StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Features of Human Computer Interface and Web Accessibility Information Technology Coursework
12 pages (3129 words) , Download 1 , Coursework
Free
HCI involves input and output devices as well as the techniques that use them. It also deals with how information is presented; how it is requested; how computer actions are monitored and controlled;  all types of documentation, help, and training; the tools required to build, test, and assess user interfaces; and the procedures that developers follow when producing interfaces.
Preview sample
Practical Windows Security: Role and Function of an Active Directory Information Technology Term Paper
10 pages (2961 words) , Download 1 , Term Paper
Free
 The Active Directory is a technology released by Microsoft. It was first reviewed in 1999; however, the technology was available in the market with the Windows Server 2000 edition. Later it was revised to meet requirements of the Windows Server 2003 and later 2008. When it was revised for Windows Server 2008 and Windows Server 2008 R2, its name was changed to Active Directory Domain Services. 
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Taking an E-Business Initiative in EasyTravel Ltd Information Technology Case Study
7 pages (1932 words) , Download 1 , Case Study
Free
An e-business initiative should be developed with comprehensive planning and integration within the organization is very important. Training sessions should be carried out before the implementation of new technologies to avoid any resentment from the employees. The software can be outsourced or developed internally by the technical staff of the company.
Preview sample
Main Features of Networks and Distributed Systems Information Technology Coursework
7 pages (2054 words) , Download 1 , Coursework
Free
In this period, along with continuous progression in the communication technology and also with the accessibility of powerful yet cheap microprocessors, in PCs, PDAs, Workstations, and embedded systems, the distributed system has been used.
Preview sample
Methods Available for Maintaining Computer System Security Information Technology Coursework
8 pages (2181 words) , Download 1 , Coursework
Free
The different threats are extremely important for an organisation and also an individual. Therefore, computer security is a must in every field. Computer security can be achieved in different ways such as by using an anti-malware program, by using cryptography technique to encrypt the data, and also various other methods.
Preview sample
Information Systems in Accounting and Finance Information Technology Case Study
6 pages (1848 words) , Download 1 , Case Study
Free
By evaluating the AIS, there are numerous issues within the organization domain as well as the outside domain. The best practices are to minimize the issues within the organization initially by internal control procedures. Denial of service attacks results in a complete system failure and must be prevented to ensure the availability of the AIS. 
Preview sample
How Can Research Findings Be Made More Accessible to Practitioners Information Technology Case Study
8 pages (2376 words) , Download 1 , Case Study
Free
Society is now faced with the advancement in technology which pervades and dominates all facets of a person’s life. Health care practitioners and researchers focusing on children’s studies have envisioned the fast pace of technological breakthroughs as both beneficial and risky in the sense that new devices are put to work for greater access. 
Preview sample
Mobile Communication Information Technology Assignment
9 pages (2476 words) , Download 2 , Assignment
Free
An application can have many displayable objects such as forms, alerts, lists, textboxes and canvases. In order to enter the dimensions and description details of a house on a PDA is the canvas class can be used to enhance the graphical appearance and textboxes can be drawn to enter the dimensions such as the area, width etc of the room.
Preview sample
Quantitative Methods for Computing Information Technology Case Study
6 pages (1955 words) , Download 2 , Case Study
Free
Most people use computers all through the week and also organizations value the importance of orienting their staff on computing as this appears to be the driving force for most organizations. From table 9, most respondents agree that they have been trained by their employers and that computing was part of the training. 
Preview sample
Is Post-industrial Society the Same Thing as Information Society Information Technology Essay
8 pages (2000 words) , Download 2 , Essay
Free
Today, we are now standing at the threshold of a period of the same innovation which fuels a rapid development in every fiber of contemporary society. This is societal technology based on the combination of computer and communications technology. 
Preview sample
Voice over Internet Protocol: Security, Vulnerabilities and Recommendations Information Technology Research Paper
8 pages (3114 words) , Download 2 , Research Paper
Free
In particular, as DoS attacks are an emerging threat, anti-DoS software should be used. Important VoIP communications should be encrypted Besides software, social control measures have also been discussed, which are just as important as deploying software controls due to human vulnerabilities. All potential vulnerabilities must be identified. 
Preview sample
Independent Expert Witness Use of Computer Forensic Information Technology Coursework
10 pages (2831 words) , Download 2 , Coursework
Free
Computer forensics consulting firms or freelance computer forensic investigators are also hired by large corporations to test the information systems security they have in place. Computer forensic specialists will mimic how a malicious hacker might attempt to gain access to a corporation's computer network.
Preview sample
Important and Critical Data of Business Information Technology Term Paper
9 pages (2376 words) , Download 3 , Term Paper
Free
Backup usually refers to the copying of data so that they can be restored after a data loss event. It is the last line of defence against the data loss, and consequently the least granular and the least convenient to use. Many types of storage media such as magnetic tape, hard disk, an optical disk.
Preview sample
Enterprise Resource Planning Information Technology Case Study
9 pages (2793 words) , Download 2 , Case Study
Free
The information technology is the main driver for the economic growth of organizations since the innovation produced by the information technologies has revolutionized. The development of information systems such as enterprise resource planning systems has revolutionized not only the ways in which products, goods, and services are traded, however how they are distributed to customers.
Preview sample
Ethics and Regulations in IT Information Technology Essay
8 pages (2428 words) , Download 2 , Essay
Free
They are not interested in looking inside the box. Users believe that computer professionals are there to be able to help them with things like designing, locating, retrieving, using, configuring, programming, maintaining, and understanding not only computers but their networks, application, and digital objects (Denning, 2008).
Preview sample
E-Commerce Websites as a Guarantee of Effective Trade Information Technology Research Proposal
9 pages (2600 words) , Download 2 , Research Proposal
Free
Results from previous studies have shown that system quality is the major factor that affects the ease of use of a site as perceived by the users. On the other hand, information quality impacts their perception of usefulness. Yet again, service quality impacts trust but may not necessarily affect perceived usefulness and ease of use.
Preview sample
Expert Choice Software with AHP Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
The success in such a situation lies in the right selection of the right project at the right time, which is not easier. The project is a plan of action or a preceding function. For the success of which, the proceeding must be effective. Irrespective of the area, the project will be definitely involving men, materials and money as basic inputs.
Preview sample
Machine Learning Algorithms and Tools Information Technology Essay
8 pages (2112 words) , Download 6 , Essay
Free
Machine learning is a branch of computer science that involves the usage of computer software and algorithms that allow the computer to model data. The technique is uses data to improve its accuracy at a given task. Data is required because unlike humans who learn from their past experiences, machines cannot learn in a similar fashion.
Preview sample
Information Technology in Young's Seafood Ltd and QAD Inc Information Technology Case Study
8 pages (2000 words) , Download 2 , Case Study
Free
It is quite essential to state that MFG/PRO gathers information like strategic intelligence. It gathers all the information about the companies own financial and operational position along with intelligent data gathering of its customers and market makes it a perfect tool for the management to get assisted with.
Preview sample
Analysis of the Technology in Healthcare Information Technology Case Study
7 pages (1969 words) , Download 1 , Case Study
Free
First, the sensitization of senior nurses on the advantages of electronic medical records is very important for the future state of the information system in the hospital. Second, education on the use of electronic medical records is very important in the future to avoid errors in data entry and processing.
Preview sample
Information Management Systems in Health Institutions Information Technology Case Study
6 pages (1818 words) , Download 0 , Case Study
Free
Management of patient information is significant in any health institution since it helps in the provision of quality healthcare services to patients. There is an increase in technological changes which determine how healthcare activities are supposed to be conducted in a way that leads to efficiency in service provision.
Preview sample
Virtualization Comparison: VMware, Microsoft Hyper-V and VERDE Information Technology Term Paper
6 pages (1842 words) , Download 2 , Term Paper
Free
In conclusion, it is evident that virtualization solutions play an important role in terms of increasing the efficiency of desktops and servers. It is also evident that each of the virtualization solutions offers unique services to the users. The experience of the users is also enhanced through the virtualization process.
Preview sample
The Problems Encountered in the Selection of Lexical Items Used on Facebook Information Technology Literature review
6 pages (1753 words) , Download 0 , Literature review
Free
A speech community can easily be identified by the words provided, as the words are highly specific to given speech communities that share common interests. Facebook has indeed proved a speech community as it has lexical items that, as discussed, identify it as one, and these lexical items stand the test of word-formation processes.
Preview sample
Development of Mobile Application Information Technology Assignment
6 pages (1855 words) , Download 0 , Assignment
Free
The awareness was evidenced by their excellent knowledge of the procedure used by the team in planning and tracking not only the quality but also the timing of the required tasks. The team leader earned the respect of the team members because of always consulting with the team members prior to making crucial decisions.
Preview sample
Cloud Computing and Virtualisation Information Technology Assignment
7 pages (1868 words) , Download 1 , Assignment
Free
In essence, multi-tenancy entails the implementation of resource-sharing and virtualization in the cloud computing environment. Even though several contradicting arguments have emerged from software developers and security experts, cloud service providers (CSPs) continue to use multi-tenancy in certain cases.
Preview sample
Data Communications and Network Information Technology Assignment
7 pages (1950 words) , Download 0 , Assignment
Free
The paper “Data Communications and Network”  is a worthy example of an assignment on information technology. As we have seen, the Internet layer of TCP/IP has two protocols – IPv4 and IPv6. The transport layer provides two main protocols TCP and UDP (along with some special-purpose, minor protocols). But these are for very different reasons. 
Preview sample
Definition Data Communications Information Technology Assignment
6 pages (1719 words) , Download 0 , Assignment
Free
These are the differences between the TCP and the UDP. The TCP is connected based, the data makes its way across from source to destination. The UDP is not connected based meaning that one system can send a load of data to another and the relationship ends (Kumar & Rai, 2012). The other important feature of TCP IS reliability that implies all data is acknowledged. On the other hand, UDP is unreliable and there is no data acknowledgment.
Preview sample
Critical Evaluation of the Web Site of the University of Newcastle Australia Information Technology Case Study
6 pages (1656 words) , Download 0 , Case Study
Free
This report examines the website of the University of Newcastle Australia. The report critically analyzes this website with the sole of aim revealing the strengths and weaknesses of its architecture. The evaluation of the website entails a keen analysis of the homepage, the overall look of the website, and the general views that users of the website can have about it.
Preview sample
The Impact of Incorporation of Information and Communication Technology in Today's Business Environment Information Technology Essay
6 pages (1717 words) , Download 0 , Essay
Free
The incorporation of information and communication technology (IT) has impacted greatly the business environment. Ways of doing business have changed and made organizations highly efficient. The improved modes of communication have opened new channels for carrying out business beyond geographical borders (Agnes & Stanislav, 2010).
Preview sample
Comparing and Contrasting Security Threat Assessment and Security Risk Assessment Information Technology Literature review
6 pages (1847 words) , Download 0 , Literature review
Free
The essay has compared and contrasted security threat assessment and security risk assessment for contemporary security and intelligence professionals. Risks are the frequency or probability of certain undesired events; therefore, the risk assessment seeks to quantitatively assess the likelihood of an event happening or the rate of occurrence.
Preview sample
The Information Security Risks of Using Mobile Apps for Individuals and Organizations Information Technology Term Paper
6 pages (1843 words) , Download 0 , Term Paper
Free
For mobile operating systems like iOS and Android, Hayikader et al. (2016) suggest that they can use the traditional access control to augment their security. This includes using more authentic and secure passwords that cannot be deduced by intruders. It also requires using screen locks whenever a mobile device is idle. 
Preview sample
Regulation of Information and Communication Technologies - Digital Terrestrial Television Information Technology Case Study
8 pages (2415 words) , Download 2 , Case Study
Free
The earlier ventures of the DTT were mainly undertaken under an unviable business model. The commercial broadcasters were burdened with high-coverage obligations. The earlier ventures also resulted in expensive set-top boxes resulting from an excessive technical focus. However, recent regulatory developments have taken care of these issues.
Preview sample
Computer and Information Technology Ethics in Saudi Arabian Business Organizations Information Technology Case Study
8 pages (2478 words) , Download 2 , Case Study
Free
The use of computers and information technology can be understood to have become a a major part of the lives of today’s generation. Be it in the education system or the organizational cultures, information technology is one of the most flexible applications to provide huge benefits to its users.
Preview sample
Emerging Technology of Facebooks Timeline Information Technology Assignment
6 pages (1865 words) , Download 0 , Assignment
Free
The paper 'Emerging Technology of Facebook’s Timeline' is a great example of an Information Technology Assignment. This paper looks at the emerging trends, future, outlook, and applications of technology on Facebook’s timeline and observes that while a majority of users have adopted the same, innovators are using it as a platform for marketing new apps.
Preview sample
Outsourcing Information Technology in the Public Sector in Saudi Arabia Information Technology Research Paper
20 pages (6015 words) , Download 0 , Research Paper
Free
The paper "Outsourcing Information Technology in the Public Sector in Saudi Arabia" is a perfect example of an information technology research paper. This research paper seeks to find out is IT outsourcing in Saudi Arabia’s public sector present solution or problems to the running of the public service.
Preview sample
Use of Information Technology in Theater Information Technology Assignment
6 pages (1676 words) , Download 1 , Assignment
Free
Information technology is increasingly becoming part of the daily lives of the people. Information technology concepts are being used on a daily basis to simplify different tasks. This is through the automation of tasks that used to be performed manually. In order for the tasks to be automated by information technology, a proper design is required and the task at hand should be understood fully.
Preview sample
Cloud-Based System for S-mart Retail Company Information Technology Case Study
8 pages (2120 words) , Download 2 , Case Study
Free
The diagram clearly shows all the components of the design required for the effective and reliable functionality of the cloud-based system for the company. The design demonstrates a service model that applies SaaS design because the company only needs to access applications, data, and information from the cloud to ensure low IT costs.
Preview sample
Cloud Computing and Virtualization in S-mart Information Technology Case Study
6 pages (1635 words) , Download 1 , Case Study
Free
Cloud computing is associated with risks such as inability to access the internet leaving data out of reach, lack of room for negotiation, reliance on the third party, business data at risk, and automatic updates risk. As a result, the company decided to design its own model to mitigate some of the risks associates with cloud computing. 
Preview sample
Gold Storage Facility Surveillance Design Information Technology Case Study
8 pages (2420 words) , Download 0 , Case Study
Free
Although so many installed CCTV systems do not deliver the role of identifying, deterring, and preventing security crimes; it can do a lot better if a good thought is put into its design, configuration, and installation. Albeit being a key security measure, CCTV surveillance is complemented by other security systems such as access control, intruder alarms, and proper mechanical protection.
Preview sample
Computer Networks -Development of Ethernet Information Technology Assignment
10 pages (2689 words) , Download 1 , Assignment
Free
In modern switched Ethernet networks, it is not unusual for a router to receive more traffic than it is able to forward due to the relative speeds of the Ethernet network versus the links from the router to other networks or the Internet. In such circumstances, packets would be randomly dropped either by the router or by the interconnecting switch when buffers are filled.
Preview sample
Using Excel and SPS in a Major Research Paper Information Technology Assignment
8 pages (2000 words) , Download 2 , Assignment
Free
An active cell in a spreadsheet has a darker border and is the only one in which typing can be done. To make a cell active, click on it or use tab, return key, or cursor keys to move the dark border to a selected cell. The spreadsheet within the Data Editor has rows that correspond to a case or subject. The columns represent variables.
Preview sample
Apple Inc.: iPod and iTunes Information Technology Assignment
6 pages (1944 words) , Download 0 , Assignment
Free
The paper "Apple Inc.: iPod and iTunes" is a great example of an assignment on information technology. The iPod has been touted as a reflection of Apple’s innovative mastery (Ashcroft 2011, p. 7). Launched into the consumer market in 2001, the iPod had innovative design and functionality ideas never again seen in the market (Ashcroft 2011, p. 7).
Preview sample
Enterprise Systems for Management Information Technology Assignment
8 pages (2097 words) , Download 0 , Assignment
Free
The paper "Enterprise Systems for Management" is a great example of an information technology assignment. Functional silo refers to an individual business function that behaves in a manner as though it is a stand-alone function. This indicates that the individual business function often formulates its own strategies and work plans in a very independent way from other business functions.
Preview sample
The Concept of Cloud Computing and Virtualization Information Technology Assignment
6 pages (1986 words) , Download 1 , Assignment
Free
The emergence of cloud computing has led to a paradigm shift in how people are delivering and managing services over the internet. The rapid change has revolutionized the landscape of information technology and making the promise of utility computing to be a reality. The rapid change necessitates the understanding of this phenomenon and how it works as well as the technologies used. 
Preview sample
Analysis of Cloud Computing and Virtualisation Information Technology Assignment
6 pages (1641 words) , Download 2 , Assignment
Free
New technologies have enabled enhanced applications such as cloud computing to develop. The new technology has proven efficient when used as a communication application within an organization. Cloud computing is one of the developments realized during digital error where the network is an essential resource.
Preview sample
Cloud Based Management Information System Information Technology Essay
8 pages (2361 words) , Download 4 , Essay
Free
There are no legal or moral issues associated with the use of Cloud MIS. However, there exist some privacy concerns regarding its use. Privacy of data is the biggest concern for companies using Cloud MIS, as they do not feel it safe to send their business and financial information on the internet to the cloud service providers.
Preview sample
Global System for Mobile Communications Information Technology Essay
9 pages (2430 words) , Download 2 , Essay
Free
Localization of users can be done using three GSM localization methods. Firstly, it can be done using the subscriber's cell ID. Here, the user’s cell ID  is used to locate the position of the subscriber by mapping the area using the broadcasting towers. Therefore, when a subscriber makes a call, then the operator can easily locate where the caller is using the broadcasting tower.
Preview sample
Best Practice for Software Developers in Mobile Application Development - Security and Challenges Information Technology Case Study
11 pages (2982 words) , Download 2 , Case Study
Free
The information technology discipline has seen a monumental change in the development of the information systems that initially focused on web-based platforms, to a sophisticated mobile environment. It can be explained by the consumer changes in electronic gadgets commonly used. Mobile devices have replaced Laptops and desktop computers.
Preview sample
Virtual Learning Environment Information Technology Essay
6 pages (1592 words) , Download 0 , Essay
Free
The paper "Virtual Learning Environment" is a perfect example of an information technology essay. The report will provide a critical review as well as a comparison of three open-source and propriety VLE software platforms. The report will provide an explanation of what each platform entails. The report will also provide the functions, advantages, disadvantages of each platform.
Preview sample
Information Security Contemporary Issues Information Technology Literature review
7 pages (2020 words) , Download 0 , Literature review
Free
The paper "Information Security Contemporary Issues" is a wonderful example of a literature review on information technology. The aim of this project is to look at contemporary issues in information security with the purpose of discussing threats and developments that have been witnessed in information security.
Preview sample
3101 - 3150 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us