StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Effective Surveillance Design that will be Installed in the Gold Storage Premises Information Technology Report
9 pages (2746 words) , Download 0 , Report
Free
The designed CCTV system for the cold storage facility is a high technology system integrating internet and programmable systems to facilitate monitoring, recognition, and identification of intruders and staff operation activities. Moreover, the system integrates the new technology, monitors, cabling, lighting, and cameras for it to achieve its purpose.
Preview sample
Applied Data Communications and Networks by Buchanan Information Technology Book Report/Review
8 pages (2166 words) , Download 1 , Book Report/Review
Free
The mesh topology allows the interconnection of computers and other devices with each other. Every node is therefore capable of sending its own signal as well as disseminating data from other nodes. It is the most difficult to build and the number of connections at each node equals the total number of nodes minus one.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Systems Theory and Physical Security Information Technology Term Paper
13 pages (4029 words) , Download 0 , Term Paper
Free
Traditional safety mechanisms have been rendered less effective by changes in engineering. The reason behind their failure is the fact that these mechanisms were put in place way back when various systems were made up of electromechanical components whose orders were of less complex magnitude as compared to the current software-intensive system (Siponen, 2005).
Preview sample
Is the Internet Changing the Way We Think Information Technology Essay
9 pages (2594 words) , Download 0 , Essay
Free
The internet has some ways through which it has influenced people's thinking positively, and there are ways through which the internet has negatively changed the way of thinking. The internet has interfered with the thinking of human beings and currently, very few people would be asked a thing and tell it off without whipping out their smartphones for the answer.
Preview sample
Key Issues to Be Considered while Dealing with Artificial Intelligence Fault Management Information Technology Literature review
8 pages (2442 words) , Download 0 , Literature review
Free
Due to the growing concerns on the best AI approach to be used, we suggest that an application of probabilistic AI technology will be essential for correlating issues such as BBN's and NNs. In as much, additional problem-solving need to be applied so as the process of analyzing issues such as correlated faults, perform tests and the exact point of faults can be made easy.
Preview sample
How the Internet Has Impacted Information Privacy Information Technology Essay
10 pages (2805 words) , Download 1 , Essay
Free
Information technology has gradually become one of the most critical players in the transformation of the world, in terms of how people share information, conduct business, and surveillance. Imperatively, information technology has opened up society and, some argue, decreased privacy. The Internet offers tremendous opportunities that are exploited by individuals and groups, especially businesses.
Preview sample
Competition and Event Management System - Improved Web and Mobile Based Application for Jack Attack Information Technology Report
6 pages (1704 words) , Download 0 , Report
Free
The proposed application is an improved version that would have more features and functionalities than the original website such as scorekeeping, integration with external applications, customization of details for users, and so on. The proposal suggests building a new application using PHP connected with an MYSQL database that would contain details of three types of users.
Preview sample
Issues and Solutions Utilizing an Information Classification Schema Information Technology Term Paper
12 pages (3598 words) , Download 0 , Term Paper
Free
Conducting research to find out an appropriate outline to solve a specific problem utilizing an information scheme is challenging due to the lack of a scientific classification scheme for a security outline. An appropriate classification scheme assists in the retrieval of information and efficient storage, which is an added advantage for both outline navigators and program pattern miners.
Preview sample
Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers Information Technology Literature review
10 pages (3230 words) , Download 0 , Literature review
Free
The mitigative counter-strikes should entail liability rules for protecting third parties in case the process of hacking back harms a different party rather than the targeted attacker. This study will also demonstrate why counter-strike is a proactive policy for helping insulate critical services from damage and mitigate harm from potential attacks.
Preview sample
Information Technology Infrastructure to Support the Processes of Supply Chain Processes Information Technology Capstone Project
24 pages (6497 words) , Download 5 , Capstone Project
The first set of databases will be stored in the company that will entail a central computer that is linked to the rest of the computers. The process will entail a scheduled update that will occur weekly so as to sync the local server with a second back-up system. The second database will be stored externally through the support of Google.
Preview sample
Firewall Tools: Activity Monitor Information Technology Case Study
6 pages (1607 words) , Download 1 , Case Study
Free
The use of Activity Monitor does not affect the performance of other hosts in the network, and it provides a report of visited sites. Furthermore, the tool allows the user to have a view of multiple computers simultaneously. With that, it becomes easy to anticipate disasters such as network outages and therefore take appropriate action. The user gets control of their network using the Activity Monitor.
Preview sample
Organization's Successful Implementation of ERP System Information Technology Term Paper
8 pages (2107 words) , Download 0 , Term Paper
Free
To ascertain successful implementation of ERP, the study engages in literature reviews and engages respondents from organizations renowned for successful implementation of ERP, purposefully to identify how ERP can successfully be implemented. The respondent feedbacks will play a pivotal role in ensuring future success in the ERP initiative.
Preview sample
Ralational Database Design Information Technology Lab Report
16 pages (3775 words) , Download 1 , Lab Report
Free
The hallmark of the relational database is that when one table changes in the database all other tables are updated and are current. The Relational Database specification required nine tables in the following relationships. A table Textbook with a many-to-many relationship through a junction table to the table Module through the Module_Detail table
Preview sample
Global Information System Information Technology Coursework
6 pages (1918 words) , Download 1 , Coursework
Free
The global information system is a buzz word which we have to listen in our life. A global information system is a system which is developed in a global context. The global information system helps in delivering data over the globe. In the paper, we have discussed the various issues regarding the global information system.
Preview sample
Application of Computers by Architectural Designers Information Technology Essay
6 pages (1675 words) , Download 1 , Essay
Free
One such occupation is architectural design. The principal duty of an architectural designer is to design buildings or urban landscapes. This means that an architectural designer should possess good creative skills, artistic talent, and imagination. Thus, this article presents an interview on the impact and role of computers on an architectural designer.
Preview sample
New Technology Solution at Cisco Information Technology Case Study
8 pages (2692 words) , Download 0 , Case Study
Free
Management information systems have become an important part of almost every business or organization. At the present, the implementation of information systems can be seen in almost all the departments of a business or an organization. This report requires a discussion about the use of information systems with respect to a specific organization.
Preview sample
Manufacturing Information System, Software Acquired by Company's Departments Information Technology Case Study
11 pages (2762 words) , Download 1 , Case Study
Free
Data collection terminals are used for data capture and will include; bar code scanners and relays. LCD screens are also some of the hardware devices mainly used for the information output. Shop-floor data collection system software is; manufacturing execution system software that supports workflow monitoring, scheduling, and materials management.
Preview sample
Computer Chess - Recent Developments, Support Systems, Programs Information Technology Literature review
6 pages (1887 words) , Download 1 , Literature review
Free
With the number of people interested in chess games around the world increasing and the game gaining popularity, the importance of having developed chess game systems in place is a major concern in the industry. Innovations to computer chess are becoming open-ended and demand for the same is on the increase.
Preview sample
Software Development Life Cycle, Dependencies and Critical Success Factors to the Job Information Technology Report
9 pages (2663 words) , Download 0 , Report
Free
The cost of the software may also increase due to the additional time that the software development project may take. This may affect the pricing of the software and may impact on the sale where there are price-sensitive clients. However, the increased costs would be mitigated by the attribute of increased security.
Preview sample
Identification of Underlying Technologies: Case of Instagram Information Technology Case Study
8 pages (2302 words) , Download 0 , Case Study
Free
Mobile applications have been characterized by rapid rates of innovation. With a high rate of changes in the tastes and preferences of consumers, developers of mobile applications have been forced to continuously adapt to rapid innovations. These innovations have sought to either improve existing applications or develop entirely new ones in the market.
Preview sample
Social Technology Deep Dive: Facebook Information Technology Case Study
10 pages (2890 words) , Download 0 , Case Study
Free
Since time immemorial, businesses have relied on customer feedback as the best way to know how business is doing in the industry. Today, more than ever, customer feedback has proved to be is one important, if not the only, aspect that business owners cannot do without, and organization CEOs cannot just brush off. 
Preview sample
Ethical and Privacy Issues in Big Data Information Technology Report
18 pages (5011 words) , Download 0 , Report
Free
As already noted, three elementscharacterizebig data: velocity, variety, and volume. Many organizations regard the volume of big data as “big.”According to the references from various organizations, the volume is a relative term. This is because some organizations may have data sizes in gigabytes, petabytes, or terabytes, or even exabytes for big global enterprises (Matteson, 2013).
Preview sample
Donald Arthur Don Norman's View on Human-Computer Interaction Information Technology Literature review
19 pages (5222 words) , Download 1 , Literature review
Free
Donald Arthur "Don" Norman is one of the renowned scholars in the field of Human-computer interaction, particularly the interaction of humans with the designed world. He is an intellectual in cognitive science, design, as well as usability engineering whose works have had a huge impact on the field of Human-computer interaction. 
Preview sample
Human-Computer Interface - the Origin and Development, Making HCI Awkward, Techno-Dependency Growth Information Technology Essay
22 pages (5892 words) , Download 1 , Essay
According to Bastide, HCI is an interdisciplinary field that aims at bringing together various resources in an attempt to understand the interaction of people with computers. It also projects how these people ought to interact with computers given a chance, and this means that varieties of methods are available to HCI researchers. 
Preview sample
IRCL Information Management System Information Technology Report
7 pages (1953 words) , Download 0 , Report
Free
The concern on the poor performance of the current accounting package may compromise business processes. Outsourcing is seen as the appropriate option to remedy the problem facing IRCL Company. Generally, the capabilities of an effective ERP system, in the long run, would modify the appearance of major departments of IRCL Company (marketing, financial, and supply chain management).
Preview sample
Risk Control Plan Strategy for Cloud Services Information Technology Literature review
11 pages (3126 words) , Download 1 , Literature review
Free
Cloud services, also called “infrastructure as service (IaaS)”, “software as service (SaaS)” and “platform as service (PaaS)” enable express deployment of infrastructure and applications with the extra complexities and costs associated with purchase and maintenance of the underlying software and hardware (Hashizume et al. 2013).
Preview sample
Information Security Training and Education Information Technology Report
9 pages (2552 words) , Download 1 , Report
Free
This paper examines the role of Information Security education and training within enterprises and a proposed set of recommendations considered to be most important for enterprises to act upon. Additionally, the three most significant learning experiences about Information Security are identified and their impact on my future professional life.
Preview sample
IChat Product in the world of Information and Communications Technology Information Technology Case Study
8 pages (2255 words) , Download 0 , Case Study
Free
The speed of operation of iChat is dependent on the internet connection in use. The faster the bit-rate, the faster a user gets to interact with his or her online ‘buddies.’ Unlike in the case of email communications, iChat was set up to facilitate instant sending and reception of information over the internet. 
Preview sample
Cloud Computing: Principles and Paradigms Information Technology Report
14 pages (3995 words) , Download 2 , Report
Free
In this paper, we have examined and reviewed the essentials of cloud computing and safety problems in the cloud and portable cloud computing. More or fewer safety matters are the main alarm in the cloud computing environment. Particularly securities, as well as information about honesty, are main focus points in safety matters.
Preview sample
MovieMania Database Information Technology Report
13 pages (6060 words) , Download 0 , Report
Free
The users are also able to do film reviews from the MovieMania website and provide ratings on a given movie on a scale of 1 to 10. These reviews and ratings together with the user’s list will be used to gather information on the user’s interests and what may be the best movie to suggest to them. The database should allow for movie search using filters but including actors, directors, and genres.
Preview sample
Functionality and Benefits of a Learning Management System Information Technology Case Study
10 pages (3117 words) , Download 1 , Case Study
Free
In the past few years, the use of information technology has raised to a massive extent in every walk of life. At the present, information technology-based tools are not only used for business and daily activities but it is also being used in the education sector for the management of different educational activities.
Preview sample
Continuance Intention and Personal Use of Social Media Information Technology Research Paper
12 pages (3401 words) , Download 0 , Research Paper
Free
Social networking sites (SNSs) influence different behaviors by users of these online platforms, some leading to their continued use and others to their abandonment. Data collected from 61 Facebook users were used to test the proposed model.  The variable constructs together with their indices were used to analyze the data and draw conclusions.
Preview sample
Relevance of Big Data Analytics in Traffic Management Information Technology Case Study
8 pages (2264 words) , Download 1 , Case Study
Free
Monitoring and controlling the traffic is the only solution. This monitoring is effectively through the surveillance cameras that have been installed at several checkpoints. The cameras relay images and videos to the servers of the traffic department. As can be imagined, this is a lot of data that is sent to servers, and the information so unstructured and unclassified.
Preview sample
Computer Networks Problem Solving Information Technology Assignment
8 pages (2216 words) , Download 1 , Assignment
Free
The control mechanism of how the application receives and sends data is left to the customized designed. More methodologies can be defined by the application on how the flow and control of being data are designed to be, adding on top of the existing UDP protocol. The open platform offered by the UDP protocol can accommodate as many protocols as the application can have.
Preview sample
Data Classification Using Weka Software Information Technology Lab Report
6 pages (1646 words) , Download 2 , Lab Report
Free
The data may be obtained as free texts from websites or other social sites, also, the data can be structured data existing within a given structured data repository. There exist tools for data mining, and these are the tools that are used to derive sense from a given set of data. Data mining is a technique in addressing the existing complexities in data, more so the unstructured data.
Preview sample
The Importance of Virtual Labs in Information Technology Learning Information Technology Research Paper
15 pages (3187 words) , Download 0 , Research Paper
Free
While students value the importance of virtual labs in assisting them in their studies, they also appreciate the importance of physical labs. According to the research carried out in this study, students like using physical labs when they in the university and virtual labs when they are away from the campus.
Preview sample
Security of Information in Commercial or Business Organisations Information Technology Literature review
15 pages (4680 words) , Download 0 , Literature review
Free
As threats to and vulnerabilities in assets may not be fully avoided, it is crucial that both should be suitably mitigated. Therefore, this paper intends to explore some significant security concepts, as well as the existing categories of threats to commercial assets. It also aims to outline some of the physical, human, and technological countermeasures to the security threats discussed.
Preview sample
Google vs Lycos - Search Engine Analysis and Comparison Information Technology Statistics Project
5 pages (1498 words) , Download 0 , Statistics Project
Free
With Hotmail’s "Quick Add" feature, users can insert derivatives of Bing search results such as restaurant reviews, movie times, images, videos, and maps directly into their e-mail messages. Integration with Facebook Bing's search results can display one's Facebook friends when a Facebook account is linked with Bing via Facebook Connect.
Preview sample
Network Security Fundamentals Information Technology Report
17 pages (4783 words) , Download 1 , Report
Free
Information security plays a fundamental role in these days’ rapidly changing technology infrastructures and business environments. In this scenario, secure and steady communication infrastructure is required for both end-users and companies in an attempt to get a number of advantages from the enhancements and developments that the Internet has provided them.
Preview sample
Improvement of Data Quality Information Technology Essay
6 pages (1797 words) , Download 1 , Essay
Free
Once the database has been created, it is important to protect that data from unauthorized access. This is because some people may access that data and make intentional errors on the data and this may create errors in the database. The protection of databases is therefore important in ensuring that intentional errors are not made on the data (Berndt et al., 2001)
Preview sample
Azez the Wonder Boy - Site's Target Audience and Competitive Analysis Information Technology Case Study
6 pages (1585 words) , Download 0 , Case Study
Free
The site shall also have a blog for Aziz's fan base to follow him and keep find out about his endeavors. The website shall be called Azez the Wonder Boy. The URL of the website has not yet been decided on and the domain shall be booked as soon as consultations with the client are completed. The purpose of this document is to guide the building of the website Azez the wonder boy.
Preview sample
E-Commerce Sports Store Website Design Information Technology Case Study
6 pages (1578 words) , Download 0 , Case Study
Free
This section will also establish the specific design entities required for each of the concerns and how the functions by the administrators and users relate to each other. This will include information on the functions’ design for the users of the website, the design elements for the functionalities, relationships, attributes, and appropriate design languages for the services on the website.
Preview sample
Cybercrime - Investigating High-Technology Computer Crime Information Technology Literature review
17 pages (4857 words) , Download 1 , Literature review
Free
The perpetrator seeks to refuse users of these networks the ability to access and use available information for their benefit. This includes directing a very high bundle of traffic, thereby overwhelming the system and denying service to legitimate requests. Another class of service denial involves malicious attacks from attacked computers through distributive network access (Maras, 2012).
Preview sample
Technology Advance and Networks Security Information Technology Coursework
6 pages (1920 words) , Download 1 , Coursework
Free
Many organizations are aware of the dangers of computer-related crime and are taking measures to ensure network security in an effort to safeguard their valuable data and that of their clients. It is also a measure to protect theft of intellectual property and other network resources from being destroyed.
Preview sample
Information Security - the Difficulty in Estimating the Probability of a Threat or Attack Occurring Information Technology Assignment
6 pages (1826 words) , Download 0 , Assignment
Free
Information security is the aspect of keeping and protecting information from unauthorized access, presentation, modification, and even destruction, which would attribute to huge losses mostly in organizations. As the paper tells, the qualities of information security are confidentiality, integrity, and availability.
Preview sample
Analysis and Comparison of Search Engines Information Technology Essay
7 pages (2071 words) , Download 0 , Essay
Free
Information retrieval is the act of obtaining information resources relevant to the information needed (Korfhage 1997). Searching of the relevant information involves metadata, however; such is always connected with other links that may be relevant or irrelevant to the needed information. This is what Manning et al. (2008) term as Ads or Sponsored Links.
Preview sample
Investigative Analysis of a Current Health Management Issue: Health IT Information Technology Term Paper
7 pages (2403 words) , Download 0 , Term Paper
Free
The methodology employed in this report is a qualitative approach. This involved wide and comprehensive research using authenticated journal sources, websites of government departments, as well as books. This report shall begin by proving a brief introduction to the subject. In the second section, this report provides an overview of health information technology (IT) in Australia.
Preview sample
Issues and Challenges That Information and Communications Technology Professionals Face Information Technology Coursework
10 pages (2927 words) , Download 1 , Coursework
Free
Through this paper, students will get a clear understanding of the issues in the ICT profession as well as identify the current trends in ICT as well as the ever-evolving technology and their impacts on the performance of organizations and institutions. Students will also obtain a sense of responsibility and develop a professional code of ethics.
Preview sample
Information Systems and Its Data, Technology, People, and Organizational Components Information Technology Assignment
10 pages (3007 words) , Download 1 , Assignment
Free
Risk is the potential harm that may occur from some processes or from a future event.  From an information system point of view, risk management is the process of understanding and responding to factors that may result in a failure in the confidentiality, integrity, and availability of an information system (Melara et al 2003). 
Preview sample
Social Media, Networking, and IT Ethics - Cultural Perspective Information Technology Essay
12 pages (3485 words) , Download 1 , Essay
Free
When the dangers take place, we need to adopt a suitable mechanism that automatically saves memos awarding every worker of the danger. It is only possible when we guide our staff members regarding how to recognize it, what to perform if it happens. Moreover, the business should make sure the entire business worker’s computers and laptops are outfitted by means of the newest security tools.
Preview sample
2651 - 2700 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us