StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Oligopoly of Microsoft and Apple Information Technology Term Paper
16 pages (4000 words) , Download 2 , Term Paper
Free
An oligopoly is a market structure dotted by a few large suppliers producing branded goods and services, most of the market concentration is taken up by these large players. Marketing and advertisement are very important with such a level of competition which acts as one of the barriers to entry for new firms trying to jump into the market.
Preview sample
Telecommunications and Networking Information Technology Assignment
10 pages (2500 words) , Download 2 , Assignment
Free
The scheduling algorithm helps in regulating interactions across flows and is highly dependent on the techniques associated with buffer management. This technique states that in order to simplify a problem and make it independent by nature it is essential that an infinite number of capacity buffers is taken into consideration.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
LAN Computer Platform Information Technology Essay
15 pages (3750 words) , Download 2 , Essay
Free
Everybody engaged with local area networking has a fundamental considerate of network wiring and cabling. Contemporary LANs are nearly solely Ethernet hub-and-spoke topologies (also called star topologies). Personal cable runs are made from centralized dynamic hubs to every workstation, network printer, server, or router 
Preview sample
Building a Business Network Information Technology Essay
16 pages (4000 words) , Download 2 , Essay
Free
This essay analyzes that a computer network is a collection of autonomous computers interconnected by a single technology, plus peripherals (printers, CD-ROM drives, scanners, and so on) so that all computers can communicate and share resources with each other. Even though the first computer networking attempt started in the early 1970s.
Preview sample
Wikis and Collaborative Knowledge Construction Information Technology Case Study
12 pages (3000 words) , Download 2 , Case Study
Free
The author chose the analytical method of inquiry. This is because the analytical method allows for a high degree of accuracy and reliability. It can assist in the deployment of proper conclusions and inferences. The analytic method of inquiry also allows for the use of scientific and empirical research methods.
Preview sample
Main Issues of Cloud Computing Information Technology Coursework
10 pages (2500 words) , Download 4 , Coursework
Free
Cloud computing is built on dedicated research work by utilizing distributed computing, utility computing, networking, and virtualization features. Its architecture implies platform, software, and application as services. This creates a benefit to the end users by the reduction in overhead, total cost of ownership, greater flexibility etc. 
Preview sample
IT and IS in Organizations, Goals and Objectives Information Technology Assignment
13 pages (3250 words) , Download 2 , Assignment
Free
With the dual goals of making payments for the provision of health services and the dissemination of health information, it has supported the maintenance of health of 45 million Australians. Moreover, five services are covered under the organization: health, hearing, optical, dental and pharmaceutical.
Preview sample
Software Engineering Techniques for Service-Based Development Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Although it provides a sequential methodology for development and reviews, the waterfall model is not considered efficient on account of being slow and inadequate for large and complex projects. Also, the simpler steps inherent in the model do not provide much clarity and often lead to confusion in its interpretation 
Preview sample
Why People Use Facebook and Their Activities Information Technology Case Study
8 pages (2000 words) , Download 2 , Case Study
Free
The appeal of Facebook is linked to the psycho-social dimensions of human society that improves the state of mind and even identity formation for younger and more impressionable users that look toward aspirational reference groups to guide their behaviour and attitudes. It also maintains the ability to break down tangible geographic barriers.  
Preview sample
Wireless Network Capabilities Information Technology Essay
12 pages (3000 words) , Download 3 , Essay
Free
The author states that the past few decades have witnessed a tremendous growth in the population of wireless network users who are increasingly demanding high performance and reliability of wireless computing and networking services. As a result, the contemporary wireless network technologies have currently undergone dramatic changes.
Preview sample
Software Evolution Process Information Technology Essay
24 pages (6000 words) , Download 3 , Essay
From this paper, it is clear that software process evolution is a component of software maintenance. It's important to highlight that one may, therefore, wonder how a software would need maintenance when it exists in digital form and as such, it may not really be subject to wear, or unlike most biological bodies, decay.
Preview sample
Security-Enhanced Linux System Information Technology Research Paper
11 pages (2750 words) , Download 2 , Research Paper
Free
One of the most elegant features of SELinux is that it helps the user understand administration policies at the process level in terms of just 3 simple components namely – identity, role, and domain. Identity under the current context refers to the user login that recognizes the individual or system process that is currently invoking the process. 
Preview sample
Usability Testing of Interactive Systems Information Technology Research Paper
18 pages (4500 words) , Download 2 , Research Paper
Free
The author states that all participants in designing and developing of the system interface should be well-trained practitioners who are very conversant with all the procedures to be followed in the course of software development. It is inevitable to have various consultants and staff designers working in very conducive academic environments.
Preview sample
Market Area in the Next Five Years Information Technology Research Paper
11 pages (2750 words) , Download 2 , Research Paper
Free
This report is based on the assessment of the evolution in the field of the network provider business. However, the modern and up-to-date techniques in network technology are also emerging gradually and providing higher internet speed, security, bandwidth, etc. This research is going to assess different network provider’s technological enhancements.
Preview sample
Poor Security Policies of Welco Insurance PLC Information Technology Case Study
14 pages (3500 words) , Download 2 , Case Study
Free
Many organizations use websites to do businesses and promote their products. There are complications arising as Malware targeting web applications are getting very difficult to track.  Attackers are able to create numerous codes and malware pieces with malicious Trojans causing malware levels to increase massively.
Preview sample
Patterns and Software Development Information Technology Coursework
9 pages (2250 words) , Download 2 , Coursework
Free
From this paper, it is clear that a facade is an object that offers a basic interface to a bigger body of code, like that a class library. A facade is able to formulate a software library that is simpler to utilize as well as understand, as the facade has suitable techniques for carrying out common tasks.
Preview sample
Biochip with Integrated Vertical Emitting Light Source Information Technology Book Report/Review
20 pages (5000 words) , Download 2 , Book Report/Review
Free
The author presents results using the principles of fluid dynamics and heat transfer using electromagnetic modules of COMSOL Multiphysics. These modules deal with the movement of fluid in biochip microfluidic channel, the convection, and conduction in the active region over time and Vpulse for electric conductivity.
Preview sample
Information Technology Security Risk Information Technology Research Paper
13 pages (3250 words) , Download 3 , Research Paper
Free
The researcher states that people are connected at home, offices, as well as when they are traveling either via laptop or mobile phones. The evaluation is conducted to identify the severity of each information system, which deserves priority due to the value of data which needs to be protected. Both threats and vulnerabilities need to be considered concurrently.
Preview sample
The Privacy in the Workplace and the Use of Technology Information Technology Term Paper
18 pages (4500 words) , Download 3 , Term Paper
Free
The author states that the past decade saw advances in technology rise at an alarming rate and, consequently, resulting in numerous changes in the business environment, affecting just about all facets of working life. People reach each other in a blink of an eye at progressively low costs.
Preview sample
The Role of Information Technology in Influencing a Firms Business Strategy Information Technology Research Paper
12 pages (3000 words) , Download 2 , Research Paper
Free
The discussion in the report has sought to measure out BlackBerry’s business information systems with its business strategy to find how well they fit. Based on findings, it can be concluded that there has not been a very perfect fit between these two variables, a reason the company has not been able to be as productive as it envisioned to be 
Preview sample
Digital Logic Design Principles Information Technology Research Paper
20 pages (5000 words) , Download 2 , Research Paper
Free
The present research has identified that by 1950s, the Boolean principle had already become a standard part of the electronic design. Towards the 1970s, there was the development of Programmable Logic Arrays (PLAs) that were specifically used in the application of Specific Integrated Circuits (ASICs). Mechanical and diagrammatic methods can be traced back to the medieval times.
Preview sample
Peer to Peer Networking Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Reportedly, as the organizations grow, they often need several people to enter and process data at the same time. For this to be beneficial, those people must be capable to share the data and information each person enters. Networking computers turn out to be advantageous in this state of affairs.
Preview sample
Applying of Modern Information Systems and Technology to Ensure the Success of the Aalsmeer Flower Auction Information Technology Research Paper
11 pages (2750 words) , Download 2 , Research Paper
Free
Organizations now understand the value of information technology, thus they are adopting more and more advanced techniques (information systems and e-commerce) to survive in this ever-increasing competitive world. Furthermore, the implementations of information systems have made the business management more effective and easy.  
Preview sample
Automation of Airline Reservation System Information Technology Term Paper
15 pages (3750 words) , Download 3 , Term Paper
Free
The airline reservation system has a unique operating landscape. As a predicate, airlines travel from one location to another and in each location, passengers either board or disembark airplanes. Generally, passengers purchase their tickets at the location where they would board or have pre-arranged reservation to board from another location.
Preview sample
Contemporary Artificial Intelligence and Vision of It's Future Information Technology Research Paper
10 pages (2500 words) , Download 4 , Research Paper
Free
While prediction of situations that can follow is called intelligence, the same means doing the right things at the appropriate time. In the current technological era, artificial intelligence would refer to creating computer software that can perform correct tasks at the right time, while predicting the next challenge it may face.
Preview sample
Information Technology Integration in the Construction Industry Information Technology Assignment
10 pages (2500 words) , Download 4 , Assignment
Free
The paper provides the challenges faced by the construction industry in implementing IT freely. The high cost and time lag that follows the actual implementation of web-based programs is the main challenge discussed, which is followed by a suggestion to overcome the challenges. This is followed by the conclusion at the end of the paper
Preview sample
Information System for Healthcare Management Information Technology Research Paper
7 pages (1750 words) , Download 2 , Research Paper
Free
They are issues that could have been addressed when they were minor, hence we need to avoid seeing them mature to full-blown problems that are difficult to solve currently. So is the problem of information governance, where the management/information technology project failures that are experienced today could have been foreseen and resolved in the past (Logan, 2010).
Preview sample
Database Application Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
The database application is designed using Microsoft access environment and its scope is limited to a small selling shop or stall. It is designed to help maintain the inventory for such a business that does not have a big budget. The database application can only operate in the Microsoft environment 
Preview sample
What Is 3G Wireless Technology Information Technology Research Paper
7 pages (1750 words) , Download 3 , Research Paper
Free
3G or the third-generation wireless was used to refer to this age development in personal and business wireless technology, particularly the mobile communications. 3G or The Third Generation ushers in many benefits with its mobility, broad bandwidth and high-speed communication (upwards of 2Mbps). 
Preview sample
Effects of Internet Pornography on Society Information Technology Research Paper
10 pages (2500 words) , Download 4 , Research Paper
Free
This research will begin with the statement that with the introduction of the World Wide Web, life has become fast and convenient. Sadly, even crime has become fast and convenient as well. Among the many crimes committed over the Internet or because of its influence, this paper will be focusing on one of the most disturbing ones, Internet pornography.
Preview sample
World Bank's Information Security Information Technology Research Paper
9 pages (2250 words) , Download 2 , Research Paper
Free
World Bank was owned, financed and run by 184 member countries. Bank-supported efforts including building schools and health centers, providing water and electricity, helping to create a better investment climate and more efficient public sector. World Bank has become a significant partner with member countries, to eradicate poverty.
Preview sample
The Development of the Internet Protocol Security Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Since the utility of internet is increasing consistently, it is becoming increasingly important for the organizations to develop and maintain certain protocols that can help organizations to maintain the secrecy of important information such credit card information, customer data, financial transactions etc.
Preview sample
Information Technology: Surveillance Security Information Technology Assignment
8 pages (2000 words) , Download 5 , Assignment
Free
The report concludes prevention of physical theft by incorporating surveillance IP based cameras. The IP cameras powered with PoE will share a secure input of uninterrupted power The information assets are secured by a physical lock along with a biometric detection mechanism for monitoring and logging activities of an employee
Preview sample
Computer Security Information Technology Research Paper
9 pages (2250 words) , Download 2 , Research Paper
Free
However, due to the negative impacts of technology, information is not considered private and secret. In this scenario, corporations don’t like their business information such as customers’ data and economic statements to be exposed to the public. Therefore, computer system security is considered to be the vital aspect of any organization.
Preview sample
Information System for Express Line Shipping L.L.C Information Technology Term Paper
11 pages (2750 words) , Download 2 , Term Paper
Free
Summing it up, the management information system means to manage the information that is required to run business operations and other activities of a company. The information system that I have designed for the company will assist marketing employees in performing many key tasks, which include, decision-making and entering customers’ information
Preview sample
IPR Law Firm's Distributed Database Management System Information Technology Term Paper
10 pages (2500 words) , Download 3 , Term Paper
Free
The distributed database management system of an IPR law firm is a client/server and 2-tier structure. Its architecture is designed to place all the necessary and frequently used databases on the user interfaces where the data is updated by the users. The changes are saved in the main database residing on the server
Preview sample
The Impact of IT on the Supply Chain Area Information Technology Coursework
16 pages (4000 words) , Download 2 , Coursework
Free
Using data collected from the field and the various findings on manufacturing firms, the analysis does indicate the crucial contribution of information technology to numerous supply chains. This can be generated via developing a digital integration which has its own capability and manifestation of the process along the supply chain.
Preview sample
Criminal Justice: Cyber Crime Investigation Information Technology Research Paper
13 pages (3250 words) , Download 2 , Research Paper
Free
Any inadequacy in legal protection will mean that the business community and government has to rely completely on technical methods to protect themselves and their information from the unethical people who would steal it, guarantee access to unauthorized people who would destroy valuable information
Preview sample
Fundamentals of Information Systems Security Information Technology Term Paper
7 pages (1750 words) , Download 3 , Term Paper
Free
Computer security –it is also referred to as information technology (IT) security. This is where technology is protected from crime such as unauthorized use. Technology in this context means many businesses require computer security, therefore, many IT specialists are located almost everywhere due to the growing need for computer security.
Preview sample
IT Threats to Information Security Information Technology Essay
2 pages (500 words) , Download 2 , Essay
Free
The threats and the risks brought by the usage of information technology by the business impact the business in different measures. These threats could impact businesses in small ways to even situations where the business could close down. Some Information security threats also lead to reputation damage which is sometimes irreparable.
Preview sample
History and Definition of Software Engineering Requirements Information Technology Research Paper
19 pages (4750 words) , Download 4 , Research Paper
Free
The establishment and implementation of sound engineering ideologies in order to get a hold on economically software that is dependable and works professionally on real machines. The employment of a scientific approach to the improvement, operation, and maintenance of software is the application of engineering to software.
Preview sample
The Digital Divide among the Aboriginal Community in Australia Information Technology Article
12 pages (3516 words) , Download 2 , Article
Free
The proposed framework includes the development, training, and maintenance of Information and Communications Technology (ICT) and information systems for local communities, especially for the Indigenous community. It also reviews the digital divide that exists between indigenous and non-indigenous sections of the population.
Preview sample
Factors Influencing Company Use of Virtual Private Networks Information Technology Dissertation
10 pages (2500 words) , Download 2 , Dissertation
Free
The author states that the cogent factors influencing the choice of VPNs over WANs as companies work hard to make their operations effective would be presented. The bulk of facts highlighted in the paper would be from qualitative research methodology, whereby a survey is carried out by giving questionnaires to Network Administrators, Network Managers.
Preview sample
Customer Relationship Management in the Finance Sector Information Technology Coursework
24 pages (6000 words) , Download 4 , Coursework
The study examines the nature and significance of Customer Relationship Management (CRM) as a present and necessary undertaking in the modern business organization.  In particular, the role of CRM in the finance sector shall be examined, commencing with its definition, present application, and future prospects. 
Preview sample
Role of Information System and E-Commerce Technology in Dell Information Technology Research Paper
9 pages (2250 words) , Download 2 , Research Paper
Free
Dell has recovered itself from the huge loss of 1993 and has shown a continuously improved performance over the period of time. The company has enormously used the internet and web-based technology for improving its business performance. An efficient use of MIS applications has resulted in an improved business structure of the company 
Preview sample
The Role of Information System in E-Government in Saudi Arabia Information Technology Research Paper
40 pages (10000 words) , Download 2 , Research Paper
The author states that this general Information and Communication Technology (ICT) advancement has led to the expansion of the abilities of businesses and governments to utilize sophisticated software and computer technology to perform transactions as well as store and process a large amount of data.
Preview sample
Designing a Wireless Communications and Computing Network System with Wireless Security Information Technology Research Paper
14 pages (3980 words) , Download 2 , Research Paper
Free
The cellular mobile radio system designer needs to have a sound understanding of many aspects of telecommunication such as radio propagation, frequency regulation, and planning, modulation, antenna design, transmission planning, switching exchange, tele-traffic, and software design; making it a challenging task.
Preview sample
Software Engineering Questions Information Technology Assignment
10 pages (2500 words) , Download 2 , Assignment
Free
If an organization where the relevant product owners couldn't - or wouldn't - commit to being actively involved throughout the project. In such a situation to attain the active user involvement is only obtainable through the agile because the first principle of agile is active involvement, and imperative for a project to succeed.
Preview sample
The Role of the Information Security Officer Information Technology Dissertation
12 pages (3000 words) , Download 2 , Dissertation
Free
The author states that when information is accessed or used by someone not allowed doing so. However, this is normally right for the organizations that use to store personal information for their clients, for instance, credit card companies, bank and loan companies, medical and insurance records.
Preview sample
The Diffusion And Value Of Healthcare Information Technology Information Technology Research Paper
19 pages (4750 words) , Download 3 , Research Paper
Free
The opportunities are always there in the market, it needs to be found in a proper time with proper perspective. It has been seen that funding is one of the big problems in the implementation of the IT and software in health care, but, the funding towards health care is pretty high as far as the United States of America is a concern.
Preview sample
3551 - 3600 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us