StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Intrusion Detection Systems Information Technology Coursework
5 pages (1436 words) , Download 0 , Coursework
Free
According to this simulation, a NIDS is a part of the test network, and there is a control monitor to record attacks and normal traffic. The control monitor also dumps the replayed packets back to the network. This way the effectiveness of the NIDS can be tested by just replacing a NIDS with another and running the simulation.  
Preview sample
The Origin of the Internet Information Technology Article
9 pages (2616 words) , Download 3 , Article
Free
The Internet's potential to change the way we conduct business is only just beginning to be understood. The origin of the internet is rooted in the circumstances of the Cold War, a period during which nuclear conflict featured as potentially the most immediate and catastrophic of all global dangers.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
-5%
Apply my DISCOUNT
The Application of Information Systems in Modern Organisations Information Technology Coursework
11 pages (3052 words) , Download 2 , Coursework
Free
‘Quick Shop, a retail chain, grew 28% every financial cycle. It bought a software package to manage its inventory and provided customers with a friendly point of sale interface with cartoon characters and amusing voices. The look and feel we're good enough to drive people in and talk about it. Their success was not in selling more but in their great marketing strategy.b
Preview sample
Web Site Development and Information Architecture Information Technology Coursework
9 pages (2434 words) , Download 1 , Coursework
Free
XML is a document-processing standard that is an official recommendation of the World Wide Web Consortium (W3C), the same group responsible for overseeing the HTML standard (Eckstein & Casabianca, 2001). According to Eckstein & Casabianca (2001), XML is actually a simplified form of Standard Generalized Markup Language (SGML2), which is extremely complex, especially for the Web.
Preview sample
Main Aspects of Email Working Information Technology Coursework
6 pages (1654 words) , Download 1 , Coursework
Free
Finally, various components (hardware, etc) such as a router, DNS, mail server, and ISP will be discussed in brief. Below figure1, show how email actually works after Tom clicks the ‘send’ button and Jane accepts it.
Preview sample
Computing: Operating Systems and Common Features of Word Processing Programs Information Technology Assignment
4 pages (1417 words) , Download 0 , Assignment
Free
An operating system processes system data and user input, and response by allocating and managing tasks and internal system resources as a service to users and programs of the system. Two such operating systems which are truly confined to the definition of operating systems are Windows and Linux.
Preview sample
Major Issues that IT Managers Face Information Technology Assignment
6 pages (1875 words) , Download 3 , Assignment
Free
The author states that those who have not, have fallen by the way side. Application of ICT in one form or the other has not only become essential but indispensable in almost every organization. Every organization has an ICT infrastructure manned by ICT staff, used by a majority of the personnel of the organization, and managed by an ICT manager.
Preview sample
IT Innovations in NHS Information Technology Case Study
11 pages (3045 words) , Download 2 , Case Study
Free
The life expectancy of people in every country is ascending along with the advent of modern medical technology, and advancement in treatment procedures. Healthcare providers are always put to test in their day-to-day activities for finding fast and precise approaches to improve their service with the help of modern machinery.
Preview sample
Reasons in Using the Internet Information Technology Assignment
8 pages (2152 words) , Download 3 , Assignment
Free
Since its conception in 1990, it has grown by leaps and bounds – from a mere curiosity to its use today is essential and standard means in the transfer of communication and data among people. A rough estimation for 2002 is that 58% of the adult population in the United States has access to the internet.
Preview sample
Setting up a Website for an Online Insurance Quotation System Information Technology Research Paper
11 pages (2975 words) , Download 1 , Research Paper
Free
While certain other sites help in identifying the various possible combinations that go into a plan and help the customer to choose the right combination that would cover his needs. At the same time, it would also propose whichever is the most optimal cost for the customer as well. 
Preview sample
Decision Support System Information Technology Report
9 pages (2461 words) , Download 1 , Report
Free
DSS is one such tool that has a number of approaches each of which assists the process in different ways. It was traditionally aimed at managers to assist in high-level decision making. The data in hand is sorted and the steps laid according to DSS are followed such that data when putting in Excel sheets and their linking bar charts help to take further decisions towards the benefit of the hotel.
Preview sample
Project Management as Tool in Inforamtion Technology Information Technology Coursework
7 pages (2164 words) , Download 2 , Coursework
Free
Projects, going by their generic definition, can be differentiated from regular operational tasks in that they are temporary in nature, are objective or goal-oriented, have a definite lifetime consisting of a start date and an end date and require a diverse set of human resources, each of whom brings specified skills and knowledge to accomplish the different project tasks.
Preview sample
Popular IBM Applications for Business Information Technology Literature review
19 pages (4750 words) , Download 2 , Literature review
Free
The software is the foundation of any business in the modern world. No organization today can manage to sustain itself without depending on software for some or all of its needs. The success of today’s business processes and models highly depends on the type of software application that is being used for those particular processes.
Preview sample
Systems Development Life Cycle Information Technology Coursework
6 pages (1796 words) , Download 3 , Coursework
Free
Common release dates were established and considerable effort was put in stabilizing the code before it was released. An alpha version was released for internal testing and a beta version for wider external testing as specified by the SDLC. Specifications were frozen at some point before the release and time allotted to fixing bugs.
Preview sample
Outsourcing: Enabling International Business or Forced by a Lack of Local Skills Information Technology Article
4 pages (1257 words) , Download 1 , Article
Free
Outsourcing has been in the news recently because of the numerous debates and the viewpoints that it has attracted. Strong arguments against outsourcing have arisen from facts revealed through surveys and studies. Corporate restructuring, downsizing, and layoffs have led to fundamental changes at the workplace on a global basis.
Preview sample
Comparison and Contrast Bathroom Websites Information Technology Case Study
7 pages (1843 words) , Download 0 , Case Study
Free
One of the important marketing communication tools, which have a huge potential to attract customers is e-commerce. In this Internet-enabled world with multimedia playing a universal role, the majority of people are carrying out many of their day-to-day activities and tasks from the comfort of their own homes or work through websites.
Preview sample
Amazon.coms European Distribution Strategy Information Technology Assignment
6 pages (1533 words) , Download 1 , Assignment
Free
The first challenge that they faced was how many distribution centers (DC) to maintain and where to locate them. Through the help of i2 Technologies’ Supply Chain Strategist Software, they did manage to identify and open up five different DCs at a cost of $320 million. The next challenge was which product type to stock at each of the DCS.
Preview sample
Peer to Peer Networks Information Technology Essay
7 pages (1942 words) , Download 1 , Essay
Free
A very recent example of that is the way the iPhone was launched as a locked device, then unlocked, then locked again and unlocked once more. P2P networks are only a part of that battle for control between industries and individuals which means that piracy may be reduced or even contained to a level but it might never be stopped altogether.
Preview sample
3G Technology Information Technology Research Proposal
4 pages (1059 words) , Download 0 , Research Proposal
Free
3G is defined as “a wireless communications technology designed to provide high-speed internet access and transmission of text, digitized voice, video, and multimedia. ZD net defines 3G as “the current generation of data transmission capabilities over a cellular network in order to provide Internet access via smart cellphones.
Preview sample
Henrik Ibsen Internet Sources Evaluation Information Technology Coursework
4 pages (1072 words) , Download 0 , Coursework
Free
Sources and their evaluation is an important part of research and the internet serves as a valuable tool for locating information about several topics. However, just as in the real world, some sources are more valuable than others and this is true for the virtual world as well. The worth of sources can be compared in several different ways.
Preview sample
Wireless Communication Information Technology Case Study
8 pages (2000 words) , Download 2 , Case Study
Free
This technology has not only eliminated the cable connecting the desktop computers, but it has also facilitated the use of handheld PDAs, WAP, GPRS and 3G in mobile phones and WiFi and WiMax in broadband. The history of first wireless networks dates back to the pre-industrial age when the information was transmitted over line-of-sight distances using smoke signals.
Preview sample
Protecting Yourself from Identity Theft Information Technology Term Paper
14 pages (3500 words) , Download 2 , Term Paper
Free
The FTC enforces three federal laws that restrict disclosure of consumer information and require companies to ensure the security and integrity of the data in certain contexts — Section 5 of the Federal Trade Commission Act, the Fair Credit Reporting Act (FCRA), and Title V of the Gramm-Leach-Bliley Act.  
Preview sample
Automatic Control and Systems Engineering Information Technology Literature review
19 pages (4750 words) , Download 2 , Literature review
Free
This document proposes a new move toward the automatic carrying out of commerce processes by means of Event-Condition-Action (ECA) system that can be automatically triggered by a lively database. First of all, we suggest the notion of blocks that can categorize process flows into more than a few patterns.
Preview sample
The Dental Practice Information Technology Case Study
7 pages (1914 words) , Download 3 , Case Study
Free
The inefficiency is caused by the time delay it takes for doctors to create their appointments and not knowing which patient is coming in for what treatment until the arrival of the patient. An automated system could help speed up the processes of the company while allowing the company to move beyond basic accounting.
Preview sample
Computing and IT Information Technology Assignment
5 pages (1554 words) , Download 1 , Assignment
Free
The operating system also allocates memory to different programs, handles the priority of system interrupts, controls output, and negotiates with other computers in a network situation. The interface which is used to give commands to the operating system can be based on a command-line interface such as the one used by older operating systems such as DOS or it can be a modern graphics-based user interface such as the one used in Mac OS X.
Preview sample
How the Internet is Being Used by Businesses and Government Information Technology Essay
10 pages (2894 words) , Download 1 , Essay
Free
The Internet is a platform that brings together traffic receivers and traffic senders. Due to the internet, businesses now have more choice in the number of channels they can use to reach their customers. Today the internet is aggressively used as a channel for businesses both new and established ones. Internet exchanges are beneficial not just for the customers or end-users but it helps businesses to exchange and grow together. 
Preview sample
Managing Information Security Risks in Global Financial Institutions Information Technology Research Proposal
8 pages (2197 words) , Download 2 , Research Proposal
Free
The research will be finished in three months starting on 1st April and ending on 1st July. In the following month, you would carry out the plan and you hope that some improvement would be made on a Christmas holiday in particular. We think that the earlier the research finishes the better so that you could take action earlier.
Preview sample
Hard-Wired Systems and Their Effects Information Technology Case Study
10 pages (2866 words) , Download 1 , Case Study
Free
The pairs are twisted to provide protection against crosstalk, the noise generated by adjacent pairs. Electrical current flowing through a wire creates a small, circular magnetic field around the wire. Two wires magnetic fields are the exact opposite of each other when they are placed close together in an electrical circuit.
Preview sample
Digital Conversions of Broadcasting and Telecommunications Information Technology Report
4 pages (1067 words) , Download 0 , Report
Free
In a world where the Internet, cell phones and notebook computers are becoming a necessity for everyday living, we often forget about those who still suffer attempting to meet their basic needs, including clean water, food and health care. It is time for the developed world to use their technology to help those who can not help themselves.
Preview sample
The Computer and Communication Technology Information Technology Case Study
9 pages (2663 words) , Download 3 , Case Study
Free
ICT has pervaded all walks of life and work. ICT has, in fact, become an integral and indispensable part of life. The computer and communication technology, the coming of the digital age, has put life on the fast track, cutting down on process time, bringing in greater efficiency and assuring higher reliability.
Preview sample
The Effect the Internet Has on Social Skills and Communication Information Technology Essay
6 pages (1741 words) , Download 0 , Essay
Free
In spite of the advantages mentioned above, Internet communication cannot replace meetings and face-to-face communication. Internet communication has some negative impact on social communication including a sense of alienation and lack of oral communication skills, “dual” self-identities and unfair behavior of people communicating online.
Preview sample
Data Requirements of Geographical Information System Information Technology Coursework
5 pages (1494 words) , Download 1 , Coursework
Free
The density of the paper map's data is limited by its scale. Areas (polygons) cannot be shown if they are smaller than the lines which draw them. For example, a polygon less than 250 meters wide cannot be drawn on a 1:250,000 scale map. This minimum size also limits the number of polygons that can be represented in a given area of a paper map.
Preview sample
Information Technologys Mounting Challenges To Intuitive Sense of Privacy Information Technology Term Paper
15 pages (3997 words) , Download 1 , Term Paper
Free
One must have the right to keep one’s information with him/ herself and share it with others at his/ her own choice. Similarly, everyone has the right to respect for one’s family and private life, his/her home and information. This right to privacy is not an absolute right in a democratic setup. This right can be infringed if it is necessary. 
Preview sample
The Usefulness of Remote Procedure Calls Information Technology Report
8 pages (2280 words) , Download 1 , Report
Free
The Socket interface needs a design interface for distributed applications using an input/output interface which does not provide supports in case of centralizing computing networks. It is worth mentioning, that Birrell and Nelson in the year 1984, devised a method to allow programs to call procedure on other machines. 
Preview sample
Intellectual and Modern Property Information Technology Essay
16 pages (4000 words) , Download 3 , Essay
Free
The four main types of Intellectual property may be broadly classified as follows: (a) patients, (b) trademarks, (c) designs, and (d) copyright. Intellectual property Rights extend over several kinds of creations - copyright, trademarks, patents, know-how, trade secrets which also fall into the realm of confidential information.  
Preview sample
Numerical Modelling - Systems Simulation Information Technology Case Study
11 pages (3033 words) , Download 2 , Case Study
Free
Computational Fluid Dynamics (CFD) can be used to study the processes of lift, drag and thrust and the air motion involved in each.  A Rolls-Royce Trent 900 Engine, with a three-shaft turbofan containing rotors with three different levels of pressure, can be analyzed with CFD  using the method of meshing.
Preview sample
Platos Cave Allegory and the Mass Use of Mobile Telephones in the E.U Information Technology Essay
8 pages (2000 words) , Download 1 , Essay
Free
In this context, the use of mobile phones has been extended in all countries around the world covering a significant part of the population. However, the use of technology has been found to be related to the development of particular behavioral patterns either in the short or the long term. 
Preview sample
History of Cell Phone Technology Information Technology Essay
5 pages (1407 words) , Download 0 , Essay
Free
The number of road accidents has also increased due to the use of mobile phones while driving. Using a cell phone while driving reduces the concentration of the driver and delays the responses that force him to apply the breaks on time. Most of the time accidents occur due to conversation on the cell phone, writing a message and using a computer.
Preview sample
Internet Security Management at CPCNet Information Technology Report
5 pages (1419 words) , Download 0 , Report
Free
Generally, a team of 15 engineers was involved in the project. Teams of 5 each were created out of the 15. One team assisted the company that outsourced the project while the other two teams were involved in the implementation and testing of the solutions. We had a deadline of 30 days to complete the project.
Preview sample
The Google Story by Mark Malseed Information Technology Article
6 pages (1615 words) , Download 2 , Article
Free
The article covers 7 short years that encompassed the dot-com boom, the dot-com bust, and the new dot-com reality. During this period of Internet infancy, companies were rising and falling on a daily basis. Investors were overwhelmed by opportunities and under-impressed by a lack of results. 
Preview sample
Important and Critical Data of Business Information Technology Term Paper
9 pages (2376 words) , Download 3 , Term Paper
Free
Backup usually refers to the copying of data so that they can be restored after a data loss event. It is the last line of defence against the data loss, and consequently the least granular and the least convenient to use. Many types of storage media such as magnetic tape, hard disk, an optical disk.
Preview sample
Purpose of the Blog and Website Information Technology Essay
5 pages (1312 words) , Download 0 , Essay
Free
It can be said that in general, websites, blogs, and forums are customizable, interrelated, and are similar to each other in some of their aspects. All three tools of communication effectively attract the kind of audience they desire as evident by their widespread popularity and the kind of culture these mediums are able to produce.
Preview sample
Analyzing a Computer Crime Information Technology Essay
4 pages (1101 words) , Download 0 , Essay
Free
Computer crime (or Cyber Crime) is no more an act of a curious teenager fiddling with a combination of numbers to form a password to gain an unauthorized access to data. Any user who has access on computer or network system can infect the system with the help of worms and viruses and thus affecting the whole network, which is one of the most common computer crimes that accounts for major losses to organizations.
Preview sample
Ralational Database Design Information Technology Lab Report
16 pages (3775 words) , Download 1 , Lab Report
Free
The hallmark of the relational database is that when one table changes in the database all other tables are updated and are current. The Relational Database specification required nine tables in the following relationships. A table Textbook with a many-to-many relationship through a junction table to the table Module through the Module_Detail table
Preview sample
Fear and Loathing on MySpace Information Technology Coursework
7 pages (2222 words) , Download 1 , Coursework
Free
Children are continually warned about the dangers in the world and still fall victim to them. The sexual predator is a cunning monster who will patiently prey on the child's mental and emotional makeup. Children at this age are very naive and trusting. The predator will wait and work their way into the child's life almost unnoticed and the child will welcome them in.
Preview sample
Computing: IT Centre Recommendations Information Technology Term Paper
5 pages (1687 words) , Download 1 , Term Paper
Free
The software side also needs careful consideration as to the operating system, software requirements, and specialized applications which are needed by the company. With regard to these decisions, some recommendations can be made for the company which should allow the process of setting up an IT center to be as painless as possible.  
Preview sample
A Successful Technical Solution to Speed-Deliverys Information Technology Coursework
6 pages (1514 words) , Download 1 , Coursework
Free
Looking at the advantages and limitations of all the three options I would like to suggest that for our client, Speed–delivery, 3G is the best option from the point of technical suitability. Its limitations in comparison to the other two are lesser while its advantages outnumber the advantages of both WAP and GPRS.
Preview sample
The Patterns in Acme Enterprises Data Network Information Technology Term Paper
9 pages (2337 words) , Download 1 , Term Paper
Free
Utilizing First Hop Gateway Routing protocol, such as Hot Standby Routing Protocol (HSRP), would enable failover between primary and secondary routing engines. HSRP also allows for load sharing between multiple primary routers by distributing the incoming traffic load, while still providing the same level of redundancy and 100% availability. 
Preview sample
Electric Using Cybernetics Principles Information Technology Coursework
14 pages (3899 words) , Download 1 , Coursework
Free
Wiener’s was interdisciplinary, bringing together mathematicians, biologists, operational researchers and physicists in a groundbreaking approach to developing a unified science for solving complex problems. Stafford Beer has for nearly forty years led the development of cybernetics in the study of organizations, creating the branch that we now call ‘management’ or ‘organizational’ cybernetics. 
Preview sample
What Are the Pros and Cons of the Internet as a News Provider Information Technology Assignment
8 pages (2165 words) , Download 1 , Assignment
Free
The users and more than anyone else, those related to the quest of finding out about current affairs and so on are the actual winners and it is up to their respective domains as to how they employ the benefits and uses of the Internet. The Internet is a big platform for finding out just about every knowledge and information related to this world and even the whole universe.
Preview sample
3651 - 3700 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us