StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Development and History of Unix and Linux Information Technology Coursework
7 pages (1884 words) , Download 0 , Coursework
Free
In order to explore more on the history and development of UNIX, it is paramount to check on the various milestones of the initial UNIX. The initial UNIX versions were the products of the (CRSG) Computer Research Group of the Bell Labs. Additionally, the (USG) Unix System Group, provided the internal support. The (PWB) Programmer's Workbench, also, played a key role in UNIX development. 
Preview sample
Systems Analysis / Database Design Analysis Information Technology Case Study
5 pages (1279 words) , Download 1 , Case Study
Free
Numbers of students get enrolled in a university each year. Each student gets enrolled in a specific degree program and has several specific courses assign to him per semester. All these happenings are interrelated. There are a lot of things that need to be sorted out and aligned in line with the student’s name if a transcript is to be issued to him.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Operating System and Networking Information Technology Essay
5 pages (1516 words) , Download 1 , Essay
Free
Likewise, in this information age, where technology is rapidly evolving, there is a demand of powerful systems that can handle the workload of advance and state of the art applications that are the requirements of end-users. We have selected a case study that incorporates a college that is offering finance and law education. 
Preview sample
Trends Emerging from SOC Technology Information Technology Term Paper
6 pages (1500 words) , Download 3 , Term Paper
Free
The author states that silicon semiconductors are used in making electronic devices such as diodes, rectifiers, transistors, and integrated circuits. Before the invention of the integrated circuit, scientists used the vacuum tube to create complex electrical circuits. When the transistor was invented in 1947, they quickly replaced the vacuum tubes.
Preview sample
The Distribution of Software Information Technology Report
5 pages (1472 words) , Download 1 , Report
Free
The measure of trust and security of an operating system can be attained by assessing the availability of certain traits. Given these traits, we can reach a justified opinion about which software development model is better for creating an operating system that is trusted and secure.
Preview sample
Information Technology Sector - East African Market Information Technology Case Study
6 pages (1500 words) , Download 3 , Case Study
Free
The major driving force behind the development of this infrastructure is basically the growing need for the efficient opportunities created by IT and the shift from the traditional forms of operations. The growth of business opportunities in East Africa is a clear sign of the area’s potential for the growth and development. 
Preview sample
ZigBee Network Topologies and Routing & Super-Heterodyne Receiver Information Technology Research Paper
10 pages (2500 words) , Download 2 , Research Paper
Free
The demodulation process involves the identification of the novel signals from the modulated carrier signal. Demodulation influences the quality of sound through the signals frequency harmonization. If the bandwidth is doubled, the result would be the same in output for noise. The noise results from the entrance of the oscillator.
Preview sample
Improvement of the Transportation System in the Olympic Games Information Technology Essay
10 pages (2500 words) , Download 2 , Essay
Free
All parties to the grand 2012 event are expected to contribute their best shares to the success of the events. The research focuses on the importance of information technology to the enhancement of the London version of the Olympic Games. Information Technology spells an important milestone to the successful preparation, management and post.
Preview sample
Electronic Medical Record System Information Technology Case Study
8 pages (2345 words) , Download 1 , Case Study
Free
In order to ensure the principle of a single accountability point is maintained, the IT manager will be in charge of the implementation of the project. He will be directly answerable to the CEO and Human resource managers in a flat governance structure as opposed to a pyramid. This will help to reduce the bureaucracies which will ultimately reduce the time spent in the decision-making process.
Preview sample
Web Portal System for University Implementation Phase Information Technology Essay
5 pages (1350 words) , Download 0 , Essay
Free
The development team would insert enough guiding comments on the system codes such that subsequent developers wishing to alter the code would have an easy time understanding the codes. This product is bound to undergo changes in time to come due to the dynamicity in the institution staff and student records.
Preview sample
An Electronic World Information Technology Report
4 pages (1146 words) , Download 0 , Report
Free
Besides, technology has touched on the inherent feature in human lives- culture. In recent times, there has been raging debate on how internet technology has impacted on the cultures among communities and societies across the world.
Preview sample
Campus Area Network Diagram and Advance Networking Information Technology Essay
4 pages (1399 words) , Download 0 , Essay
Free
With the prevalent security risks involved, network security should be all-round. Access to both the physical as well as application security of the various devices and applications respectively should be manned by the strong deployment of security policies and should be global to cover entire network sections.
Preview sample
The Extinction of Privacy in the Era of Social Media Information Technology Essay
7 pages (2444 words) , Download 1 , Essay
Free
Employers tend to stalk the employees and snoop in their personal details to attain information that might not be acquired in a formal interview; this is an act of severe intrusion of privacy. Spam messages and links also prove to attempt to infect the system with Trojans horses and viruses so that the account information and data can be attained and can cause harm to the individual by using his sensitive information.
Preview sample
Web Services Protocols Information Technology Essay
7 pages (1795 words) , Download 1 , Essay
Free
 What would happen if the client’s DHCP release message is lost? A release message is used to let go of an IP address from the DHCP client computer. What are the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.edu?
Preview sample
Impact of Sharing Personal Information Online Information Technology Essay
7 pages (1903 words) , Download 1 , Essay
Free
With the internet and its various applications becoming extensive and popular day by day, the rise in the negative effects leading to both online and offline crimes has also increased. So, it is up to an individual to keep their personal details confidential without providing room to the hackers to steal the information. The business firms irrespective of their sizes should maintain an optimum security mechanism with antivirus software and tools.
Preview sample
The Best Plan for Transnational Railway Information Technology Assignment
4 pages (1192 words) , Download 0 , Assignment
Free
This assignment also explains why Microsoft’s AGUDLP approach is either advantageous or disadvantageous, explains at least two tools that windows 2008 provides to create multiple users and groups and creates a three slide presentation that can be used as part of a campaign to communicate the importance of network security to the corporation’s broad range of employees.
Preview sample
Targets for Cyberterrorism Information Technology Research Paper
42 pages (10500 words) , Download 3 , Research Paper
The researcher states that technology, or to be more precise, the power of the Internet and high-speed computers distinguished the late 20th century and presented a dominant force early in the 21st century and up to now. Such force has been integrated by powerful factions around the world for increased competitiveness across industries.
Preview sample
Inventory Management System Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
The term inventory means the total number of goods and materials that are in the factories’ store any particular time. There is the need for the store owners to have the prior knowledge of the goods that are in the store. This is very important because they are able to control losses and can effectively place orders for new goods.
Preview sample
The Issue of Cyber Bullying Information Technology Term Paper
7 pages (1750 words) , Download 2 , Term Paper
Free
There is various software available in the market that helps in preventing cyberbullying. These include Puresight, Cyberbully, and Net Nanny among many others. This software offers protection to children by monitoring their net usage, and forwarding alerts directly to their parents in case any unusual activity or case of cyberbullying is detected.
Preview sample
Problems Associated With Advancement in Technology Information Technology Coursework
6 pages (1843 words) , Download 0 , Coursework
Free
Technological developments play a significant role in resolving diverse kinds of issues and problems. Basically, these technological developments can be seen in different areas such as in information technology, construction technology, space technology, medical technology, communication technology, art technology and so on. 
Preview sample
Social Networking Issues Information Technology Coursework
4 pages (1077 words) , Download 0 , Coursework
Free
The human mind has never looked back and the speed of this progress has only increased. The twentieth and twenty-first centuries are considered the era of development and inventions. Starting from the invention of the telephone to modern-day cellular technology, the world has seen many changes which have converted this vast planet into a global village.
Preview sample
Technology for Business Information Technology Essay
5 pages (1525 words) , Download 1 , Essay
Free
First, with improved information systems, it is possible for Club IT to push ahead of the competition. This is because the system will enable it to have at least one core competency that they will use to conquer the market. Secondly, with a good system, there is a good flow of information from one department or section to another. 
Preview sample
The Goals of My Field Site Placement Information Technology Essay
7 pages (1817 words) , Download 1 , Essay
Free
Self –actualization is the main lesson I learned in this placement. I was able to realize who I am and what virtues I uphold in my life that are vital in improving the lives of other human beings. Through this placement, I was able to realize that social work is the field I belong to based on my strong passion for providing humanitarian assistance to others.
Preview sample
Information System in Business Information Technology Coursework
8 pages (2000 words) , Download 3 , Coursework
Free
Open TEXT ECM solutions are one of the most prominent members of the vendor community that gives ECM solutions. It claims that it enhances the comprehensiveness of the People, the Processes, and the Content. The comprehensive ECM suite provided by OpenText enables the controlling of the Risk and cost that is with respect to the content
Preview sample
LTE Versus WiMAX Versus 802.22 Information Technology Article
11 pages (3034 words) , Download 0 , Article
Free
Wimax is an acronym for worldwide interoperability Microwave access, a wireless technology based on the 802.16 specification standard of IEEE. 802.16d was the initial version launched which provided little or no mobility, it provided P2P, P2MP, and mesh network support. This kind of standard was most favorable for providing internet service under the roof. 
Preview sample
Computing Security & Computing Forensics Information Technology Report
6 pages (1732 words) , Download 1 , Report
Free
Many methods are put in place to curb the effect of the malware but the most effective outstanding method is IT hygiene. Computers and other office equipment should be treated and disinfected with a cleanser. This keeps them away from failure due to dust or organisms as well as reducing the malware effect (Spencer, 2010).
Preview sample
SAP, CRM and ERP Technologies Information Technology Assignment
16 pages (4323 words) , Download 0 , Assignment
Free
The first SAP GUI is for Windows, as it is similar to the windows environment plus supports integration with other windows based applications. The second SAP GUI is for HTML. Although, SAP Internet Transaction Server (ITS) is required that controls the transactions flow. The third SAP GUI is for JAVA, the primary purpose for this GUI is platform independence.
Preview sample
Hants Hotel Strategy Information Technology Case Study
6 pages (1654 words) , Download 1 , Case Study
Free
The Hotel has to buy software that will facilitate the whole process. There is a lot of application software that can be useful for hotels. The most common software that Hants hotel must have are the central reservation system software and the Internet booking engine (IBE), sales and catering software for tracking sales and in the restaurants and room service,
Preview sample
Cyber Threat Analysis Services Information Technology Coursework
6 pages (1832 words) , Download 0 , Coursework
Free
The increasingly growing technology has been stamped with a similar rise in technological crimes. The rise of computers and the internet that led to the development of the global world witnessed a similar rise in cyber crimes that also conducted through the internet and by the use of computers. Cyber crimes have had very serious implications for economic and data security.
Preview sample
Drupal: Open Source CMS Information Technology Case Study
13 pages (3483 words) , Download 1 , Case Study
Free
Boniface is thinking of a way to make it easy to find and add a new module to a site under construction in Drupal since in the current version this is very overwhelming. To do that he needs to design a user-friendly interface that is easier to navigate through and will enable users to easily access and add modules on their site.
Preview sample
Modern Heuristic Methods Information Technology Report
7 pages (2166 words) , Download 2 , Report
Free
In detail, a heuristic is a rule-of-thumb, a knowledgeable guess, an instinctive decision, or just common sense based judgment of a problem, scenario, or a puzzle. In fact, a heuristic is the most commonly used method for resolving a problem. Heuristics as a noun is an additional name used for heuristic methods.
Preview sample
Positivism vs Interpretivism, Induction versus Deduction Information Technology Research Proposal
19 pages (5323 words) , Download 2 , Research Proposal
Free
Research question 3 and 4 shall be addressed in the model and system processes. Chapter 8 and 9 shall include the details and information regarding the selection, extension, designing and evaluation of the model. Chapter 10 shall include designing and evaluation of the proposed system with respect to the existing systems.
Preview sample
The Dell Company - A Strategic Analysis Information Technology Assignment
8 pages (2114 words) , Download 3 , Assignment
Free
Strengths can be used to take advantage of opportunities and counter threats. For a company to be successful, it has to understand its STRENGTHS as an entity to be able to take advantage of its OPPORTUNITIES and address the THREATS that it faces in the business environment. It is clear that many of the STRENGTHS of Dell rest on its model.
Preview sample
Outsourcing in Electronics Manufacturing - Does It Work Information Technology Essay
5 pages (1611 words) , Download 1 , Essay
Free
Generally, electronics manufacturing agility has turned out to be the most important element of competition in the business industry nowadays. This trend has also established critical jobless conditions in such nations. This is one of the biggest side effects of outsourcing in electronics manufacturing.
Preview sample
Manage IT Security for the London Olympic 2012 Games Information Technology Case Study
6 pages (1956 words) , Download 1 , Case Study
Free
ICT should be harnessed to counter the ills of the existing technologies. These technologies will facilitate the upgrading and implementation of the latest technologies to protect privacy. Chawki and Wahab (2006) identify biometric applications, padded cells, cryptography, digital signature technologies, and tokens as examples of top high-tech technologies that could be used for security purposes. 
Preview sample
Impact of Globalization on Managing an IS Infrastructure Information Technology Research Paper
5 pages (1250 words) , Download 1 , Research Paper
Free
Due to rapid alterations in international trends and patterns, varied innovative devices including the concept of  IS is established in order to cope up with the varying demands of the customers. Thus, it can be affirmed that IS equipment is very beneficial but its configuration and maintenance is rather difficult for an organization.
Preview sample
How Should Organizations Monitor Employee Web Surfing and Emails Information Technology Annotated Bibliography
5 pages (1493 words) , Download 1 , Annotated Bibliography
Free
Casciani (2009) quotes Jacqui Smith’s comment; “there would be no single government-run database. Doing nothing in the face of a communications revolution was not an option. Home Office will instead ask communications companies –from internet service providers to mobile phone networks. Communications data is an essential tool for law enforcement agencies to track identity theft”(BBC NEWS,2009).
Preview sample
Intelligent Email Analysis Information Technology Essay
6 pages (1760 words) , Download 1 , Essay
Free
An email analysis reveals the number of internet users, recovers facts and figures and maintains a full analysis even after the system is formatted. Email intelligent analysis provides services such as the acquisition and recovery of data, the collection of pieces of evidence and the examination of the results in a written report. 
Preview sample
Data Mining Issues Information Technology Report
6 pages (1582 words) , Download 2 , Report
Free
For addressing individual privacy, data mining technology is not up to the mark. Likewise, it links data mining to be considered as a social facet. To inspect the customer’s buying habits and preferences from the market or predicting valuable patterns that will facilitate in creating futuristic decisions, business transactions are calculated along with the procurement of associated information.
Preview sample
Multimedia Operating Systems Information Technology Assignment
4 pages (1306 words) , Download 0 , Assignment
Free
The media that are continuous in nature such as audio and video files need to execute at a relatively faster data rate than that for normal non- media file types. For example, considering digital video, it is observed that a digital frame of the video is displayed at a conventional resolution of 800x600.
Preview sample
Consumer Decision-Making Process Information Technology Report
4 pages (1366 words) , Download 0 , Report
Free
To market a product or service, it is vital to first understand all about consumer needs and then sell their work so that it creates particular wants specific to that product or service in the customer's mind.
Preview sample
Cyber Terrorism Information Technology Case Study
4 pages (1318 words) , Download 0 , Case Study
Free
To address the dilemma, both countries must ultimately forge a treaty to end their dispute. Otherwise, both private and public organizations in both countries must enforce more stringent security applications with regular updating, monitoring, and installation of “high fidelity intrusion detection systems (IDS) and firewalls” (Vatis, 2001, p. 19).
Preview sample
Web Site for Tony's Chips Information Technology Case Study
5 pages (1550 words) , Download 1 , Case Study
Free
Performance evaluation will be done from the monthly statistics drawn by the support technician.  The performance will be measured in terms of availability of the website, throughput of transactions, number of page hits, response times, and network availability. The success of the project will be measured in terms of cost vs. budget, slippage, completeness of features, and quality (number of bugs)
Preview sample
Analysis of VPN Tools Information Technology Term Paper
8 pages (2228 words) , Download 1 , Term Paper
Free
Choosing and managing a VPN system can sometimes be a daunting task to system administrators and also to end-users since different VPN tools come with different advantages and short coming. However, the determination of the best tool out of the four depend on a number of factors such as data security, availability, price, maintenance cost, installation complexity. 
Preview sample
How Information Systems Support Transportation Systems Before, During and After the Olympic Games Information Technology Case Study
10 pages (2674 words) , Download 1 , Case Study
Free
Like many cities in the world, London faces serious traffic issues making it a city not known to be easy to move around. The situation gets tricky whenever huge numbers of people are expected to move around the city at the same time. The summer Olympics presents one of the many transport challenges that London faces every so often.
Preview sample
Leadership in the Information Technology Sector in a Global Economy Information Technology Report
8 pages (2348 words) , Download 2 , Report
Free
The Digital Economy strategy focus on providing the capability to timely adoption and development of information technologies by governments, societies, and businesses, and aims at the transformational impact that such technology can cause. The Digital Economy strategy will combine the underlying technologies, with all other aspects needed to bring transformation. 
Preview sample
Software Components: A Two Approaches Proposal Information Technology Research Paper
3 pages (796 words) , Download 1 , Research Paper
Free
The business transaction processing system that the company uses is also run in the department. Database software is the software that is used to create databases. One of them is the SQL server that is used to create the SQL server to facilitate communication between the database and the business information system that the company uses.
Preview sample
How New Technology Can Build Competitive Position Information Technology Case Study
7 pages (1999 words) , Download 1 , Case Study
Free
This system was established in the customer service centers and enabled order entry and speedy delivery. Technology-enabled them to streamline their processes. They continued to bring about technological innovation. They replaced their hardware, introduced a new database management system, revised their software, and deployed a new operating system that enabled multitasking of computers.
Preview sample
Compuer Publishing with Indesign Information Technology Essay
6 pages (1709 words) , Download 1 , Essay
Free
The massive printing of books also helped in the spreading of an awareness of a philosophy that emerged when humanists or renaissance scholars returned to the works of the ancient writers. Previously, scholars were guided by the church teachings, and many people were concerned with actions that lead to heavenly rewards.
Preview sample
Software Design Defects Detection and Classification Information Technology Research Paper
10 pages (3181 words) , Download 2 , Research Paper
Free
Being a process run by humans, it is crucial to manage the software process to ensure success of the project. It follows that, the parameter to measure software success is software quality. This essentially refers to “fitness for use”. On a detailed elucidation of quality, software design defects come into the picture.
Preview sample
2851 - 2900 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us