StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Computer Security and the Systems Vulnerabilities
6 pages (1835 words) , Download 5 , Essay
Free
This principle states that the people who are in charge of the security program should be able to comprehend it, its mission, its technology and the environment in which it functions (Swanson & Guttman 1996).... Swanson, M & Guttman, B 1996, Generally Accepted Principles and Practices for Securing Information technology Systems, NIST, retrieved 16 February 2011, Trcek, D 2006, Managing information systems security and privacy, Springer, Berlin.... This essay "computer Security and the System's Vulnerabilities" provides an example of how security lapses can occur and expose the system's vulnerabilities....
Preview sample
Internet of Things as an Emerging Technology
7 pages (1817 words) , Download 1 , Essay
Free
Others are concerned about security that they have not known of the recent security changes that IoT has gone through, and others simply don't know of the importance of using IoT devices be it in their businesses, places of work, or at home.... The paper "internet of Things as an Emerging Technology" states that IoT has a lot of technological potentials but with each and every technological advancement there are hurdles and with cybersecurity and data protection is the major issue that comes with IoT devices....
Preview sample
Law or Technology: Telecommunications in the United States
11 pages (3137 words) , Download 3 , Essay
Free
This paper argues that regulatory officials and congressmen, in the face of unknown changes and the speed of technological advancements, have largely driven a pro-competitive and anti-regulatory approach.... This paper argues that regulatory officials and congressmen, in the face of unknown changes and the speed of technological advancements, have largely driven a pro-competitive and anti-regulatory approach.... AT&T's monopoly lines were 100% analogue, despite changes made in technology like the IBM 360 in the late 1960's....
Preview sample
Computer-Assisted Education Benefits
11 pages (2938 words) , Download 1 , Article
Free
Broadly, the students, parents, teachers, school administration, policy makers, lobby groups, even providers of educational technologies and services are affected in any changes in any of the environment in classrooms, homes, administration offices, government bodies.... This appears to have a far reaching effect considering that cultural changes in the US maybe happening at a faster rate than changes in educational institutions to fully factor these changes in their academic policies....
Preview sample
New Technology in Education
5 pages (1582 words) , Download 0 , Essay
Free
Use of new technologies like podcasting (a digital media file or groups of files distributed over the internet and used for playback on portable media.... The information gained through the internet has been acting as an educative tool for students, researchers and lead the way to higher order thinking abilities. ... ?? written by Graeme Wilson, highlights the fact that in recent years the use of internet in public schools is at a height.... Not only the schools and colleges, but also each of the households has internet connectivity in British Columbia....
Preview sample
Regans Economic Strategy and Policy
16 pages (4349 words) , Download 2 , Essay
Free
dvantage in technology: It escalated the tanker war, employed chemical weapons, and ... hough most of the jobs available-computer operator, for example, or cellular ... The paper "Regan's Economic Strategy and Policy" discusses that as for the Pakistani drive to get a nuclear bomb, the Reagan-Bush administration turned to word games to avoid triggering anti-proliferation penalties that otherwise would be imposed on Pakistan....
Preview sample
Urban Regeneration Reshaping the Future
40 pages (10000 words) , Download 4 , Dissertation
This paper under the title "Urban Regeneration – Reshaping the Future" investigates the issues of the fact that cities do not exist apart from the wider economic, political, and environmental factors that set the course of the countries and nations' development.... .... ... ... Urban regeneration, being a product of social, economic, and physical necessities of the individuals, which has its origins at the beginning of urban development itself, is also a powerful tool in delivering wealth, sustainability, and social cohesion; as well as the ongoing regeneration projects are quite feasible, under certain conditions....
Preview sample
The Cultural Value of the Computer
4 pages (1112 words) , Download 0 , Essay
Free
With the advent of the internet, the use of computers has expanded where people now shop, work and study online.... It also became a venue of illicit activities such as child pornography over the internet or voyeurism for some students.... In my case, I already became familiar about United States even before coming here through the internet thus making my adjustment easier.... The paper "'The Cultural Value of the computer" argues that nowadays, computers become one of the necessities in people's life....
Preview sample
Computer Sciences and Information Technology
3 pages (750 words) , Download 3 , Case Study
Free
Privacy internet firewalls in the system prevent external access that is not authorized while intranet firewalls prevent unauthorized internal access.... technology Environment All the three companies are experiencing technological problems that have results to the challenges they are facing Low Low Combing the expertise and staff from the three companies to make the most of the available technology....
Preview sample
Computer-Based Learning
13 pages (4095 words) , Download 2 , Essay
Free
(2000) A recipe for the successful integration of computer technology into teaching and assessment.... Teachers and researchers in the education field have been given the responsibility of infusing technology into their curriculum.... Although many teachers can see the benefits technology may have to offer, they are finding it difficult to both learn themselves and teach to secondary education students.... Many teachers find that certain types of technology in the classroom make presentation of material easier....
Preview sample
Why Computers Should Replace Teachers
6 pages (1759 words) , Download 1 , Research Proposal
Free
??Online learning or e- learning as is sometimes referred to is increasingly employing computer technology to support the process” (Kaplan 2006, p.... ducators are pointing to the fact that for computers to effectively replace the teacher in the usual conventional school based setup, then critical changes must be effected in the classroom and learning environment, a process which is likely to take a considerable amount of time before its actual realization (Abernathy 1997). ...
Preview sample
How the Internet Influences Our Society
3 pages (888 words) , Download 12 , Essay
Free
"How the internet Influences Our Society" paper discusses the main influences of the internet on human life in society.... The internet has influenced education positively and negatively.... The internet has improved educational levels since the students can conduct research online.... The internet has led to many impacts in a global society.... The internet has influenced human life in many different aspects like education, the social aspect, and the health and care aspect....
Preview sample
Religion and Social Change in West Africa
8 pages (2113 words) , Download 1 , Assignment
Free
The virtual world of internet and devices that can access the internet has driven the society to adapt cultural transformation.... The paper 'Religion and Social Change in West Africa' seeks to evaluate changes in the way individuals in a community interact with their immediate environment and factors that challenge their being.... Research Essay Introduction Social change refers to changes in the way individuals in a community interact with theirimmediate environment and factors that challenge their being....
Preview sample
Fundamentals Of Sports Marketing
10 pages (2500 words) , Download 2 , Research Paper
Free
itts, B and Stotlar, D (1996) Fundamentals of Sport Marketing, Fitness Information technology, West Virginia, pp 39 ... The paper "Fundamentals Of Sports Marketing" examines selling concepts and persuasion in marketing.... It examines sports marketing using the aspect of the selling concept and persuasion, and relate it to three disciplines in the social sciences namely commerce, economics, and history....
Preview sample
How Technology has Affected Nurses
7 pages (1750 words) , Download 4 , Research Paper
Free
Over time, the nurses' unaided senses were replaced with technology designed to detect physical changes in patient conditions.... Before its widespread use, nurses relied on subtle changes in mental status and skin color to detect early changes in oxygen saturation, and they used arterial blood gasses to confirm their suspicions.... The influence of computers and internet on medical science needs no explanations now.... In short, all the aspects of modern day healthcare service are controlled by internet related technologies....
Preview sample
Dead Communication Technology
6 pages (1809 words) , Download 0 , Report
Free
Conversely, the technological advancements evidenced in the modern societal setting indicate that the past technology is obsolete.... With adequate technological advancements, numerous avenues are viable in the societal setting.... This report "Dead Communication technology" presents technological advancements.... Dead Communication technology ... ead Communication technology ... With the passage of time, the old neglected models are forgotten thus referred to as dead technology....
Preview sample
Building Blocks Daycare Center as One of the Prime Child Care Service Providers in Chicago
31 pages (8901 words) , Download 2 , Research Paper
The paper "Building Blocks Daycare Center as One of the Prime Child Care Service Providers in Chicago" states that the main objective of a child care centre is to provide quality child care services to children as young as six weeks old to 12 years old.... ... ... ... The above information will help the management of the Building Block day care centre to assess the various marketing strategies being adopted by its competitors as we can observe that the pricing strategy of the above-mentioned child care centres are almost similar, but the capacity intake of each of these child care centre varies to a great extent....
Preview sample
The Repair and Supply of Computer Parts in the Computer Galore Company
8 pages (2000 words) , Download 2 , Essay
Free
Generally, the advancement in technology has led to the increase in the use of computers worldwide even in the developing countries.... The industry remains relevant in the market because of the increase in the use of technology in institutions.... his stage involves the decline in the demand of the company's product because of dynamism in technology.... There is introduction of new technology forcing the company to reduce either the products' price or stop supplying the products....
Preview sample
The Effectness of Nike Brand Marketing
41 pages (10000 words) , Download 3 , Essay
This study has been undertaken to determine the efficacy of Nike's brand promotions.... Using the descriptive model of the qualitative method of inquiry, this paper has identified and explained five important and effective promotional tactics employed by the company through the years.... ... ... ...
Preview sample
How the Internet Altered Understanding of the Right to Privacy
6 pages (1708 words) , Download 2 , Research Paper
Free
"The internet and political transformation: Populism, community, and accelerated pluralism.... The paper "How the internet Altered Understanding of the Right to Privacy" makes it clear that Eggers, the author of 'The Circle' is distasteful of the constant erosion of individuals' privacy and interaction.... The internet altered people's understanding of the right to privacy and interaction.... The company does not take into considerations people's right to privacy especially when it creates a camera that streams videos to the internet to ensure honesty and a world free of crime....
Preview sample
Technology Enhancing Educational Experiences
8 pages (2263 words) , Download 1 , Literature review
Free
The technology used in teaching aspect shows that the level of concentration from students and the competence from teachers, has improved and the societal magnitude can be claimed to go up (Cutting, 2007). ... Unlike the old ways of teaching using books, technology, and by this one might mean usage of equipments such as data projectors computers you tube clips internet access, and social networking sites such as Facebook and Twitter, has had a significant impact....
Preview sample
Information Technology Security
8 pages (2495 words) , Download 3 , Case Study
Free
A virus attack can spread so rapidly over the internet and can destroy files and maliciously collect any confidential information and data.... The case study 'Information Technology Security' demonstrates that computers came in and finally the internet.... Computers came in and finally the internet.... Risks and threats are multiplied day in and day out because of the endless interconnection of computers via the internet.... While before computer connections were confined to a few other computers by way of cables, now it is endless because of the internet....
Preview sample
Computer Utilization in the UAE as Compared to the US
4 pages (1211 words) , Download 2 , Essay
Free
rabic internet Usage ... In the United States, it is quite common to find people of varying demographics using the internet for personal needs, varying from social networking sites, to online shopping, to even education by attending distance learning universities.... There is no specific user profile for the internet in the United States simply because it is quite common for people of all age and educational demographics to have a personal computer in their households....
Preview sample
Computer Forensics Assignment 2
2 pages (500 words) , Download 3 , Essay
Free
E-mails, texts and internet histories form a great part of the information that should be collected during the investigations (NFSTC, 2010).... ational Forensic Science technology Center (NFSTC).... It is computer Forensics Assignment 2 computer Forensics Assignment 2 Equipment and Software to Purchase A computer forensics lab shouldhave fundamental requirements for conducting investigation and ensuring safe storage of evidence....
Preview sample
Computer Architecture
4 pages (1140 words) , Download 2 , Essay
Free
Categories of computer memory and storage Computer memory has its basis almost always in semi-conductor technology.... From the paper "computer Architecture" it is clear that solid-state drives do not move and consume less power.... computer hardware and software have evolved significantly from what we have in the present day.... There have been notable milestones covered in computer architecture thanks to the contributions of the likes of Jon Von Neumann....
Preview sample
Spin Electrons and Its Use with Computers
8 pages (2121 words) , Download 2 , Research Paper
Free
pintronics incorporates new discoveries in semiconductor world to bring changes in the electronic makeup and powering of computers.... Substantial and surprising changes in spin properties can be realized through control of spin electrons within a device.... or instance, the Giant Magneto-resistive (GMR) spin-valve head for magnetic hard disk drives, a first extensively used spintronic device, experiences large changes in electrical resistance as a result of differences in the relative magnetic orientation of layers on each side of a layer merely 2 to 4 atoms thick....
Preview sample
Effective Teamwork and Its Correlates in Organizations
5 pages (9785 words) , Download 2 , Essay
Free
The findings of Jassawalla & Sashittal (2003) illustrate that the establishment of teams without specific focus on organizational changes is futile.... Lawyers should ask employees what workplace changes would increase their motivation.... He conducted a study of new product development (NPD) processes in 10 mid size to large high-technology firms; among these, 8 utilized teams....
Preview sample
Threatening Through the Internet
7 pages (1961 words) , Download 5 , Research Paper
Free
The paper "Threatening Through the internet" presented a detailed discussion on the concept of cyberbullying which has emerged as a very serious criminal act that is supported through modern technologies in the past few years.... Some of the major instances of cyberbullying can comprise having confidential emails of text messages forwarded, getting frightening messages, discomforting images distributed or rumors spread on the internet (Cheng, 2012; Ortega, Calmaestra, & Mercha?...
Preview sample
Thin Client Technology Analysis
9 pages (2722 words) , Download 1 , Assignment
Free
The thin client system does not allow the writing of information on the memory of the flash, except on circumstances were changes on the configuration are made by the user.... Furthermore storage of data is also performed much faster, for instance within the library internet services.... In the context thin client technology, internet provided by the Windows environment, central computation network linked to the WT model, provides libraries with leveraged option to ILC. ...
Preview sample
Is Internet Additive
9 pages (2471 words) , Download 3 , Essay
Free
For instance, individuals might decide to engage more in socializing with people in real life, designate specific time to use the internet and further seek alternative means of communication and entertainment that is mainly found in the internet (Graham and William 36) ... internet and Gaming Addiction: A systematice Literature Review of Neuroimaging studies.... The question of whether the internet is addictive or otherwise is a topic that has continuously elicited debate from supporters and critics across the world in equal measure In terms of technology, the internet is the fastest growing and invaluable technological tool that has....
Preview sample
Social Networks and the Internet
5 pages (1439 words) , Download 2 , Essay
Free
However, World Web is still associated with complete freedom as every user is able to decide for himself how to use the internet and social networks keeping in mind its advantages and disadvantages. ... Eventually, such changes can lead to creation of new phenomenon in sociology and culture as the density of the contacts also increases (McLuhan, 1987). ... So Internet can be regarded as a message as it changes completely the way people understand and perceive things, and the main issue of this message is its speed (McLuhan, 1962)....
Preview sample
Internet Enhanced Concern on Data Mining, Internet Cookies, and Search Engines
9 pages (2574 words) , Download 1 , Essay
Free
As the internet has evolved, it has become a part of our daily life.... The paper "internet Enhanced Concern on Data Mining, internet Cookies, and Search Engines" looks at the ways in which the internet has caused an ethical debate on our information privacy.... The use of the internet has increased with connections getting cheaper.... The rise of internet use in daily life has led to privacy concerns (Smith, Dinev & Xu, 2011)....
Preview sample
Technology and ICT
4 pages (1223 words) , Download 0 , Report
Free
Transactions take place through the internet and technologies like electronic data interchange (EDI), image processing and electronic file transfer have increased (Bierstaker, Burnaby & Thibodeau, 2001).... Introduction With the rapid changes in Information and Communication technology (ICT) changes in the accounting system of an organization also has totake place.... The report "technology and ICT" proposes the adoption of new technologies to allow unhampered accounting system within the company and focuses on corporate scandals warrant which improved corporate governance and enhanced effectiveness of the internal control system....
Preview sample
Analysis of Wal-Mart as Worldwide Leader in Retailing
10 pages (2850 words) , Download 0
Free
The changes that are instituted by the management should accommodate the employees, current and potential customers, and should serve the function of contributing towards the community so that the public image of the organization is built.... However, the customers should be notified of the changes on the distribution channel to avert confusion (Forman & Argenti, 2002)....
Preview sample
History of a Technology or Specific aspect of Engineering
10 pages (2500 words) , Download 2 , Research Paper
Since the times when software was engineered, there have been numerous changes in the world.... The changes threatened this important sector in the 1970s, but they were addressed taking the software sector to a whole new level.... This technology was used for the production of carpets and tissue.... This technology by Jaquard inspired many people to think on ways they could put instructions on the card to be replicated on the product (Robat 5)....
Preview sample
Internet in Emergency Operations
1 pages (539 words) , Download 2 , Research Paper
Free
While it is clear that most issues affecting Incident Command Systems need engagements from various stakeholders, some changes have to be from within the communities.... This research paper seeks to justify why the use of the internet in emergency response operations is not bound to reduce even after numerous security challenges have accrued in the past.... The use of internet in emergency operations is growingly becoming an integral part of the various response team....
Preview sample
The Impact of the Internet on the Fashion Industry
7 pages (2024 words) , Download 2 , Essay
Free
Most of the designers in rural areas had to travel to these cities; with the advent of internet it was possible to evaluate new trends and designs via internet and take decisions more rapidly.... part from internet and new designing programs, other inventions of communication revolution impact and will continue to impact fashion industry.... ) internet and Fashion, . ... ne of the leading internet fashion web sites Worth Global Style Network provides its subscribers with numerous options vital for those who are interested in the latest changes in fashion....
Preview sample
Transport Engineering Exam Questions
32 pages (8210 words) , Assignment
Nobody downloaded yet
The paper "Transport Engineering Exam Questions" tells us about examination booklet.... In your examination booklet clearly indicate the best single response to each of the following multiple choice questions.... ... ... ... Data on travel behaviour is required to build travel demand models.... What type of travel behaviour data is needed and how might it be collected?...
Preview sample
Computer Sciences and Information Technology
1 pages (322 words) , Download 2 , Essay
Free
The "Computer Sciences and Information technology" paper examines several programs included in Microsoft Office 2010.... Computer Sciences and Information technology There are several programs included in the Microsoft Office Some of these programs are Word, Excel, PowerPoint, Publisher and Access (Microsoft Corporation, n....
Preview sample
Active shape modelling compared to hip morphometry in the prediction of hip fracture
27 pages (6750 words) , Download 2 , Thesis
This project aims to examine the relationship between the shape of the hip joint and total hip replacement in osteoarthritis,a severe illness with significant psychological and social repercussions.... A is the most common form of arthritis and it affects the connective tissues around the joints, particularly bone and cartilage....
Preview sample
Development of Computers in Simulating the Human Brain
12 pages (3538 words) , Download 2 , Essay
Free
Nowadays, one can see the inception of computer technology.... ince the inception of computer technology, researchers have anticipated about the probability of constructing smart machines that could compete with human intelligence.... It could therefore be probable, in principle, to replicate the human brain even with existing technology (Markram, 2006, p.... With that kind of technology it is entirely probable that a computer will be framed that imitates the functions of the human brain....
Preview sample
Graph Theory in Computer Science
8 pages (2158 words) , Download 2 , Assignment
Free
The internet is a similar, large graph, and if you want to isolate certain cyber attacks, or something, you can do it using graph theory" (Deo) ... They are algorithms, cryptography, Fortran, internet connectivity, logic, Maple programming, Numerical analysis, C, error correction, graph theory, Java, Machine learning, Matlab, and theory of computation.... As I already mentioned, one of the major application areas of graph theory in computer science is algorithms and internet connectivity....
Preview sample
Chinese Brands vs. Foreign Brands: An Analysis of Chinese Consumers Preference for Foreign Brands
17 pages (5171 words) , Download 3 , Essay
Free
The Western mass media generally emphasizes quality weaknesses in production, instead of reporting about the remarkable development of a country whose industrial revolution occurred simultaneously with economic changes (Nolan, 2001).... For a number of Chinese consumers, foreign brands were believed to work or perform better due to the highly developed technology used in their development and production....
Preview sample
Connecting Router to a Computer
4 pages (1000 words) , Download 0 , Essay
Free
In a home set-up, one can have a laptop or desktop in certain rooms of the house and yet gain internet access.... Now, plug the cable that you have just disconnected from your computer into the router's internet port.... At the same time, the router's front panel, the panel, and internet must have their signal light lit.... On the router's front panel, the panel, internet, and at least one of the numbered LEDS (1,2,3,4) LEDS should be lit....
Preview sample
Social Implications of the Computer Revolution
6 pages (1500 words) , Download 2 , Research Proposal
Free
This gave rise to social networking among people which proved very beneficial and further gave further rise to new inventions which have changes our world today.... To conclude it is very fair to say that the invention was instrumental in bringing positive changes in the society.... It was a revolutionary change which brought about several integral changes in the society and made it a better one to live in.... This paper 'Social Implications of the computer Revolution' will throw light upon Guglielmo Marconi background, the development of the invention and other important aspects....
Preview sample
Human Computer Interaction Privacy Issues
12 pages (3000 words) , Download 2 , Assignment
Free
HCI has developed in general to have in mind factors like organizational, institutional and societal affects on how computer systems are merged and how the users interact with systems.... This has increasingly become essential since systems nowadays are no longer single-user, but internet-wide in their use.... Computer-Supported Cooperative Work also grew to bring in many levels of analysis, reaching internet-scale systems from small groups, and several forms of activity that include entertainment, chat, and work among other activities in communication....
Preview sample
Security Strengths and Weaknesses of the Internet
6 pages (1500 words) , Download 3 , Essay
Free
In the essay 'Security Strengths and Weaknesses of the internet' the author sought to provide the purposes behind implementing internet security measures.... They are to reduce the occurrence of risks and threats related to transfer of information over the internet.... The author suggests that internet security has become one of the main concerns for every individual connected to the internet for any purpose....
Preview sample
Technology Implementation Paper
5 pages (1250 words) , Download 2 , Essay
Also, restructuring involves changes in routine processes towards goals-oriented performance.... In this case, transaction processing systems are pre-specified and changes require the intervention of system specialists; transaction processing comprises: activity processing, report processing and enquiry processing.... New EmployeeManagers must deal with new people issues because the changes brought about by technology definitely require a new kind of employee....
Preview sample
Information Technology Security
7 pages (2129 words) , Download 2 , Coursework
Free
From nascent begins in the 1960s, the world has witnessed astronomical leaps in the development of computer technology.... he internet Control Message Protocol (ICMP) remains one of the greatest achievements of the twenty first century.... The industrial espionage has been enhanced by the establishment of a world-wide network such as the internet.... The crackers can equally be able to use the internet to have access to the salaries that the staff of an organization is paid....
Preview sample
Developing Computer Networking
4 pages (1197 words) , Download 3 , Essay
Free
Staff should also be trained about the internet security issues so that they are aware of what is going on.... There are operating systems that have integrated personal firewall such as internet connection firewalls.... The paper "Developing computer Networking" describes that computer networking has been developed over the years and this has brought many advantages in today's business society.... With computer networks, it is possible to share resources and information....
Preview sample
13601 - 13650 results of 352273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us