StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Senior System Administrator/Engineer Position Information Technology Admission/Application Essay
1 pages (250 words) , Download 2 , Admission/Application Essay
Free
The author of the paper states that he has been working as a Network Engineer for HTC for six years and is happy to mention some of the achievements he has made in this role: Installed and configured Network Observers in the company Deployed effective QOS across the networks Used virtual servers to drive cost saving.
Preview sample
Critique OPEC website Information Technology Essay
4 pages (1000 words) , Download 3 , Essay
Free
This essay describes an OPEC organization, that presents itself as force of political and economical significance. Its website www.opec.org has been quite effective in projecting the serious aspect of OPEC’s loquacious inducements of using oil as a tool of diplomacy, intimidation and restitution in addition to already mentioned prowess as an economic and political entity.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Computer information Information Technology Term Paper
2 pages (500 words) , Download 4 , Term Paper
Free
Computers are composed of the processor which carries out all the operations of the computer, the memory unit that stores data and instructions, the peripheral devices that send information outside the computer to other devices, the hardware elements which are the tangible
Preview sample
Data Communications and Network Technologies Information Technology Essay
1 pages (250 words) , Download 3 , Essay
Free
over 250 Mbps. Therefore, the option in the given scenario is limited to Cat 5 cables. The general limitation of attenuation-free signal transmission within a distance of 100 meters can be overcome by installing a repeater whenever the distance between
Preview sample
Personnel Appraisal System Information Technology Coursework
4 pages (1693 words) , Download 2 , Coursework
Free
The report covers the soft systems analysis for the possible implementation of a personnel appraisal process, it will make changes to personnel processes and the data kept on individuals throughout the company. It is to be introduced by using new software in the Personnel department to keep the records.
Preview sample
Database Modeling and ER Diagram Information Technology Essay
2 pages (622 words) , Download 3 , Essay
Free
The student-information table contains the following fields: Student id, name, phone, email, street number, street name, city, and state. This table does not satisfy the requirements of 1NF since it contains multi-valued fields. In this table, possession of more than one phone number or email address is not allowed.
Preview sample
Continual IT Improvement Services and Its Management Information Technology Essay
2 pages (607 words) , Download 3 , Essay
Free
Information Technology does not merely improve the procedure, expedite the process, and lessen labor costs, but also, it provides more fluidity and regularity in the commercial and industrial zones. However, just as the changing demands for services and commodities have become rapid, so has the need for continual improvement in IT services.
Preview sample
SQL/PL Database project Information Technology Essay
1 pages (250 words) , Download 3 , Essay
Free
Triggers run between the issuance of a command and database management action is performed. There are five types of the triggers which belong to Oracle database 11g. Triggers are also fired in the response to the event of database. In the
Preview sample
Origin.com and Digital Information Systems Information Technology Case Study
11 pages (2750 words) , Download 3 , Case Study
Free
It is a need to improve the communication function of the website with its visitors. If communication effectiveness improves, customer awareness, customer engagement and, ultimately, the company’s revenue should increase. One of the ways it can improve customer awareness is by going mobile and designing a mobile version of the website.
Preview sample
Computer Systems Specifications Information Technology Research Paper
2 pages (641 words) , Download 2 , Research Paper
Free
However, it’s important to note that several companies have switched from their old methods of production to implementation of the new computerized methods of production. This technology has been very core in different production units in various industries where the shift to more modern methods of production (Kaan, 23).
Preview sample
Monopoly in the Computer Software Supply Information Technology Essay
1 pages (445 words) , Download 2 , Essay
Free
Traditional software is expensive as it is upfront licensing costs, as well as the annual evergreen support costs, are off the roof. All other costs including maintenance and management are provided for by the user, an aspect that many a company are running away from as they try to minimize their costs.
Preview sample
Conclusion for the thesis Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
Apart from retrieving files, we can also share them with other people through uploading them on several networking websites or through sending them through an e-mail. Over
Preview sample
Computer Security - Preventing Malware Attacks Information Technology Essay
6 pages (1590 words) , Download 3 , Essay
Free
Malware refers to malicious ware; and it involves software used in disrupting computer functions or operations, gets sensitive computer information, and gain access to private computer networks. It appears in many forms, for example; software form, code, scripts, and active content. Malware generally refers to types of hostile and intrusive software.
Preview sample
Discussion on NSA Security Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
s leaking of classified US government papers, have brought to the fore as well as highlighted the fact that the US is carrying out a blanket scrutiny on any foreign person whose data goes via an American entity such as Google, Facebook, Yahoo!, Apple etc. irrespective of whether
Preview sample
Effects of social media on the real estate industry Information Technology Essay
1 pages (250 words) , Download 3 , Essay
Free
Social media also represents enormous changes perspective for businesses. For most individuals, buying a home is a thing done once after ten years at most. Selling of real estates is the kind of business benefiting from constant streams of new prospects. Social media enables real estate agents to build a reputation of their business.
Preview sample
Technology Evaluation - Bank Solutions Inc Information Technology Case Study
5 pages (1493 words) , Download 3 , Case Study
Free
Optimization is a necessary concept in a competitive environment in which efficiency and effectiveness are a priority. Security concerns also establish the need for applications that can guarantee security issues such as authenticity, privacy, and confidentiality and legal requirements exist to ensure that organizations address such security concerns.
Preview sample
SMA Project Lifecycle Roles Information Technology Assignment
2 pages (552 words) , Download 2 , Assignment
Free
Simulation is an imitation of a real-world system. Modeling is producing a model; a representation of the construction and working of some system of interest. A model is similar to but simpler than the system it represents. Building a simulation has many interactive elements. The main portion of the SMA process can proceed along three parallel paths.
Preview sample
Projects and Their Management Information Technology Essay
6 pages (1681 words) , Download 2 , Essay
Free
Overall, the SEC Placement Team (STP) project aims at supporting students who use their PCs to seek placement in various industries. The specific objectives of the project are: To provide students pursuing sandwich degrees with web pages constituting varied form fields that will allow them to supply their personal details and create CVs in a bid to reach their prospective jobs or companies.
Preview sample
Object Orientation in PHP Information Technology Case Study
6 pages (1822 words) , Download 3 , Case Study
Free
The Withdrawal sends a message to the CashDispenser to check if there is sufficient cash. If there is, a debit message is sent to the BankDatabase, and the amount similarly is debit to the account. A message to release the cash is sent to the cash dispenser. A message then appears on the screen directing the user to collect the cash.
Preview sample
Top Security Breaches in the Digital World Information Technology Essay
1 pages (298 words) , Download 3 , Essay
Free
Sony PSN Hack 2011  took place in April 2011 in Sony Play station gaming console. As a result of this, roughly 80 million users had their privacy breached and other forms of network damages incurred. The overall debacle was on display for over twenty days. Court Venture: Experian, a joint associate of Venture came in the line of fire when it got coaxed into dealing with a Vietnam-based service company.
Preview sample
Comparisons of Information Security Management Frameworks Information Technology Research Paper
4 pages (1190 words) , Download 4 , Research Paper
Free
Information management security frameworks are developed and founded on a structured set of independent recommendations, processes as well as practices predominantly from the Information Security Management System Standard (ISO 27001). The framework seeks to make sure that information assets are safeguarded from illegal access or modification regardless of whether it is in storage, under processing, or in transit.
Preview sample
Real-time Business intelligence at Continental Airlines Information Technology Case Study
5 pages (1300 words) , Download 3 , Case Study
Free
It is essential to state that active data warehousing is a method used for implementing data warehouse which greatly supports the process of decision making in either near-real-time or near-time. An organization or industry has to handle a huge deal of broad and in-depth coarse sets of enterprise data.
Preview sample
Debreifing Information Technology Research Proposal
2 pages (500 words) , Download 2 , Research Proposal
Free
Loss of data was another issue and needed immediate address since most works had to be done manually due to the breakdown of the system at one point. Decision-making channels are not well specified, and the office to undertake procurement is not well stated.
Preview sample
Intrusion detection systems Information Technology Essay
8 pages (2000 words) , Download 4 , Essay
Free
Moreover,coming to the point of these manipulations which occur in the first place,we discern that these are the usual attacks that are carried out by the hackers who are skilled and quite adept at their work and even at times,script kiddies do play these tricks whereby they make use of the automated scripts to achieve their objectives.
Preview sample
Data Mining as a Part of a Larger Process of Knowledge Discovery Information Technology Article
1 pages (250 words) , Download 4 , Article
Free
The second stage is Predictive Modeling, whereby patterns discovered in the earlier stage are used to make predictions about the future. The third stage is Forensic Analysis, where the patterns extracted are used to find unusual data elements. One of the pitfalls of data mining is the vast quantities of data that are generated.
Preview sample
Database and Booking System Information Technology Case Study
5 pages (1885 words) , Download 2 , Case Study
Free
Since, by means of the database management system, the entire occurrences of data items require to be stored simply once, thus getting rid of the storage of replicated and redundant data. Thus, the database designers and system developers frequently utilize data normalization to trim down huge data replication and data redundancy.
Preview sample
Human Anatomy Used in Walking Information Technology Research Proposal
11 pages (2750 words) , Download 2 , Research Proposal
Free
The purpose of the research study, problem statement, significance of the problem, the definition of terms, and hypothesis or research question will first be identified. Before discussing the proposed research methodology, a literature review will be conducted to determine which part of the human anatomy is most used in terms of supporting human walks.
Preview sample
Chatbox Technology and Effective CRM Information Technology Essay
2 pages (658 words) , Download 4 , Essay
Free
For a long, man has attempted to replicate human intelligence into machines. However, very little success has been witnessed in this regard. The areas that have witnessed some success are very few and can be named as follows: Machine Learning, Natural Language Processing, Speech Recognition, Decision Support Systems, and Executive Support Systems via artificial intelligence and neural networks.
Preview sample
How can we reduce the energy use of computing Information Technology Essay
2 pages (500 words) , Download 2 , Essay
Free
also generating energy consumption reports at official level also holds huge importance as it helps in measuring financial benefits gained by saving energy. Companies today are seen increasingly requiring the common public to engage in power-saving activities and quitting the
Preview sample
Mobile Device Security Policies Information Technology Research Paper
2 pages (500 words) , Download 2 , Research Paper
Free
The purpose of these policies and restrictions is to ensure appropriate use of mobile devices and software. This is to secure sensitive and confidential information from compromise and reducing the risk of spreading
Preview sample
Information Technology Infrastructure Library Information Technology Term Paper
12 pages (3150 words) , Download 5 , Term Paper
Free
ITIL v3 is the most recent version of ITIL succeeding ITIL v2 which has improvements on the previous ITIL v2 but where some features of ITIL v2 are not changed. Overall, ITIL v3 or 2011 edition includes five core publications which include design, operation, strategy, transition and Continual Service Improvement. 
Preview sample
Supporting Activity Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
In the process of acquiring systems, a number of issues are experienced. Among these issues are procurement and cost of acquiring systems, and the primary purpose of acquisition. Procurement is a major issue since
Preview sample
Opportunities of Videoconferencing Technology Information Technology Essay
1 pages (259 words) , Download 4 , Essay
Free
Videoconferencing has removed the significance of geographical distances, as people can see and talk to one another live 24/7 using this technology. The best feature of videoconferencing is that it provides the users with the opportunity to conduct group meetings. This is why teleconferencing is also called groupware or visual collaboration.
Preview sample
The Role of Internet in the Political Process Information Technology Assignment
2 pages (500 words) , Download 2 , Assignment
Free
It is obvious that the existence of the latest medium allows new forms of political participation, which formerly did not exist. Several of them have no clear similarities in the no virtual world. For instance, through the Internet one can send e-mails with political content and attempt to influence government resolutions via comments sent on websites.
Preview sample
Reduction of the Power of Information Technologies Information Technology Book Report/Review
2 pages (523 words) , Download 3 , Book Report/Review
Free
Overuse of social media and mobile devices has been linked to eyestrain, difficulty focusing on other tasks, and depression. While some forms of technology may have made positive changes in the world, there is evidence of the negative effects of technology and its overuse, as well.
Preview sample
Memory Management Paper Information Technology Essay
2 pages (500 words) , Download 3 , Essay
Free
Memory management is essential for the proper resource allocation and functioning of a computer and it must essentially satisfy the following four requirements (Ramesh, 2010; Isrd, 2006); As a number of programs are usually present in the
Preview sample
How Sony PlayStation Network Was Targeted Information Technology Essay
3 pages (1148 words) , Download 3 , Essay
Free
More than 77 million Qriocity and PSN users’ accounts and more than 24.5 million Sony Online Entertainment user accounts were accessed for personal information (Gillies, 2011). On April 19, Sony detected strange activity on the network system and noticed unauthorized access to the company’s servers on next day.
Preview sample
Trends in porting existing PC applications to the mobile environment Information Technology Research Paper
1 pages (250 words) , Download 2 , Research Paper
Free
Even content developers for the mobile platform can enrich their content using multimedia like videos and multimedia messaging. There are over 4000 device
Preview sample
Data Mining and E-Learning Information Technology Research Proposal
7 pages (2027 words) , Download 3 , Research Proposal
Free
E-learning is a new paradigm of knowledge management in the current era of modernization, internationalization, and rapid transformations. Modern educational institutions invest substantially in this knowledge management through e-learning to reap benefits from global competitiveness and resourceful assistance availed in cross-border exchanges.
Preview sample
Service-Oriented Architecture Information Technology Essay
5 pages (1420 words) , Download 2 , Essay
Free
Two or more different computing entities such as programs are able to interact and give room for one entity to carry out tasks on behalf of the other entity because of SOA. In SOA, service interactions are explained using description language with each interaction being loosely coupled and self-contained in order to ensure that all interactions are independent of one another.
Preview sample
Should you worry about cell phone, cellular antenna and Wi-Fi device radiation why or why not Information Technology Research Paper
1 pages (250 words) , Download 2 , Research Paper
Free
ple, they have also been linked with the emission of electromagnetic waves and radiation, which are thought to bear negative impacts on human health (Shelly and Vermaat, 2012). According to Doctor Joseph Mercola, researchers have studied these devices and seen that they emit
Preview sample
Cyber Security and Business Information Technology Term Paper
6 pages (1500 words) , Download 4 , Term Paper
Free
Summarily, cybersecurity is becoming an issue that needs urgent attention from the government given the rate at which technology is developing. Cybersecurity is very significant in that it will assist guard business and consumers, will bring important infrastructures on which the economy relies on, and improve national security.   
Preview sample
Challenges Faced by BYOD Information Technology Case Study
6 pages (1649 words) , Download 2 , Case Study
Free
It should be a continuous and wholly inclusive program that is aimed at improving how the employees carry out their duties and also to safeguard the organization's data. Putting in place appropriate programs to sensitize the employees is imperative to make them aware of the challenges that come with the usage of these gadgets.
Preview sample
IEEE Working Group Information Technology Research Paper
5 pages (1398 words) , Download 2 , Research Paper
Free
The rise of the internet has created a demand for communication infrastructure. The development of this infrastructure must be informed by the need to create an affordable and sustainable platform for communication. As a result, the role of standard setting bodies such as ANSI, IEEE and ISO is bound to increase.
Preview sample
Border Control Using Wireless Sensor Technology Information Technology Research Paper
4 pages (1406 words) , Download 3 , Research Paper
Free
WSN is an emerging technology that uses distributed sensors with a communications infrastructure to monitor or record environmental conditions. They are being widely applied in security, military, and agriculture owing to their automated ability to monitor the environment and relay required data while requiring a minimum human operation.
Preview sample
Cyber Crime, Cyber Security Awareness and Cyber Incident Reporting Information Technology Literature review
28 pages (8207 words) , Download 3 , Literature review
Each day, close to 300 billion electronic mails and about 5 billion phone messages are being sent out (KPMG Klynveld Main Goerdeler, 2011). Majority of the global population has also come to rely on the efficacy of the digital and electronic communication methods.
Preview sample
Should Computer Scientists Experiment More Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
It is also apparent that experiments are costly and do not reveal the correct aspects required to operate computers1. This implies that computer scientists do not want to waste resources
Preview sample
Strategic Integration of Information Technology and Diplomacy Focusing on the Integration of ICT Information Technology Term Paper
21 pages (5387 words) , Download 2 , Term Paper
Democratization coupled with the decentralization of information has helped forecast events internationally gearing diplomats to devise and formulate responses ahead of time. Considering it all, it is essential that diplomacy takes note of technological advancements and gets up to speed with dynamic operational environments.
Preview sample
Client agreement letter Information Technology Essay
2 pages (500 words) , Download 3 , Essay
Free
This will be subdivided into three aspects, technology, cost and security. Secondly, we as a team accepts to deliver provide cost effective solution that are easy to use to substitute the large-scale platform. We intend to provide a solution that is tailored to satisfy the
Preview sample
Change Management Policy Information Technology Essay
1 pages (391 words) , Download 2 , Essay
Free
Install active or non-active applications, software, modules, or subroutines to any dormant or active applications, software, modules, or subroutines in the production environment. Partially or generally change the configuration of applications, software, module, or subroutines in the production environment.
Preview sample
4401 - 4450 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us