StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Role of Facebook in the Arab Revolution Information Technology Coursework
6 pages (1617 words) , Download 1 , Coursework
Free
Facebook revolution is raising several concerns also in the international political circle. It is quite possible to conduct revolutions in any country using digital media. In other words, antisocial elements can use Facebook as a weapon to topple even elected democratic governments. There is no control over the information passed through Facebook.
Preview sample
Technology, Language & Writing Information Technology Literature review
8 pages (2212 words) , Download 1 , Literature review
Free
Cloud computing continues to change how people use information. Cloud computing allows cloud users faster and easier storing and retrieval of vital information. The cloud users pay for preferred gigabytes of cloud space (Tari 54). With the payment, the cloud users like me to upload huge quantities of my confidentially important files into my allocated cloud computing space.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
The Application of Mobile Phones for Learning Purposes by University Students Information Technology Research Proposal
3 pages (750 words) , Download 0 , Research Proposal
Free
The paper 'The Application of Mobile Phones for Learning Purposes by University Students' is a worthy example of a research proposal on information technology. Qualitative research refers to an in-depth and holistic investigation of phenomena by collecting rich narrative materials through the use of flexible research design.
Preview sample
The Use of Communication Technology in Schools Information Technology Coursework
6 pages (1813 words) , Download 2 , Coursework
Free
 The author recommends educators to consider the cost of installing appropriate information technology applications for teaching young children. To ensure that learning objectives are achieved, educators should compare the cost of technology with other available learning materials in order to formulate ideal teaching techniques in classrooms (NAEYC).
Preview sample
Three Digital SLR Cameras Information Technology Assignment
8 pages (2340 words) , Download 1 , Assignment
Free
The author states that after extensive research on the products, from brand websites to consumer review websites, he is confident that the Nikon D5300 camera serves best to his needs. The consumer reviews for the Nikon D5300 camera indicated that the camera has the capability of producing high-quality pictures and reliable battery life.
Preview sample
The Connection between Human and Technologies Information Technology Assignment
6 pages (1761 words) , Download 2 , Assignment
Free
This paper deals with such already known concepts such as virtual reality, artificial intelligence, genetic engineering, cyberspace (computer network matrix) and multinational corporations. The book tells us the story of a young cyber-criminal living in a computerized world. The human’s life and technologies are connected nowadays.
Preview sample
The Policies of Cyber Space Information Technology Term Paper
7 pages (1977 words) , Download 1 , Term Paper
Free
The government took initiatives not to protect the contents in the web sites but to protect the access of individuals of China. This country has the maximum number of cybercrime and imprisoned journalists in the whole world. The fact is known by all that the Chinese government dislikes mass protests.
Preview sample
The Impersonal Nature of Social Networking Sites Information Technology Case Study
7 pages (2049 words) , Download 1 , Case Study
Free
The applications are egocentric in nature. For this reason, they allow individuals to extend their actual personalities to the online platform through social networking sites. The impersonal nature of social networking sites makes it possible for people to create unrestrained and new personalities that they might not reveal in real life.
Preview sample
Social Network Sites Interaction Information Technology Essay
6 pages (1676 words) , Download 1 , Essay
Free
Many philosophers and ancient scholars have defended the fact that change is a must and no force against it can succeed. The arrival of social network sites is just a fulfillment of this say and the fruits are equally evident. A continuous exchange of ideas through blogs and charts trains people on various capacities of the academic world (Harwood, 2011).
Preview sample
Imposing Internet and Its Effect on Society Information Technology Term Paper
10 pages (2740 words) , Download 1 , Term Paper
Free
The development of technology has imposed a great impact on learning theories and multimodal learning is one of them. According to Wolfe and Flewitt (2010), involving learners in using technology at an early age helps them access more information on a subject enhance their understanding. Learning is the process of acquiring information.
Preview sample
Competition in ICT Goods Services Information Technology Coursework
8 pages (2248 words) , Download 1 , Coursework
Free
With the ICT industry increasingly being developed as e-commerce enterprises, the associated areas such as financial payment systems, consumer rights advocacy, taxation, censorship and regulation of Internet content and advertisement claims, logistics, its impact on small and localized business models, etc are bound to undergo profound changes as a result.
Preview sample
TV and Internet Censor in Developing Countries Information Technology Coursework
8 pages (2245 words) , Download 2 , Coursework
Free
It is no surprise then that the general public is increasingly growing sceptical of the motives that decide editorial frameworks.  Hence, its content is selected and composed to represent the interests and ideologies of a small ruling elite, thereby making the large majority of its consumers helpless and powerless spectators (Craig, 1996).
Preview sample
Online Advertising Fraud Information Technology Coursework
7 pages (2088 words) , Download 1 , Coursework
Free
In a cutthroat environment, ad networks are faced with the pressure to lessen both competitor clicks and click inflation. By reducing click fraud, ad networks will improve the returns of publishers and advertisers, and consequently their own returns. More effectively delivering significant ads to valid users will benefit all parties in the system except the fraudsters.
Preview sample
How Students Use Social Media Information Technology Essay
6 pages (1908 words) , Download 1 , Essay
Free
Students use Facebook to maintain the connection with the people that they are acquainted with whether they are near to them or distant. LinkedIn contains sections entirely dedicated to job opportunities that work best for students who want to take their academic career to the next level without having to leave their jobs. 
Preview sample
Past, Present, and Future of Computers Information Technology Literature review
6 pages (1561 words) , Download 1 , Literature review
Free
Computers have become a key figure in the modern world and revolutionized it in so many ways. I have been having a computer since the 1990’s and I have seen the changes which it has undergone. Ever since the discovery of the first computer, a lot has changed since then (Castella, 2014). Nowadays, computers have become the cornerstone of development in all sectors of the economy.
Preview sample
The Impacts of Internet on Information Literacy and Library Skills Information Technology Annotated Bibliography
7 pages (2215 words) , Download 1 , Annotated Bibliography
Free
Little work has been done to research web applications in library websites to seek for information. The extent of web application prevalent in the library affects information acquisition because the seeking of information becomes reliable. Web applications such as Wikipedia have been used in the library in various ways. 
Preview sample
Security Quality Requirements Information Technology Annotated Bibliography
20 pages (5003 words) , Download 1 , Annotated Bibliography
Free
The Department of Homeland Security Software Assurance Program sponsored the project, and the BSI website contains a range of guidelines, tools, principles, rules, among other resources that project managers would find useful in addressing security concerns at each stage of the software development life cycle. 
Preview sample
Increasing Popularity of Tablets and its Effects Information Technology Essay
6 pages (1902 words) , Download 1 , Essay
Free
This way, the popularity of tablets is increasing, and, “according to a recent study by technological research giant Gartner Incorporated, worldwide shipments of tablets will grow to over 197 million units shipped annually”. (Stark, 2013). 
Preview sample
Hard-Wired Systems and Their Effects Information Technology Case Study
10 pages (2866 words) , Download 1 , Case Study
Free
The pairs are twisted to provide protection against crosstalk, the noise generated by adjacent pairs. Electrical current flowing through a wire creates a small, circular magnetic field around the wire. Two wires magnetic fields are the exact opposite of each other when they are placed close together in an electrical circuit.
Preview sample
Belmont's Ruth Faulkner Public Library - Schedule, Membership, Special Services Offered in the Library Information Technology Term Paper
7 pages (2174 words) , Download 1 , Term Paper
Free
In the paper, the location of the library is outlined and the daily routine undertaken by the library users. The paper also explains the services offered in the library such as computer and internet services, printing services, Wii gaming, and special teaching classes. The two classes include the Yourtutor program and the lifelong learning program.
Preview sample
Treatment of Cybercrime Information Technology Coursework
10 pages (2759 words) , Download 2 , Coursework
Free
The statistics are has shown that they are now trying to protect themselves against the long-lasting trauma of cybercrime. Nonetheless, studies over the recent years have indicated that such crimes have increased more rapidly not only in Canada but also across the globe as well. The development of the internet and computer technology has revolutionized.
Preview sample
Site Investigation for a Major Wind Farm Project at Farr at Inverness-shire Information Technology Case Study
8 pages (2000 words) , Download 1 , Case Study
Free
It is quite essential to note that this report has investigated the case study on Seymour deep shaft-sinking project, described the problems encountered in sinking the shaft through various substrata, explained the techniques used for countering the problems, and examined the safety aspects of the project.
Preview sample
Information Technology in Inventory Management Information Technology Research Paper
10 pages (2772 words) , Download 2 , Research Paper
Free
Knobel & Lankshear (1999) define data analysis as the “process of making sense or meaning from a detailed description taken during field research”. Data analysis will be conducted using thematic content analysis. It involves analyzing data by organizing it into categories based on surfacing themes, concepts or similar features (Knobel, 1999).
Preview sample
The Concept of Password Management Information Technology Research Paper
9 pages (2575 words) , Download 1 , Research Paper
Free
The project will take a four and half month duration. During the first month, a literature review and background into the topic will be conducted. Research methodology, data analysis, and presentation of findings will be conducted in 2 months respectively. The last months will involve a summary of the study, conclusion, and recommendations.
Preview sample
Is Internet Marketing Better Than Traditional Marketing Information Technology Research Paper
10 pages (3021 words) , Download 1 , Research Paper
Free
My project is about internet marketing. The basic aim of this research is to investigate why internet marketing is better than traditional marketing? ? Internet marketing has changed the shape of business and gives it more strength and access to the international market. I will investigate the different features of internet marketing and also new prevalent issues like information security regarding organizational data.
Preview sample
Organizing GB's Information Services Department Information Technology Assignment
9 pages (2578 words) , Download 1 , Assignment
Free
In the context of restructuring and reorganizing GB’s Information Services Department, I am your proposed Vice President (VP) and Director of Data management. It is with great pleasure that I introduce myself, Jeff Butler, having 10 years of experience as a data management consultant. In my credit, also there is a number of publications related to data management.
Preview sample
Data Migration Between Clouds Information Technology Thesis
18 pages (5185 words) , Download 3 , Thesis
Free
The study has described the Windows Azure platform that may be effective in transferring data among clouds. The study’s statement of the problem argues that the banking sector has not realized the full benefits for cloud computing technology because of the inefficiency of the Amazon cloud models that have faced frequent failures.
Preview sample
Operational Research and Information Management Information Technology Case Study
9 pages (2525 words) , Download 1 , Case Study
Free
In position fixing, celestial navigation is employed through the use of sights and angular measurements instead of depending on estimated calculations (Grewal, Weill and Angus, 2007). These angular measurements are made between the main celestial bodies, which are the sun, moon, planet and the star and any visible horizon (Agnew and Larson, 2007). 
Preview sample
Using Computers in the Classroom, Teaching Bible Information Technology Coursework
7 pages (2155 words) , Download 2 , Coursework
Free
In general, most of the Bible topics are interrelated and because of the huge size, it is difficult for the teachers to establish connections using manual means. On the other hand, computer software can help the teacher in accomplishing their teaching tasks more easily with the help of biblical software.
Preview sample
Current Cyber Attacks & Its Countermeasures Information Technology Coursework
7 pages (2148 words) , Download 2 , Coursework
Free
History is the witness that no nation has succeeded in completely eliminating any kind of crime from the globe and same is the case with cybercrime or attack. The merely possible step is to make public attentive and conscious of their rights and duties and further making the application of the laws more strict to check crime.
Preview sample
E-Business of Qatar Airways Information Technology Case Study
9 pages (2520 words) , Download 1 , Case Study
Free
The airline industry is extremely competitive – with even the slightest mistakes costing companies millions in losses. The prices of aviation fuel show no tendency towards reducing as they continue to rise exponentially. Qatar Airways needs to maintain its high-quality standards – if not continuously improve them – if it wants to remain at the top.
Preview sample
Network Security and Its Main Aspects Information Technology Term Paper
8 pages (2303 words) , Download 1 , Term Paper
Free
In this similar context, ‘Cloud Computing Security’ is fundamentally described as a set of standardized procedures that are designed to deliver the utmost security as well as information assurance within the environment of cloud computing. Moreover, it is considered as a physical as well as a logical security concern throughout software service models, infrastructures and platforms.
Preview sample
Platos Cave Allegory and the Mass Use of Mobile Telephones in the E.U Information Technology Essay
8 pages (2000 words) , Download 1 , Essay
Free
In this context, the use of mobile phones has been extended in all countries around the world covering a significant part of the population. However, the use of technology has been found to be related to the development of particular behavioral patterns either in the short or the long term. 
Preview sample
Information Technology and Non-Profit Organizations Information Technology Coursework
8 pages (2144 words) , Download 2 , Coursework
Free
It is quite essential to state that information technology requirements of the non-profit organizations vary according to the nature of their work however there are some general and some specific IT requirements of those organizations which necessitate them to obtain customized hardware and software.
Preview sample
Source Code Components Architectural Characterization Information Technology Term Paper
8 pages (2288 words) , Download 0 , Term Paper
Free
An XML-based RPC server application can define, describe, and export a Web service as an RPC-based service. WSDL (Web Service Description Language) specifies an XML format for describing a service as a set of endpoints operating on messages. With the JAX-RPC API, developers can implement clients and services described by WSDL.
Preview sample
Strategy of B2B E-Commerce System Information Technology Case Study
9 pages (2652 words) , Download 1 , Case Study
Free
In addition to tangible benefits, we should put a valuation to the acquisition of assets like Customer Equity, Customer Lifetime Value (to be measured by improved customer satisfaction and retention), and Intellectual Properties. [Ricker, Fred. R. and Kalakota, Ravi. 1999; Liu, Xue and Heo, Jin et al. 2005]
Preview sample
What Are the Contributions of Information Technology to Business Information Technology Coursework
8 pages (2000 words) , Download 1 , Coursework
Free
In 1997 it was acquired by Patriot American Hospitality Inc, a Paired Share Real Estate Investment Trust as an operating company with an established brand. Due to the likely repeal of the tax benefits provided to paired share REIT and under increasing pressure from the stakeholders, the company became a C-corporation after dropping its REIT status.
Preview sample
The Use of IT for Strategic Collaboration between Businesses Information Technology Research Paper
8 pages (2000 words) , Download 1 , Research Paper
Free
Effective voice and data transfer with optimized video conferencing facility between World Bank’s headquarters or head offices and the branch offices will be possible, thereby actualizing good communication and decentralization at lower costs. Likewise, MPLS technology can help by providing the setup for safe and fast transfers.
Preview sample
The Information Spaces of the Future Will Be Entirely Digital, and This Is a Good Thing Information Technology Case Study
7 pages (2023 words) , Download 1 , Case Study
Free
The manners in which this technology is developed and gets deployed become an opportunity for everyone and every organization. The information space, for instance, is one of the benefactors of this phenomenon. This paper will explain the proposition that the information spaces of the future will be entirely digital and that this is a good thing.
Preview sample
Official Recognition of Video Games Information Technology Term Paper
8 pages (2191 words) , Download 1 , Term Paper
Free
Jack Kroll, in his article published in Newsweek, wrote about video gaming that it was a form of entertainment and fun and was also rewarding; however, it did not give rise to an emotional complexity that formed the basis of art. His writing caused people which include the gaming theorist and enthusiasts to write articles.
Preview sample
A Geographic Information System: Icloud Information Technology Essay
6 pages (1590 words) , Download 1 , Essay
Free
Most software services are already on the cloud while many others are also headed for the cloud. Desktop applications are soon to become a thing of the future as most applications move to the cloud. Today, you can store documents, images, presentations, calendars, articles, and many other file types on the cloud.
Preview sample
Using Red Pike in National Health Service Information Technology Term Paper
6 pages (1951 words) , Download 0 , Term Paper
Free
The Cryptography system in the NHS refers to the communication system that is designed to enhance confidential and secure communication in the NHS. The cryptography system is needed in the NHS to enhance protection of the confidential information and protect clients’ records because of the diverse linkage of the patient’s records in the system.
Preview sample
How Can a CRM Help the International Institute of Finance to Facilitate Its Strategy Information Technology Case Study
10 pages (2886 words) , Download 1 , Case Study
Free
International Institute of Finance (IIF) is selling packaged knowledge, knowledge space and knowledge events focused around this very knowledge to its clients. The clients of the IIF are banking and financial institutions (investment bankers, insurance companies, security firms, trading companies, export credit agencies, multilateral agencies and pension funds) around the globe.
Preview sample
E-Books as a New Media That Allows a Promising Future for Book Lovers Information Technology Literature review
10 pages (3191 words) , Download 1 , Literature review
Free
Electronic books (e-books) are blooming into a profitable business.  The electronic publishing industry is creating new possibilities for libraries and individual avid readers.  E-books permit readers to peruse and download from Internet e-book stores.  E-books are also available in electronic stores worldwide.  
Preview sample
Functional Components of the Business and the Information Needs of Bright Systems Limited Information Technology Case Study
10 pages (2722 words) , Download 1 , Case Study
Free
In general, the primary discussion stretches to the very evaluation of the business and the mapping of the various data flows among the departments. This not only helps us to understand the enterprise better but to gain a deep insight into the critical data exchange and communication problems pertaining to it.
Preview sample
Role of EDI Implementation in the Increase of Performance of a Small Medium Company in China Information Technology Research Proposal
9 pages (2445 words) , Download 1 , Research Proposal
Free
The research methodology used in the study will be of two different forms: a) the literature published on the issues under examination will be reviewed and critically discussed. The literature reviewed for this study will be identified using the following criteria: a1) only recent literature will be involved in the research. 
Preview sample
Contemporary Issues in Information Technology Systems Information Technology Essay
6 pages (1678 words) , Download 2 , Essay
Free
Middleware software has the ability to streamline business operations and hence reducing losses in an organization. Agile is one of the most important concepts in the operations of the business. Cost-effectiveness in the business operations is also achieved through the use of this software and hence an advantage to an organization.
Preview sample
Analysis of the Research about Grounded Theory Method in Information Systems Information Technology Literature review
10 pages (1 words) , Download 1 , Literature review
Free
Consequently, it is beneficial for the research work to postulate theoretical sampling where emerging theory is the rallying call and determining factor. It is important to note and mention that this is different from the conventional and mainstream purposeful sampling where the outcome could be pre-perceived or predetermined.
Preview sample
Features of Human Computer Interface and Web Accessibility Information Technology Coursework
12 pages (3129 words) , Download 1 , Coursework
Free
HCI involves input and output devices as well as the techniques that use them. It also deals with how information is presented; how it is requested; how computer actions are monitored and controlled;  all types of documentation, help, and training; the tools required to build, test, and assess user interfaces; and the procedures that developers follow when producing interfaces.
Preview sample
Practical Windows Security: Role and Function of an Active Directory Information Technology Term Paper
10 pages (2961 words) , Download 1 , Term Paper
Free
 The Active Directory is a technology released by Microsoft. It was first reviewed in 1999; however, the technology was available in the market with the Windows Server 2000 edition. Later it was revised to meet requirements of the Windows Server 2003 and later 2008. When it was revised for Windows Server 2008 and Windows Server 2008 R2, its name was changed to Active Directory Domain Services. 
Preview sample
3051 - 3100 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us