StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Invention of Colossus Mark 1 and Other Important Events in History Information Technology Essay
7 pages (1750 words) , Download 2 , Essay
Free
IBM was the originator of the punch card phenomenon. It was whereby the help of the punch cards that the IBM German Subsidiary was able to assist the Nazis in singling out the Jews from among the rest of the Germans. This enabled selective and timely execution and elimination of the Jews at the hands of the Nazis.   
Preview sample
Pair and Parallel Programming Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
This research will begin with the statement that many organizations are adopting the policy of having various programming methodologies in their operations. One of the new models is pair programming that is a concept of extreme programming approach. The concepts campaigns for forming of pairs to run programs for a group.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
The Magic Touch Information Technology Thesis Proposal
10 pages (2500 words) , Download 2 , Thesis Proposal
Free
Premium+
It is necessary to recognize the educational requirements and training preferred by employers. Many, if not all, employers require at least an associate’s degree in computer science--which can be earned at many two-year (community) colleges (“Computer”). Having an associate’s degree in computer science shows poise and commitment.
Preview sample
Amazon's Recovery Procedures in Case of Disaster - Response, Resumption, and Restoration Information Technology Case Study
12 pages (3000 words) , Download 3 , Case Study
Free
Premium+
Amazon Inc. developed the following disaster recovery plan for use in case of any disruption to its different components that allows for its standard day-to-day functions. This recovery plan aims to outline the critical recovery procedures that key personnel must perform during and after interference to ensure normal operations resume as soon as possible.  
Preview sample
Information Technology of Union Group of Companies Information Technology Case Study
10 pages (2500 words) , Download 3 , Case Study
Free
The conclusion from this study states that to experience and ensure sustainable development of the business, the extensive use of information technology is a must. If any business organization does not have enough provision for information technology it is certain to get perished. But taking information technology in one’s side, one might expect to be the market leader.
Preview sample
3G System to Make the Life a Far Easier Walk Information Technology Essay
15 pages (3750 words) , Download 2 , Essay
Free
The author states that the internet initially used to have a very slow speed but that didn’t matter since the time spent to wait was still lower than it used to be before. Gradually, the speed of internet-enhanced and today people can use it whenever they wish to at almost a fraction of the cost that was involved with telecommunications previously.
Preview sample
New Website System for Malak Jewellers Information Technology Research Paper
33 pages (8250 words) , Download 2 , Research Paper
The purpose of implementing the internet for such a business is to enhance the business scope and management of the business operations. By viewing such an enhanced business development through the web-based structures, Malak that is running jewellery designing business desires to establish and renovate the customary business practice.
Preview sample
Computer Data Storage Information Technology Research Paper
10 pages (2500 words) , Download 2 , Research Paper
Free
Primary memory of a computer controls such programs that enable essential functions such as startup and diagnostic performance checks. Primary data storage includes two types of memories, which are random access memory (RAM) and read-only memory (ROM). Khurshudov asserts, “RAM is the working area where programs are run and data is processed”.  
Preview sample
New Perspectives on Microsoft Office Access Information Technology Assignment
9 pages (2250 words) , Download 2 , Assignment
Free
If the value for a member id is ‘Y’, the player is a member and if ‘N’, the player has to renew his membership. Based on the member ID and Player Id relationship, the player details are obtained from the player table. The parameter query to find all members of Team A is created using the ‘Create Query’ option of Access. 
Preview sample
Wireless Ethernet Information Technology Term Paper
9 pages (2483 words) , Download 2 , Term Paper
Free
The paper moves on to a discussion on the relationship of the wireless Ethernet standards and implementations to the OSI networking model, with emphasis on situating the standards elements themselves within that OSI framework. From there the paper discusses the wireless Ethernet standard as it relates to the physical layer. 
Preview sample
Cyber Crimes and Security on the Internet Information Technology Research Paper
8 pages (2263 words) , Download 2 , Research Paper
Free
The internet has revolutionized the business landscape given that the information highways created by digital technology make it possible for different types of businesses to be conducted online. This space is commonly referred to as cyberspace and is not affected by any geographical or physical barrier (Hofman, 17).
Preview sample
Systems, Designs, Innovation of Amazon.com Information Technology Assignment
8 pages (2000 words) , Download 2 , Assignment
Free
This research will begin with the statement that one of the most important issues with modern business is that design of material such as the packaging, branding, logos, etc is very important. The way a product is designed determines how much market it can get. The same case applies to information systems.
Preview sample
Best Practices for Credentialing Post-Acute Providers Information Technology Essay
30 pages (7500 words) , Download 2 , Essay
According to the paper, the SNFs will provide services that maintain and obtains the well-being of the patient both physically, psychosocially and mentally. This will ensure a quality for the patient as well as moving to the next treatment stage. The SNFs in the medical care institution should be qualified and should have several skills.
Preview sample
Using the Internet of Things Device in the Hackinig Process Information Technology Term Paper
19 pages (4750 words) , Download 3 , Term Paper
Free
Premium+
It is evidently clear from the discussion that the assembly level program can be maintained, reconstructed and observed within its side channel. This can create a threat within its side channel. Crypto hardware or algorithm found within the secret data or keys are affected or attacked by the instructions of the traditional power side channel.
Preview sample
Human Computer Interaction Information Technology Dissertation
16 pages (4000 words) , Download 2 , Dissertation
Free
The paper talks about the UI design of a system for RACs, who do non-academic activities in assisting research students right from their induction to the college to their obtaining the PhDs. The will basically coordinate and liaise with different teams in the college, in preparing the various topics for which they admit students for their research work.
Preview sample
Model of Reasons for Use and non-Use of the Internet in Iraq Information Technology Research Paper
37 pages (9250 words) , Download 2 , Research Paper
The stratified sample was taken based on a population registry under the Oil for Food Program of United Nations in 1996 in Iraq. The results revealed that human development indices, human capital, institutional and legal environment, existing technologies, government policy-making and income levels affect Internet accessibility in Iraq.
Preview sample
Agent-Based Modeling in Architecture Information Technology Term Paper
15 pages (3750 words) , Download 2 , Term Paper
Free
The research and development in the field of artificial intelligence have offered a lot of new technology infrastructures and paradigms. The implementation of the modern and up-to-date techniques of artificial intelligence has offered huge advantages regarding machine learning, robotics, and automation of a lot of operating behaviors.
Preview sample
E-Business Strategy of King Abdulaziz University Information Technology Research Proposal
10 pages (2500 words) , Download 2 , Research Proposal
Free
The author of the paper states that the first initiative has been chosen to develop a detailed plan for its implementation. The objective of this report is to highlight the prominent VLEs in the market and evaluate them for their performance. The cost and features of each VLE are also analyzed.
Preview sample
Bluetooth Technology Information Technology Term Paper
8 pages (2000 words) , Download 3 , Term Paper
Free
The author states that the Bluetooth Special Interest Group (SIG) manages Bluetooth and oversees the specification and development of, protection of the trademark, and management of qualification program. SIG comprises of over 1,700 companies in the areas of computing, telecommunication, consumer electronics, and networking.
Preview sample
Computers R Us Information Technology Book Report/Review
7 pages (1750 words) , Download 2 , Book Report/Review
Free
From this paper, it is clear that computer R Us is a company dealing with both the manufacture of computer and retail services for its clients. The company, however, noticed the demand for repair services by its clients and decided to create CompleteCare. CompleteCare was launched to provide quick response to technical inquiries.
Preview sample
Timeliness, Bandwidth and Other Factors Essential When Performing Scans or Enumeration Information Technology Term Paper
12 pages (3000 words) , Download 2 , Term Paper
Free
Premium+
According to Hsu and Marinucci (2013) increased technological advancement has brought about much higher cybersecurity threats. With most companies and governments being forced to adopt technological changes, so has the risk against unauthorized information access been elevated. In most cases, governments and organizations store, transmit and share private and confidential information across the vast network.
Preview sample
Internet Security: Privacy and Confidentiality Information Technology Research Paper
20 pages (5000 words) , Download 4 , Research Paper
Free
The paper discusses the evolution of the Human Resource functions to internet-based applications, the implications of consequent present-day vulnerabilities like hacker attacks, and the ever-increasing rates of cyber crimes. Recent developments in the field of encryption of data and other forms of securing privacy of information are also discussed.
Preview sample
Distributed and Parallel Systems Information Technology Research Paper
16 pages (4000 words) , Download 3 , Research Paper
Free
Parallel processing is a key in modern computers. Parallel computing is explained as the simultaneous execution of the same task that is usually split up in smaller tasks, on multiple processors in order to obtain results faster. The idea is based on the fact that the process of solving a problem usually can be divided into smaller tasks.
Preview sample
Propaganda as Effective Arms in Information War Information Technology Research Paper
7 pages (1750 words) , Download 2 , Research Paper
Free
Although information warfare has been a late development compared to propaganda, a study of a 1928 material on propaganda indicates that it has been weaponized or transformed into a weapon as early as 1928 in the work of Bernays. This is not to say that propaganda was not upgraded when it became information warfare in the last several years.
Preview sample
A Hybrid Shape Representation: Surface Modeling Information Technology Research Proposal
14 pages (3500 words) , Download 2 , Research Proposal
Free
The author states that the number of CAD systems has magnanimously risen over the recent past. Four categories described the systems, which are Wireframe CAD, Surface CAD, 2D CAD, and Solid CAD. This paper narrows down its focus to solely Surface modeling although in a number of instances appropriate comparisons.
Preview sample
Tandem of GlobShop and ISS - Globalization of Software Development Information Technology Case Study
13 pages (3250 words) , Download 2 , Case Study
Free
GlobShop operates in the travel-retail industry across Asia, Australia, North America, and Europe. Headquarter of the company is located in Boston, the US. Since it operates in the travel-retail industry, any changes in the air travel flow of visitors and the consequent economic uncertainties have a significant impact on its performance.
Preview sample
Airline Operations: The Impact of a Global Monitoring System on Safety and Finances Information Technology Coursework
10 pages (2500 words) , Download 2 , Coursework
Free
The use of navigation technologies such as Global Positioning Systems (GPS) in real-time tracking are technologies developed to ensure the ground crew receives data from an aircraft at all times, with respect to condition and position. In every system, it is elemental to consider the possibility of an error, which translates to the GPS system of aircraft tracking not being a hundred percent effective and efficient.
Preview sample
Information Technology in the European Countries Information Technology Assignment
15 pages (3750 words) , Download 3 , Assignment
Free
As the paper outlines, an excellent online tax system boasts of efficiency, simplicity, and decentralization which is best exemplified by an online tax filing system. Moreover, this online tax system is tasked to help taxpayers prepare and file returns in a simple, fast and secure manner. IT is a key enabler of delivering online taxation services. 
Preview sample
Web Site Development Process Information Technology Assignment
9 pages (2250 words) , Download 3 , Assignment
Free
The Internet’s most important advantage is that of speed and ease. For that reason e-business, which makes use of the Internet as the center for carrying out business activities, can support make a corporation more customer-friendly as well as several other things, for instance creating a well-organized exchange of information and/or services?
Preview sample
Use of IT in Marketing Information Technology Case Study
15 pages (3750 words) , Download 2 , Case Study
Free
According to the research findings, it can, therefore, be said that the soft-drinks industry and markets have been dynamic and ever-changing with a tie. They have exhibited life cycles and are usually ever attracting competitors in several numbers as well as various strengths and sizes regarding the stage in the life cycle.
Preview sample
Benefits and Drawbacks of Telecommuting Information Technology Research Paper
9 pages (2250 words) , Download 3 , Research Paper
Free
According to the research findings, many people and organizations are experiencing the benefits gained for both parties that telecommuting offers. There are some occupations that cannot be accomplished by means of alternative scheduling or location. This discussion describes the pros and cons of employers offering telecommuting situations.
Preview sample
Evaluating Methods on the Basis of NIMSAD Information Technology Term Paper
12 pages (3000 words) , Download 3 , Term Paper
Free
NIMSAD (Normative Information Model-based Systems Analysis and Design) is a reflective and problem-based framework meant to evaluate system design and analysis methodologies. It not only allows critical evaluation of the entire experience but also facilitates the user to learn from the conclusions and recommendations.
Preview sample
Management Information and Communication Systems Information Technology Research Paper
16 pages (4000 words) , Download 2 , Research Paper
Free
The author of the paper tells that the management of information and communication systems (MICS) involves the processing of raw data into relevant bits of information that help organizations in efficient decision making. Information required by organizations is collected through various online and offline sources that provide the managers with vital inputs on business processes and market trends.
Preview sample
Targets for Cyberterrorism Information Technology Research Paper
42 pages (10500 words) , Download 3 , Research Paper
The researcher states that technology, or to be more precise, the power of the Internet and high-speed computers distinguished the late 20th century and presented a dominant force early in the 21st century and up to now. Such force has been integrated by powerful factions around the world for increased competitiveness across industries.
Preview sample
Use of Contracts Transactions in E-commerce Information Technology Assignment
8 pages (2000 words) , Download 2 , Assignment
Free
The EU has tried to apply umbrella regulations in all contracts formulated in the member countries. However, new challenges have been emerging in line with the evolving online market, thus it is important for all jurisdictions to keep their regulations in line with the most immediate technologies being used for online transactions. 
Preview sample
Supply Chain Management and Information Technology Information Technology Essay
13 pages (3250 words) , Download 3 , Essay
Free
With the emergence of the latest information technology-based tools, it is being possible to collaborate more and more processes either internal to the organization or external by keeping the focus on supply chain management. For more productivity, cutting costs and more quality enhancement, supply chain policies are being a major concern.
Preview sample
MS Excel and Access in Financial Calculations of Business Operations Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
The Flyguys has several requirements that can be met through proper usage of Access and Excel both. However, each of those software has its own pros and cons. The Flyguys is interested in implementing a system that enables them to achieve three major goals; record keeping, reward system and reporting.
Preview sample
Book Promotion through the Worldwide Web Information Technology Dissertation
12 pages (3000 words) , Download 2 , Dissertation
Free
The author of the paper states that the Internet has largely changed the way in which we live. Not only has it enabled us to establish communication with people millions of miles away, but it has also become a platform for the exchange of views, opinions, and news on recent developments.
Preview sample
Network Security The Past, Present, and Future Information Technology Research Paper
13 pages (3250 words) , Download 3 , Research Paper
Free
According to the findings, it can, therefore, be said that the aim of ceasing any undesired intrusion in one’s system is encapsulated by one of the most vital areas of computer sciences- Network Security. Farlex Inc. explains that it can be defined as the process of authorizing access to information to validated users.
Preview sample
Developmwnt of Ergonomics Information Technology Term Paper
12 pages (3000 words) , Download 2 , Term Paper
Free
The complexity of organizational structure and introduction of new technology into the business have increased the risk of conflicts between workers and their supervisors, workers and their colleagues and workers and managers. For example, there might be a conflict of interest between workers and supervisors about the working hours, wages etc.
Preview sample
Pervasive Context-Aware Systems Information Technology Term Paper
17 pages (4250 words) , Download 3 , Term Paper
Free
Pervasive environment is the emerging computing paradigm that aims to provide users access to services all the time, everywhere, in a transparent way, by means of devices installed in the surrounding physical environment or worn by the user. Smart environment represents the evolutionary development of pervasive environment.
Preview sample
The Future of Banking Information System and Its Impact on E-Banking Information Technology Thesis
47 pages (11750 words) , Download 4 , Thesis
Premium+
The research focused on both previous findings (literature) and primary research (empirical study) on the impact that future banking information systems have on electronic banking in terms of banks adoption and acceptance by consumers. The researcher applied quantitative research design to collect and analyze data from the study population.
Preview sample
Importance of Testing in Software Engineering Information Technology Research Paper
20 pages (5000 words) , Download 3 , Research Paper
Free
Testing is a necessary action in software engineering. In the easiest terms, it amounts to viewing the implementation of a software system to authenticate whether it performs as planned and recognize possible malfunctions (Bayse et al, 2005). Testing is extensively utilized in industry for superiority assertion.
Preview sample
Architecture and Operation of Microprocessors Information Technology Research Paper
9 pages (2250 words) , Download 3 , Research Paper
Free
On the other hand, the processor is like the common sense of a computer in the approach that it systematizes and accomplishes instructions that come from either the user or the software. In a computer, a processor generally comprises one or more microprocessors (also known as chips), which are silvers of silicon or other substance stamped with many little electronic circuits.
Preview sample
Wireless Personal Area Network's Opportunities Information Technology Article
8 pages (2000 words) , Download 2 , Article
Free
Through the use of PAN, it is possible to transfer data such as mails, files, digital audio, and media. However,  PAN range covers an only small area such as 10 meters or less . On a practical level, PAN translates to transferring or passing information from one person to another using touch which we do nowadays use infrared.
Preview sample
Advantages and Disadvantages of Information Systems Outsourcing: Risks and Benefits Information Technology Research Paper
8 pages (2000 words) , Download 3 , Research Paper
Free
The corporations can develop and maintain information systems internally or in-house by utilizing their own resources or outsource it, which means they hire an outside firm for developing any of their information systems for them. However, several companies outsource only the information system development component of their IT activities.
Preview sample
Is The Internet Destroying TV as We Know It Information Technology Assignment
10 pages (2500 words) , Download 2 , Assignment
Free
Television is a device on which we see the videos that are transmitted in the form of signals through television stations.
Preview sample
Facebook and its Facilities Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Today, not only are all the above-mentioned endeavors are handled with much ease but also the ever-changing technology has made it more interesting and innovative. A product of such a technology, that has even earned itself the honor of being accepted as a word in the life of the common people, is Facebook. 
Preview sample
Digital Terrorism Risk Currently Facing Australia Information Technology Research Paper
10 pages (2500 words) , Download 2 , Research Paper
Free
The term ‘cyberterrorism’ is becoming increasingly popular today, perhaps due to an increase in such a form of terrorism. However, not many people know exactly what the term means, and what activities come under the scope of cyberterrorism (Gordon and Ford, 2003). People are not aware of how to protect themselves.
Preview sample
Cyber Terrorists: Shutdown the Internet Information Technology Term Paper
10 pages (2500 words) , Download 4 , Term Paper
Free
There is also the presence of the United States Computer emergency readiness team (CERT) which works under the domain of the National Cyber Security division. It is to be admitted that the domain of the threats in cyberspace is not restricted to any particular region and adherence to international cooperation is needed on a much larger scale. 
Preview sample
3451 - 3500 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us