StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Importance of Internet Policy in Telstra Company Information Technology Research Paper
16 pages (4000 words) , Download 2 , Research Paper
Free
Social media dominate on young workers very quickly and it creates a tendency of posting comments related to anything they wish is a crucial situation for human resource management and efficient policy only can work out to avoid further risks. What factors to be considered in setting and implementing such a policy has been described in this paper.
Preview sample
Private Internet Usage in the Workplace and Privacy Information Technology Research Paper
16 pages (4000 words) , Download 2 , Research Paper
Free
The author states that organizations have found it necessary to regulate internet usage in the workplace, especially with the emergence of many social networking sites. Telstra is one such organization that formulated an organizational policy aimed at enhancing best practice while engaging in social networking.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Semantic Web Technology Information Technology Case Study
6 pages (1969 words) , Download 3 , Case Study
Free
Some feel that semantic is just a fancy word for bringing data together in a quick and easy way (Baumann, 2009). Miller cites people who feel that it would be difficult for people to accept this technology because the nomenclature itself is complex. The term ontology discourages people from even making an attempt to understand the technology.
Preview sample
Scope of MIS on Business Activities Information Technology Research Proposal
2 pages (774 words) , Download 7 , Research Proposal
Free
The application has also facilitated better communication among various inter-related factors thus creating a wider database of new opportunities. P ‘Access to information represents the basic precondition for success of
Preview sample
Social Networking Information Technology Literature review
4 pages (1266 words) , Download 0 , Literature review
Free
Postman (2009) proposed the concept of Social Corp. He said that companies such as Dell, IBM, and P&G, etc. have used social media to redefine their relationships with the customer and other important audiences. Companies can reach more bloggers, journalists, analysts, employees, customers, shareholders, and business partners with increased frequency using social networking sites. Such companies are defined as Social Corp by Postman.
Preview sample
Computer Privacy Issue Information Technology Essay
6 pages (1616 words) , Download 1 , Essay
Free
In the end, it would be appropriate to state that privacy will continue to linger on as one of the most important elements of computer networks worldwide. The personal and business use of the websites, discussion groups, intranet systems and so on have thus largely banked on the premise of privacy.
Preview sample
Computing Information System Information Technology Research Paper
6 pages (1374 words) , Download 1 , Research Paper
Free
The utilization of the information technology in every field of life is emerging day by day and it has transformed the working and handling of systems into a more manageable structures. This emergence of technology has inspired all aspects and areas of life. The system I am going to discuss is as well a better depiction of information technology implementation into different living and working sectors.
Preview sample
The Influence of the Web in Our Lives Information Technology Essay
4 pages (1103 words) , Download 0 , Essay
Free
Industrialization brought about major changes in the attitudes of people because they came to accept the commercial boom they were experiencing. By the 19th century, the U.S was considered the biggest industrial power to reckon with in terms of capitalism, commercialism and advancement in science and technology.
Preview sample
History of Phishing and Development Information Technology Research Paper
20 pages (5000 words) , Download 2 , Research Paper
Free
The author states that Phishing is an emerging problem regarding online data security and information safety. There are several cases of the identity theft and online frauds using phishing and other hacking techniques, but this paper will concentrate mainly on the positive aspects of the phishing like that its use for the website verification.
Preview sample
Business of Dell in India Information Technology Assignment
7 pages (2242 words) , Download 1 , Assignment
Free
The author states that the large multinational corporations of repute commenced outsourcing their activities in India as the trade policies were liberalized and governmental restrictions were removed. The first industry to take such benefit was that of medical transcription. In the mid-nineties, the telecom sector was removed from a government monopoly.
Preview sample
Critique of the OPEC Website Information Technology Assignment
5 pages (1250 words) , Download 1 , Assignment
Free
Located below the title box on the right side, OPEC features its press conference on OPEC publications to be held in Austria on July 8, 2009. The conference is emphasized with bold huge fonts. Below this feature conference is the mission of OPEC. The area below mission was divided into two sections
Preview sample
A Data Warehouse Information Technology Assignment
4 pages (1133 words) , Download 0 , Assignment
Free
One of the probable sources where AFC could gather this data is through a customer feedback system after completing their meal. This feedback system might ask the customer for filling forms and ask for the customer name, address, and other details. Another likely source of this information can be purchased this information from some third-party vendor.
Preview sample
The Virtual Team Information Technology Research Proposal
4 pages (1297 words) , Download 0 , Research Proposal
Free
Teams make use of an assortment of techniques throughout the variety of connections taken through team associates. A number of these techniques encompass setting up a code of conduct, insignificant group technique, establishing conference programs, brainstorming, assessment making plus open space technology, straight away, to name a small number of.
Preview sample
Photoshop Foundation Information Technology Assignment
6 pages (1500 words) , Download 2 , Assignment
Free
At present, most websites include more than just text and links. In other words, websites are making use of multimedia technology (Shelly, Cashman, and Vermaat). It can also be defined as, making use of computers tools, techniques, methods and knowledge to present graphics, text, animation, video, and sound in an incorporated way.
Preview sample
The Future of the Internet Information Technology Research Paper
5 pages (1250 words) , Download 1 , Research Paper
Free
The conclusion states that the future of the internet is very bright. It has facilitated us with many benefits till now and many hopes are associated with updated versions of the internet and its applications. It is hoped that in future, the internet will accommodate the humankind with the many more advantages that will bring ease and facilitation in the lives of people all around the world.
Preview sample
Phishing, Pharming, and Vishing: Computer Security Information Technology Coursework
9 pages (2624 words) , Download 1 , Coursework
Free
This paper will outline the main concerns that are increasing with technology improvements. Now we are no more secure in the web-based environment. We are facing online criminal attacks from different sides. It is time now to understand these different shapes of online criminal activities and try to avoid them.
Preview sample
The Impacts of Information Systems in Government Organizations Information Technology Research Proposal
9 pages (2773 words) , Download 1 , Research Proposal
Free
The author states that it can be seen that relevant information on the community is available mainly through the internet. But the government itself admits that the community still remains backward in social issues. The availability of data and the resulting information are essential components for any organization to be effective.
Preview sample
Internet Security: Privacy and Confidentiality Information Technology Research Paper
20 pages (5000 words) , Download 4 , Research Paper
Free
The paper discusses the evolution of the Human Resource functions to internet-based applications, the implications of consequent present-day vulnerabilities like hacker attacks, and the ever-increasing rates of cyber crimes. Recent developments in the field of encryption of data and other forms of securing privacy of information are also discussed.
Preview sample
Latest Advances in Hotel Computer Systems Information Technology Term Paper
9 pages (2405 words) , Download 2 , Term Paper
Free
Out of all these, it must be highlighted that while the computer and all its entailing technologies are awesome because of its capacity and speed to process accurate information, it is not perfect. This line of thinking is very important in the hotel industry since their product is all about excellent service.
Preview sample
Internal Controls of Information Technology Information Technology Essay
6 pages (1640 words) , Download 4 , Essay
Free
The completeness of the list of new employees and the changes in payroll information, the accuracy of the details and the changed information and existence of the actual payroll liability of the company are key criteria. One control in this process is the matching of the attendance files of the employees against the updated employee file.
Preview sample
The Organizational Communication Network for the ACME Corporation Information Technology Term Paper
10 pages (1664 words) , Download 0 , Term Paper
Free
In the ACME Corporation MAN Network construction, we will require better communication and data transfer facilities among the network's different hope. Here we will establish better services for data communication and information transfer. Here we need to establish a better network infrastructure that supports effective communication.
Preview sample
Key Points of an Electronic Discovery Information Technology Report
5 pages (1483 words) , Download 0 , Report
Free
Electronically stored information differs from paper information due to its intangible form, persistence, volume, transience, and presence of metadata. This paper highlights the key points of an electronic discovery response plan and associated procedures suitable for a quick and proper response to a discovery request for electronically held information.
Preview sample
Planning Skills in Graphic Design Information Technology Personal Statement
17 pages (4250 words) , Download 2 , Personal Statement
Free
The author states that such planning allows him to enhance or change his projects where required. He is a hard and disciplined worker and believes in himself. He is also a team player and works well with others. For example last year, four of them freelancers worked on a website.
Preview sample
Analysis of Advanced Networks Information Technology Assignment
9 pages (2250 words) , Download 2 , Assignment
Free
  The minimum transmission time necessary to transmit the minimum packet size is known as the slot time. For 10 / 100 Mbps the slot time is 512-bit times, which not coincidentally happens to be the minimum length of an Ethernet packet (64 octets is 512 bits).  For Gigabit Ethernet, the slot time is 4096-bit times.
Preview sample
Voice over Internet Protocol: Security, Vulnerabilities and Recommendations Information Technology Research Paper
8 pages (3114 words) , Download 2 , Research Paper
Free
In particular, as DoS attacks are an emerging threat, anti-DoS software should be used. Important VoIP communications should be encrypted Besides software, social control measures have also been discussed, which are just as important as deploying software controls due to human vulnerabilities. All potential vulnerabilities must be identified. 
Preview sample
What Is the Function of the National Archives of Australia Information Technology Case Study
9 pages (2421 words) , Download 3 , Case Study
Free
The integrated approach results in an integrated and unified front in the nation, and enables them to have a common understanding of their past and all things related to their past, due to the attested and credible nature of the provided material, a sense of relationship with it and a sense of belonging also develops amongst the nation.
Preview sample
Information Technology of Union Group of Companies Information Technology Case Study
10 pages (2500 words) , Download 3 , Case Study
Free
The conclusion from this study states that to experience and ensure sustainable development of the business, the extensive use of information technology is a must. If any business organization does not have enough provision for information technology it is certain to get perished. But taking information technology in one’s side, one might expect to be the market leader.
Preview sample
The Role of the Digital Revolution in Changing the Concept of Space Information Technology Essay
9 pages (2538 words) , Download 1 , Essay
Free
The Internet keeps people ‘connected’ every moment of their lives across continents, overcoming barriers of time and space. The Internet has changed the way people socialize; the internet has its own etiquettes (netiquette) and culture. The development of the internet has given new currency to the ideas of McLuhan and Adorno.  
Preview sample
Effects of Internet Pornography on Society Information Technology Research Paper
10 pages (2500 words) , Download 4 , Research Paper
Free
This research will begin with the statement that with the introduction of the World Wide Web, life has become fast and convenient. Sadly, even crime has become fast and convenient as well. Among the many crimes committed over the Internet or because of its influence, this paper will be focusing on one of the most disturbing ones, Internet pornography.
Preview sample
Major Issues in Identity Fraud Information Technology Research Paper
48 pages (8599 words) , Research Paper
Nobody downloaded yet
Identity fraud raises a strong challenge on the existing electronic and online business transactions. If identity fraud becomes common in modern banking transactions, people may lose faith and trust in the new systems which are based on the latest technology. The banks may be forced to switch back to the traditional methods of transactions.
Preview sample
Ambient Intelligence Information Technology Essay
4 pages (1243 words) , Download 0 , Essay
Free
Ambient Intelligence is something women, especially those who have a regular job, have been hoping and praying for through decades after decades. Now the shopping list will be automatically prepared by the microchip embedded in the fridge and it will be communicated to the supplier with specific instructions of delivering it at the nearest nodal point.
Preview sample
Camera Phone Technology in the Market Information Technology Essay
6 pages (1500 words) , Download 3 , Essay
Free
The author states that the camera phone is a type of mobile phone with the capability to take either digital photographs or videos that are moving. The popularity of the said product had been considered due to the pragmatic view that one can achieve the advantages of both the mobile phone and the digital cameras in one.
Preview sample
The Concept of a Wide Memory Bank Information Technology Essay
4 pages (1052 words) , Download 0 , Essay
Free
Google was launched in 1998 but no one wanted to buy or grant any license to Brin & Pages’ search technology. However, $100,000 came from Andy Bechtolsheim, computer scientist & owner of Sun Microsystems, and, in the next year, $25 million from venture capitalists Sequoia Capital and Kleiner Perkins Caufield & Byers (KPCB).
Preview sample
Diffusion of the Mobile Commerce in Dubai Information Technology Research Paper
12 pages (3000 words) , Download 2 , Research Paper
Free
 Being the largest city in UAE, Dubai has always set an example for other Middle East nations in taking up newer initiatives. With a dependable mobile communication network and a high level of mobile communication penetration, it will be interesting to know the kind of value-added services are on offer in Dubai.
Preview sample
Wireless Compatibility with Information Systems Information Technology Research Paper
4 pages (1000 words) , Download 0 , Research Paper
Free
This paper tells that the use of “conventional” here does not refer to “legacy” systems; but to the current computing devices that run well known computer operations systems (e.g. Windows, Mac OS, Linux, and UNIX) and connect to IP networks via wired or wireless based technology that was meant to be a link layer for carrying TCP/IP packets.
Preview sample
Instruction Manual Promotional Media Information Technology Assignment
13 pages (3250 words) , Download 2 , Assignment
Free
Projects involve the creation of documents and media files, mainly in a proprietary format; e.g. advertisement copy, scripts for video shoots, campaign schedules, artwork etc., that must be regularly exchanged in digital format with clients for comment and approval. Documents need to be held and transferred securely.
Preview sample
Globalization Affected the World Information Technology Admission/Application Essay
5 pages (1250 words) , Download 2 , Admission/Application Essay
Free
The boundaries and regulations which used to preserve and protect the uniqueness of locally relevant identities have been liberalized so that the access to them is allowed to all with no restriction. Moreover, this trend which was prevalent initially only in the economic scenario has in the recent years become highly evident in all realms of life.
Preview sample
Skype: Current and Future Use of Internet Technologies Information Technology Coursework
5 pages (1410 words) , Download 0 , Coursework
Free
The Internet has emerged as one of the most popular media of communication with its wide range of applications in the ever-expanding and highly competitive business environment. The phenomenal growth in the Internet user database has made it a formidable adversary for those in a public place who now need to cultivate public behavior. 
Preview sample
What Is 3G Wireless Technology Information Technology Research Paper
7 pages (1750 words) , Download 3 , Research Paper
Free
3G or the third-generation wireless was used to refer to this age development in personal and business wireless technology, particularly the mobile communications. 3G or The Third Generation ushers in many benefits with its mobility, broad bandwidth and high-speed communication (upwards of 2Mbps). 
Preview sample
Client-Server Communications Technology Information Technology Research Paper
7 pages (1750 words) , Download 2 , Research Paper
Free
With the emergence of technology we need more data communication and data transfer to survive in the fast technology age. For this purpose we need a network that can deliver better, fast and secure data transfer. The main aim of this research is to analyze the connection and connectionless client-server structure and communication protocols.
Preview sample
Treatment of Cybercrime Information Technology Coursework
10 pages (2759 words) , Download 2 , Coursework
Free
The statistics are has shown that they are now trying to protect themselves against the long-lasting trauma of cybercrime. Nonetheless, studies over the recent years have indicated that such crimes have increased more rapidly not only in Canada but also across the globe as well. The development of the internet and computer technology has revolutionized.
Preview sample
The Significant Role of Payment Technologies Information Technology Case Study
19 pages (4750 words) , Download 2 , Case Study
Free
Another breakthrough in the sector of information technology is eye-scanning technology that scans human eyes, in order to recognize iris patterns that are considered unique in every human being. In specific, images are taken with the help of a high-resolution camera that verifies and authenticate iris patterns of customers.
Preview sample
WiMAX - Technology Integrating the Internet and Broadband Information Technology Article
12 pages (3000 words) , Download 3 , Article
Free
WiMAX is a perfect choice for providing the broadband services to the areas where it is difficult to manage the wired connections for any reason. So, it is also possible to provide the WiMAX technology by routers or bridges to the Local Area Networks (LANs). The WiMAX can provide a shared data rate of 70Mbps.
Preview sample
Project preparation Information Technology Essay
4 pages (1163 words) , Download 0 , Essay
Free
Robin and Frank Rennie on the other hand look at one could design a course in a distributed environment using social networking tools. He also outlines the strength and weaknesses of developing content for various media formats for various hardware platforms. The media formats that he talks about include podcasting and webcasting.
Preview sample
Wireless Personal Area Network's Opportunities Information Technology Article
8 pages (2000 words) , Download 2 , Article
Free
Through the use of PAN, it is possible to transfer data such as mails, files, digital audio, and media. However,  PAN range covers an only small area such as 10 meters or less . On a practical level, PAN translates to transferring or passing information from one person to another using touch which we do nowadays use infrared.
Preview sample
Development Of Microsoft Windows Operating Systems Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Vista was accused of “software bloat”, referring to the size that Vista takes up on the disk. This “software bloat” of the operating system drained battery life on laptops much more quickly than computers running on XP. Many programs, in addition, did not run at all on Vista. This kept many businesses from moving to Vista as a permanent solution.
Preview sample
DVD Duplication and Authoring Business Information Technology Assignment
9 pages (2250 words) , Download 2 , Assignment
Free
It is evidently clear from the discussion that the MAC system is a well-designed system that comes with a nice looking monitor and matching external peripherals. As in the Linux system, MAC also has a number of pre-listed software to choose from. The hardware in a Mac system is as per company settings.
Preview sample
Addressing the Digital Divide Information Technology Research Paper
12 pages (3000 words) , Download 2 , Research Paper
Free
 The use of this technology got into the public domain in the late 1990s. So far it has not reached the majority of the world’s population. It has led to an enlargement of the exclusion of some communities attributed to the capability of accessing digital technology by some while others can not.
Preview sample
E-Payment Systems Information Technology Research Paper
10 pages (2953 words) , Download 1 , Research Paper
Free
The majority momentous partitions of the US financial system rely on the continuation of protected e-payment system networks and online payment computer systems. Power manufacturing delivery, transport, and emergency services, banking and economics, telecommunications are the absolute fractions of the imperative nationwide structure.
Preview sample
How Does Saving Energy Consumption Help the Environment Information Technology Essay
6 pages (1500 words) , Download 3 , Essay
Free
We should realize that IT is the backbone of our energy conservation drive because, with the emergence of newer technologies, our reliability on conventional modes has really come down. If IT industries themselves are successful in their endeavor to cut down their energy bills, which is not a distant possibility considering the initiatives they have started taking.
Preview sample
3451 - 3500 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us