StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Dynamics of Fan Culture in YouTube Information Technology Term Paper
7 pages (2193 words) , Download 1 , Term Paper
Free
A cursory look at the literature reveals that since that time and before a wealth of literature has sprung up exploring various aspects of the YouTube phenomenon, the participation of users in content generated, viewed, liked and made favorites by users, the general interactivity between YouTube content and its audience.
Preview sample
Electronic Publishing Information Technology Assignment
17 pages (5393 words) , Download 1 , Assignment
Free
The author states that Digital Rights Management software is used by some publishers, but not all in the publishing industry uses Digital Rights Management.  Some authors even feel that Digital Rights Management could be a deterrent to legitimate consumers. Electronic Publishing and Digital Rights Management are an issue that deserves to be addressed. 
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
The Google Story by Mark Malseed Information Technology Article
6 pages (1615 words) , Download 1 , Article
Free
The article covers 7 short years that encompassed the dot-com boom, the dot-com bust, and the new dot-com reality. During this period of Internet infancy, companies were rising and falling on a daily basis. Investors were overwhelmed by opportunities and under-impressed by a lack of results. 
Preview sample
Negative Impacts of Smart Phone Promptness and Addiction Information Technology Term Paper
7 pages (1750 words) , Download 0 , Term Paper
Free
Smartphones are certainly the most prevalent communication devices around the world today due to this level of versatility in usage. Mobile content developers are also continuously improving the number of applications that the devices can provide ranging from health applications to security monitoring services. 
Preview sample
History of Google Information Technology Assignment
6 pages (1593 words) , Download 1 , Assignment
Free
The author states that the domain name of google.com was legally registered on September 15, 1997, and the company was completely incorporated as Google Inc. on September 7, 1998. Located in Mountain View, California, the company employs approximately 5,700 employees and these headquarters are referred to as the ‘Googleplex’. 
Preview sample
Auditing of Mobile Streams Information Technology Coursework
7 pages (1750 words) , Download 1 , Coursework
Free
One of its subsidiaries in Brazil was liquidated last year. All these significant issues make it a critical client with regard to risk assessment. Mobile Streams is operating in different countries. Such countries have different currencies. As per IAS, the companies have to differentiate between the functional currency and presentation currency. The presentation currency of Mobile Streams is UK Pound. 
Preview sample
Use of Information and Communication Technologies Information Technology Literature review
6 pages (1500 words) , Download 0 , Literature review
Free
Most communist nations do this to deny their citizens access to documents that might enlighten them on freedom and democratic issues thus not waging a revolution. Corbett. & Williams asserts that the great firewall of China has automatic censoring software which trolls the internet and deletes phrases or words unwanted by the government from message centers, chat rooms, and certain websites.
Preview sample
Grphicl User Interfce Complexity Information Technology Assignment
10 pages (2702 words) , Download 1 , Assignment
Free
The author states that during the 1960s, we interаcted with computers through punch cаrds аnd pаper, in the 1970s through online typewriters, in the 1980s through online video terminаls, аnd in the 1990s through multimediа terminаls. In аll of these modes of interаction, the user is primаrily intended to be sitting аt а desk. 
Preview sample
Protecting Yourself from Identity Theft Information Technology Term Paper
14 pages (3500 words) , Download 2 , Term Paper
Free
The FTC enforces three federal laws that restrict disclosure of consumer information and require companies to ensure the security and integrity of the data in certain contexts — Section 5 of the Federal Trade Commission Act, the Fair Credit Reporting Act (FCRA), and Title V of the Gramm-Leach-Bliley Act.  
Preview sample
Conceptualizing Information Technology as Organization Information Technology Article
9 pages (2577 words) , Download 2 , Article
Free
Throughout this discussion, Beniger continues to emphasize how these issues relate to the operation of the organization as a better option than the single human brain in terms of balancing acceptably the need for speed, communication and information processing with the need for safety, reliability, and accuracy. 
Preview sample
Fear and Loathing on MySpace Information Technology Coursework
7 pages (2222 words) , Download 1 , Coursework
Free
Children are continually warned about the dangers in the world and still fall victim to them. The sexual predator is a cunning monster who will patiently prey on the child's mental and emotional makeup. Children at this age are very naive and trusting. The predator will wait and work their way into the child's life almost unnoticed and the child will welcome them in.
Preview sample
IT Management Overview of Open Source Software and Business Research Information Technology Research Paper
12 pages (4825 words) , Download 2 , Research Paper
Free
Incorporating open source into the different sectors of healthcare can improve the way current providers, insurance companies, and patients are able to manage their health records and history. Open-source implementation could even play a part in diagnosing and treating diseases that plague many third world countries around the globe.
Preview sample
Wi-Fi Implementation in Hospitality Industries Information Technology Term Paper
7 pages (1750 words) , Download 1 , Term Paper
Free
A wireless network uses Radio Frequency (RF) waves, like cell phones, televisions and radios do. For a hospitality industry what matters the most is the continuous and consistent look-after of the customers by the company. At times communication companies set up ‘Wi-Fi hotspots’ in areas most frequented by business travelers.
Preview sample
How Secure Is the Internet When It Comes to Personal Data Information Technology Term Paper
6 pages (1614 words) , Download 1 , Term Paper
Free
The choice of E-business initiative lies in the fact that as it incorporates the use of information technology infrastructure within it, hence it is surely deemed as something which will eventually solve the matters keeping in mind the fast technological changes. E-business would thus address quite a few problems if not plenty in the first place.
Preview sample
The Relation between Democratisation and Information Information Technology Term Paper
15 pages (3750 words) , Download 0 , Term Paper
Free
The report starts by defining democracy and then looks at information and communication technology. The paper will look into ways in which modern information and communication technology have impacted democracy. This will be achieved through analysis of Arab Spring. It has been claimed that access to information is vital for democracy to thrive. 
Preview sample
Surveillance through Facebook, Twitter, and Other Social Networking Sites Information Technology Literature review
12 pages (3000 words) , Download 0 , Literature review
Free
As more people get access to internet-enabled mobile phones, social networking is just a click away. These sites are used for maintaining contact with acquaintances, uploading photographs, blogging, and updating the status of everyday occurrences. The users of these social networking sites in their interaction with one another, reveal private information for all to see.
Preview sample
Identity Perception in the Virtual World Information Technology Essay
7 pages (2033 words) , Download 1 , Essay
Free
This human relation setting is important from the point of view of the individual who looks at cyberspace with a certain level of optimism. This model of optimism will be used within the framework of thinking aloud methods that dictate the decision aids that a person makes use of when creating an identity through various choices and means. 
Preview sample
Service Add-On Proposed by the Vendor Information Technology Essay
9 pages (2523 words) , Download 1 , Essay
Free
Planning is a very important function of management therefore we must plan each and every detail regarding the project before a final decision is made. If we do not plan and consider every possible factor that may affect our project, we will not be able to foresee possible problems associated with that and develop appropriate contingency plans. 
Preview sample
Graphic and Media Design Information Technology Assignment
7 pages (1817 words) , Download 1 , Assignment
Free
The author states that Zines are normally written in several formats, from desktop distributed script to comics to handwritten scripts such as the intransigent punk zine Comet-bus. Print remains the most famous zine format, normally photocopied with a circulation of small portions. The topics that are covered are very robust.
Preview sample
Designing for IPhone 6 Information Technology Assignment
7 pages (1968 words) , Download 1 , Assignment
Free
The author states that the iphone6 can be used as a mini-computer since it has every component of a computer. Moreover, the mobile device is designed with the latest windows which is the market, Microsoft windows 9and uses the latest technology from apple devices. In other words, an iPhone 6 is just a computer that doubles as a phone all in one.
Preview sample
Should There Be Greater Censorship of the Internet Information Technology Term Paper
8 pages (2388 words) , Download 0 , Term Paper
Free
In censoring the internet, the Australian government will block pages upon finding it unacceptable. Nevertheless, the filter gives them the capacity to violate human freedom of speech if it considers the particular speech unacceptable. Explicitly, the proposed filter will cost taxpayers millions of dollars in the process of implementing it, as well as other millions during its maintenance.
Preview sample
Conceptual Analysis of Computing and Information System Information Technology Term Paper
6 pages (1584 words) , Download 1 , Term Paper
Free
In the last chapter of Sowa’s book Conceptual Structure, Limits of Conceptualization has been discussed. The chapter surveys continuous aspect of the world that is difficult to express adequately in conceptual relations and discrete concepts. Conceptual analysis is a human cognitive activity that identifies and analyses concepts behind us of words. Some aspects of the mind lie beyond conceptual graphs (Sowa, 1984).
Preview sample
How an Organization can Become Proactive Information Technology Assignment
8 pages (2160 words) , Download 1 , Assignment
Free
I think the issue should be regarded more globally because the measure of innovations’ profit should be defined first. The new technology is well-taken if benefits it gives exceed costs of its implementation. This can be received from operational or financial reports: if reports show that new technology improves business processes – let it be.
Preview sample
Information Engineering Information Technology Assignment
12 pages (3395 words) , Download 1 , Assignment
Free
The author develops a detailed description of the case to be analyzed and check for the main facts regarding the problem. Here for the solution to the problem, we have to access the previous solutions for better management and handling of the solution. This stage also involves the management of the problem.
Preview sample
Enterprise Information Systems Information Technology Assignment
7 pages (2061 words) , Download 1 , Assignment
Free
The author states that in India 33% of the export is generated by this economic sector which possesses a significant percentage of the total output in manufacturing. Based on these findings, it is evident that this sector holds a bigger share of the world’s major economies and the sector can grow bigger providing more benefits to the economy.
Preview sample
Next Generation Data Center Information Technology Research Proposal
25 pages (6796 words) , Download 1 , Research Proposal
Founded in 1984 and centred in California, Cisco is a public listed company in NASDAQ and SEHK. As an IT major, Cisco specializes in application networking services, interfaces/modules, network management, routers, storage networking, unified computing, service exchange, switches, Cisco IOS and NX-OS software, universal gateways and access servers.
Preview sample
Summaries of the Articles about the Computing Enviroment Information Technology Term Paper
7 pages (1750 words) , Download 1 , Term Paper
Free
The advent of computers has changed the lifestyles of individuals to a great extent, in almost every walk of life. Computers caused revolutionary changes in the field of business, education, medicine, etc. Then, the inception of the internet made life more convenient and fast-paced due to the removal of geographical barriers to communication.
Preview sample
Internet and World Wide Web Evolution Information Technology Term Paper
7 pages (2060 words) , Download 1 , Term Paper
Free
Although the intention for making the Internet was for the use of the military, since its inception to the mainstream world, the Internet has drastically changed the way people communicate and live. The Internet does have drawbacks, but the positives outweigh the negatives and vastly become the tone of the world’s greatest inventions.
Preview sample
Internet and World Wide Web Information Technology Term Paper
8 pages (2000 words) , Download 1 , Term Paper
Free
If the creation of the Web were in the hands of any private organization then the story of the success would have been different. Once a private organization or individual becomes the inventor, the web would not be opened up to the global people for their assistance and contributions, as the name would otherwise be dispersed. 
Preview sample
The Importance of Information Systems on the Apple iPhone Information Technology Case Study
11 pages (2944 words) , Download 4 , Case Study
Free
The following is a presentation on the importance of information systems in the definition and design of competitive advantage strategy. The incorporation of information systems into corporate and private business the information age is a common theme driving business strategy for technology innovations. 
Preview sample
The Issue of Cyber Bullying Information Technology Term Paper
7 pages (1750 words) , Download 2 , Term Paper
Free
There is various software available in the market that helps in preventing cyberbullying. These include Puresight, Cyberbully, and Net Nanny among many others. This software offers protection to children by monitoring their net usage, and forwarding alerts directly to their parents in case any unusual activity or case of cyberbullying is detected.
Preview sample
Whether the Internet Is an Ally of Liberation or Not Information Technology Assignment
7 pages (1940 words) , Download 1 , Assignment
Free
The author states that the history of the internet originally beganin1962 when there was the beginning of the “Galactic Network”. However, in the present-day context, the internet is omnipresent and almost every individual has access to the internet. This has also become the most important social need for an individual.
Preview sample
Internet Censorship Information Technology Assignment
9 pages (2546 words) , Download 2 , Assignment
Free
The author states that the Internet is easy to access and, therefore, even children are aware of it and use it since it has information on nearly all topics in the world. Despite the vast importance of the internet, certain restrictions like censorship have been contemporarily placed. Internet censorship is the manipulation of certain information.
Preview sample
The Use of the Internet and Global Diversity Information Technology Essay
6 pages (1618 words) , Download 1 , Essay
Free
The author states that cultural exchange is one of the possible effects of the use of the internet. As expected, the diversity of the global population is easily shared and learned by different people from other backgrounds. The level of learning and adoption, however, differs significantly among different users.
Preview sample
The Structure and Operation of Public Sphere Relative to Advance in Communication Technologies Information Technology Literature review
8 pages (2347 words) , Download 0 , Literature review
Free
The idea that the internet is a platform where individuals can use as a democratic communicative space, is well known to promote a healthy public sphere especially with the introduction of social networking platforms. The popularity of social networking sites is due to advance in technology that resulted from highly developed ICT which is mediated by computers and phones.
Preview sample
The Impacts of Information Systems in Government Organizations Information Technology Research Proposal
9 pages (2773 words) , Download 1 , Research Proposal
Free
The author states that it can be seen that relevant information on the community is available mainly through the internet. But the government itself admits that the community still remains backward in social issues. The availability of data and the resulting information are essential components for any organization to be effective.
Preview sample
Business of Dell in India Information Technology Assignment
7 pages (2242 words) , Download 1 , Assignment
Free
The author states that the large multinational corporations of repute commenced outsourcing their activities in India as the trade policies were liberalized and governmental restrictions were removed. The first industry to take such benefit was that of medical transcription. In the mid-nineties, the telecom sector was removed from a government monopoly.
Preview sample
Biometric Security and Privacy Information Technology Annotated Bibliography
9 pages (2657 words) , Download 0 , Annotated Bibliography
Free
The article analyses the challenges as well as the chances that are brought about by the biometric ID document. The goals of adapting the system by both the national and international authorities are critically analyzed. The authors have systematically explored the methods that have been used for the purses of the identification process.   
Preview sample
Information Technologies: A Training Apparatus for Travel Industry Information Technology Research Proposal
9 pages (2989 words) , Download 2 , Research Proposal
Free
Sampling means that questionnaires and interviews would not be applied to the whole staff but a few workers will be taken as a sample from the whole proportion. After collecting data through questionnaires and interviews, sampling techniques help to validate and eliminate extraneous parts of the data particularly from interviews.
Preview sample
IT Tools that Support Team Process Information Technology Term Paper
7 pages (1903 words) , Download 1 , Term Paper
Free
In general biometric systems are a means of identification of individuals, especially from the perspective of determining whether or not they are properly authorized to access information within an organization, or in the case of Government organizations, to determine whether individuals are illegal and therefore to be restricted.
Preview sample
Use of Internet in Healthcare: Its Present Role and Future Trends Information Technology Term Paper
6 pages (1599 words) , Download 1 , Term Paper
Free
The Internet makes the distribution of knowledge among the laymen and the exchange of information among healthcare providers easy. The Internet has grown to be an important source of knowledge in all areas of healthcare. Internet renders decision-making on all practical questions of healthcare simple.
Preview sample
E-Payment Systems Information Technology Research Paper
10 pages (2953 words) , Download 1 , Research Paper
Free
The majority momentous partitions of the US financial system rely on the continuation of protected e-payment system networks and online payment computer systems. Power manufacturing delivery, transport, and emergency services, banking and economics, telecommunications are the absolute fractions of the imperative nationwide structure.
Preview sample
Rendering the Sub-Architecture Information Technology Term Paper
9 pages (2778 words) , Download 0 , Term Paper
Free
The author of the paper puts the system into several parts: 1. User Interface, 2. Implementation, 3. Data Store and Tracking, 4. Rendering. Also, there is a four-tiered approach to layered style and client/server architecture: User interface-->Control level-->Processing level-->Hardware(from Highest to lowest).
Preview sample
History of Computers from Early Machines to Net-Books Information Technology Coursework
6 pages (1644 words) , Download 1 , Coursework
Free
From home to offices, cars to general stores computer have found their purpose. As the use of this gadget is wonderful likewise the evolution of this machine is also extraordinary. There are several people on the list, who are responsible for the development of this wonderful miracle. These people are not only worthy of praise.
Preview sample
Computers Are More than Just an Artificial Need Information Technology Essay
8 pages (2146 words) , Download 1 , Essay
Free
The influence this machine has on the human race is undoubtedly unmatched. It is too hard to even imagine our lives without computers and that truly is a very difficult job now because of the ease this machine provides in daily life. The basic intention of inventing computers is to discover ease in calculations. 
Preview sample
The Application of Information Systems in Modern Organisations Information Technology Coursework
11 pages (3052 words) , Download 2 , Coursework
Free
‘Quick Shop, a retail chain, grew 28% every financial cycle. It bought a software package to manage its inventory and provided customers with a friendly point of sale interface with cartoon characters and amusing voices. The look and feel we're good enough to drive people in and talk about it. Their success was not in selling more but in their great marketing strategy.b
Preview sample
The Patterns in Acme Enterprises Data Network Information Technology Term Paper
9 pages (2337 words) , Download 1 , Term Paper
Free
Utilizing First Hop Gateway Routing protocol, such as Hot Standby Routing Protocol (HSRP), would enable failover between primary and secondary routing engines. HSRP also allows for load sharing between multiple primary routers by distributing the incoming traffic load, while still providing the same level of redundancy and 100% availability. 
Preview sample
Living Life in a Bubble Information Technology Term Paper
7 pages (1912 words) , Download 1 , Term Paper
Free
Not only business individuals but people belonging to all walks of life including a larger percentage of students make use of websites such as Facebook, Twitter, MySpace etcetera to gain access to other people from the same or different localities and gain access to information from around the world. They attain all this access, straight from their desktops with minimal contact with the real world (Meena et al 94).
Preview sample
Evaluation of Geographical Information System Applications Information Technology Assignment
13 pages (3941 words) , Download 1 , Assignment
Free
 Geographical information system applications are important in many ways. GIS applications help surveyors and other stakeholders to make and display maps of sections of the earth also display some features on these maps such as population, roads, buildings, and forests. It utilizes spatial data and a-spatial data. 
Preview sample
Smart Security Building System Information Technology Term Paper
11 pages (2828 words) , Download 0 , Term Paper
Free
Some of the systems that ensure and facilitate security in the buildings include video or audio entry systems, access control, and the latest CCTV. Therefore, a smart security system causes comfort in the interior building because users are sure of the security system established due to the integration of the alarm, sensors, and actuators into the cell phone of the owner.
Preview sample
3001 - 3050 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us