unique medium that diffused human history at a very high speed. Wang and Huang noted that currently, very few people are enjoying the benefits of internet services, rather, the internet as turned to be harmful with the introduction of the technology era (Wang, and Huang, 2011).
Preview sample
Social Networking Sites and Privacy of Users Information Technology Essay
9 pages (2440 words) , Download 0 , Essay
Free
The paper "Social Networking Sites and Privacy of Users" is an outstanding example of an information technology essay. Social Networking seems to the “in thing” for not only teens but people from every age group. Mom, Dad and even ‘grandma and grandpa’ seem to be plugged in on their favorite social networking websites.
Preview sample
Internet Technology as a Tool in Sales Force Automation Information Technology Annotated Bibliography
3 pages (875 words) , Download 2 , Annotated Bibliography
Free
Client relationship management entails the application of technology to help in the organization, automation, and the synchronization of aspects in sales, marketing, and service that is channeled toward the customer and technical support. Customer relationship management enables a company or a firm to manage its clients.
Preview sample
Reasons of Software Pirates Information Technology Research Paper
4 pages (1000 words) , Download 0 , Research Paper
Free
The author states that in the technological world, software piracy is considered one of the greatest threats to the software makers. This type of piracy has been going on for a long time, and can now be easily done and manipulated by the person who has the Internet and is willing to pirate software.
Preview sample
Electronic Medical Records Information Technology Term Paper
12 pages (3000 words) , Download 2 , Term Paper
Free
The particular brand to be studied in the paper is the so-called Epic Electronic Health Records. That particular technology integrates various functionalities into one useable tool that any healthcare practitioners can use with ease. They do not need to worry about the ways on how to use it because it comes with instructions 
Preview sample
Objectives and Stages of Structured System Analysis and Design Information Technology Term Paper
6 pages (1854 words) , Download 0 , Term Paper
Free
One of the core features of the SSADM is that it includes intense involvement in the requirements analysis stage. The clients are made to sign off from every stage that is completed ensuring the requirements are fulfilled. Moreover, the users are offered simple and easy to understand data that includes a number of diagrammatic representations regarding the system.
Preview sample
Pinewood Healthcare Limited - Social Computing Information Technology Case Study
14 pages (4025 words) , Download 1 , Case Study
Free
According to the present business performances of Pinewood, it has been observed that the company supplies its range of ‘Renal Care Products’ accumulating around 77% of the overall Irish market. Therefore, it is of utmost importance for Pinewood to effectively practice social media strategies in order to assimilate under its service jurisdiction the varied global healthcare.
Preview sample
What Makes IT-Production Skill Intensive Information Technology Coursework
12 pages (3269 words) , Download 1 , Coursework
Free
In general, the tendency of the Internet to empower the consumers, flatten the hierarchies with organizations, and facilitate the dynamic exchanges of information across organizations has caused new business models, operational strategies, management mechanisms, and modes of service delivery to the surface.
Preview sample
An Analysis of the Fine Food Company with Regards to Its Information Technology Structure Information Technology Case Study
10 pages (2859 words) , Download 0 , Case Study
Free
This paper has discussed some of the important aspects associated with this implementation. This paper has discussed in detail the opportunities and benefits that will be achieved through this implementation. This paper has also discussed various project management related aspects in the context of this project. 
Preview sample
Expert Systems, Neural Networks, and Google Cloud Services as an Organization Database Sharing Platform Information Technology Assignment
3 pages (750 words) , Download 0 , Assignment
Free
e means for creating and managing database it present but there should also be a platform for sharing the database across various components and departments of the said organization (Guo & Sanchez, 2005). It is in this sense that the cloud services offered by Google becomes
Preview sample
Market Sector Ambitions of Nokia Corporation Information Technology Research Paper
10 pages (2819 words) , Download 0 , Research Paper
Free
The absence of continued innovation, enhancement in the operational system and the inability to launch products across the segments has resulted in the loss of market share, thereby affecting the profitability of Nokia. The complete loss of market in the smartphone segment which is a major profit center has expedited the fall.
Preview sample
Cyber Security, Imperfect Information Stochastic Game Information Technology Literature review
6 pages (1595 words) , Download 1 , Literature review
Free
Current approaches of game-theoretic security are based on games with perfect information, static game models, or games having absolute information (Liu, Comaniciu, & Man, 2006; Alpcan & Pavel, 2009; Nguyen, Alpcan, & Basar 2009). Nevertheless, there are dynamic games, which have curtailed and faulty information regarding the attacker.
Preview sample
How Organization Adopting Green IT Information Technology Essay
9 pages (2568 words) , Download 0 , Essay
Free
The paper "How Organization Adopting Green IT" is an outstanding example of an information technology essay. Being one of the emerging concepts in IT management, “Green IT” practices have been drawing a lot of interest from IT organisations, manufacturers, service providers and suppliers. Green IT refers to making IT systems more energy-efficient and reducing the environmental damages that are associated with IT.
Preview sample
Web Development for Information Management Information Technology Case Study
9 pages (1930 words) , Download 1 , Case Study
Free
The delivery man receives the payment. Although the required functionality is simple, yet the user interface of the site and its functionality determines a major part of the customer’s experience with the company. Therefore, to design an efficient prototype and to guarantee a satisfying customer experience, the designs of three professional pizza ordering.
Preview sample
Strategic Approach to Information Technology Management Information Technology Case Study
8 pages (2053 words) , Download 1 , Case Study
Free
Zara Fashion Company has a lot to learn from Cisco Inc. Cisco’s success can be attributed to the good management that has recognized the importance of management of information technology. Cisco moved from its traditional approach to a new approach that put management of information technology to be important.
Preview sample
Zara: IT for Fast Fashion Information Technology Case Study
8 pages (2115 words) , Download 1 , Case Study
Free
It is important for companies to know the role of information and technology especially internally. Information and technology are an important aspect of any company and its management should be handled with at most caution. This is because if the information technology of a company fails it will result in a lot of losses for the company.
Preview sample
Impact of Cell Phones on the Social Relationships Society Information Technology Research Paper
5 pages (1518 words) , Download 0 , Research Paper
Free
Research has failed to address the impact of cellphones on social relationships among people. Furthermore, not so much has been done on the different gender differences in cellphone usage. They have shown that the female gender uses the phone mostly for talking and that they have a strong affiliation with their phones, unlike their male counterparts.
Preview sample
The Impact of Information Technology on the Society Information Technology Research Proposal
5 pages (2334 words) , Download 1 , Research Proposal
Free
Technology continues to play an indispensable role in the contemporary society. Information technology refers to usage of computer hardware and other software for the organization and management of data. Historically, information technology has been in existence for a long time since people have always had ways of communicating.
Preview sample
International Workshop on Security Protocols Information Technology Report
8 pages (2344 words) , Download 1 , Report
Free
Most protocols can operate either with or without the TLS presence, it is, therefore, necessary to indicate whether a connection is being made by the client or not. This is accomplished through the server. This is achieved by either using a separate digit for the connection or making use of the regular port number and having the server to switch the connection to TLS.
Preview sample
Risk Assessment Information Technology Case Study
7 pages (1750 words) , Download 2 , Case Study
Free
The C.E.O’s quest to outsource network and IT services to a service integrator and the slashing off half the staff places FDI at a challenging position. Boardroom issues involving the C.O.O., and the C.E.O., Jamie Pierce concerning my appointment is also a bone of contention. From the research of market trends, business trends, and analysis of FDI’s problems possible recommendations are derived.
Preview sample
How Can Bolivia Improve Its NRI Score Information Technology Case Study
7 pages (2252 words) , Download 0 , Case Study
Free
The paper also recommends measures that can improve the selected country’s current situation. These measures consist of three major steps, which can transform the country’s economy by building its IT infrastructure as strong as to provide support to other industrial sectors and production facilities too.
Preview sample
The Invention of Colossus Mark 1 and Other Important Events in History Information Technology Essay
7 pages (1750 words) , Download 2 , Essay
Free
IBM was the originator of the punch card phenomenon. It was whereby the help of the punch cards that the IBM German Subsidiary was able to assist the Nazis in singling out the Jews from among the rest of the Germans. This enabled selective and timely execution and elimination of the Jews at the hands of the Nazis.   
Preview sample
The Use of Biometrics and Bio-Information to Support New Systems Integration Information Technology Research Paper
20 pages (5486 words) , Download 0 , Research Paper
Free
Different private and government organizations use a wide variety of security techniques to ensure the security of the people. Additionally, biometrics is one of the most commonly used security devices. A biometric device identifies people on the basis of their physical characteristics such as their eyes, fingers, hands and so on. There are many kinds of biometrics and they all follow the same principles.
Preview sample
Information Security Governance Information Technology Assignment
4 pages (1000 words) , Download 0 , Assignment
Free
The information security is the complex process due to technology and governance considerations. The need for a selection of appropriate standards and a requirement for diverse information security standard is essential. Following are the most important information security governance models.
Preview sample
Mozilla Firefox 4 vs Internet Explorer 9 Information Technology Coursework
7 pages (2146 words) , Download 1 , Coursework
Free
Mozilla Firefox and Internet Explorer are two of the most prevalent browsers that are used to access the Internet. Both browsers have one major difference. The difference is that of one browser being built-in on the format of the Mozilla Firefox and the other being built on the format of being a "Closed System" (The Internet Explorer).
Preview sample
History and Impact of Computing Information Technology Assignment
5 pages (1561 words) , Download 1 , Assignment
Free
The history and evolution of processors are fascinating with early computing technology inventions stringed to defense contracts in that data was stored secretly. The meaning of the word computer has transformed over the years, however, the electronic processors or computers that people think of in contemporary time developed in the late 20th century.
Preview sample
An Analysis of Socio-Technical Systems Approach Information Technology Research Paper
10 pages (2500 words) , Download 4 , Research Paper
Free
In addition, this analysis is based on identifying the roles, concerns, and responsibilities of the stakeholders that connect with the information system. In this scenario, this analysis of the issue offers the foundation for the preparation of the solution, which further considers stakeholders’ conflicting point of view. 
Preview sample
2551 - 2600 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us