StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
A Computer Science Life
3 pages (750 words) , Download 2 , Research Paper
I will explore the basis of life as it is, and discern how things shape up within the world of technology and its environs.... I will explore the basis of life as it is, and discern how things shape up within the world of technology and its environs.... I would explore how the world of technology is fast changing, and what are its different avenues where growth and development could easily be understood.... I would aim to know the people who are the movers and shakers within the world of computer science and technology and would therefore try my best to be one step ahead of how they shaped up their lives and what they did in essence to reach the respective positions that they are at....
Preview sample
Dell Computer Corporation
3 pages (1017 words) , Download 2 , Research Paper
Free
Likewise, the internet was utilized for extracting facts and figures associated with competitors.... Likewise, it is most commonly used in businesses, science and technology, and engineering and covers almost all areas of computing usage.... astly, for the strategy layer, Dell utilized the most effective technology i.... The paper "Dell computer Corporation" discusses that competitive advantage can also be gained by reshaping product design and focusing on certain weak areas of the competitor....
Preview sample
The Prevalence of Computers in Society and Ethical Dilemmas
10 pages (2939 words) , Download 3 , Essay
Free
There's now a movement to bring more attention to unintended consequences resulting from the adoption of information technology.... All computer systems are vulnerable to risks.... The prevalence of computers in the society creates ethical dilemmas for both computer programmers and computer users.... Forester and Morrison strongly suggest that “computer system have often proved to be insecure, unreliable, and unpredictable and that society has yet to come to terms with the consequences…....
Preview sample
Design of a Route around the Global Village Entrance
32 pages (8000 words) , Download 3 , Dissertation
Premium+
The project "Design of a Route around the Global Village Entrance" aims to reduce the traffic congestion on the Al Zayed Road and the Al Nahyan at the cloverleaf interchange to reduce the number of accidents, time wastage due to the improved cars flow, increase road efficiency and safety.... ... ...
Preview sample
Technology Enhances Social Skills
2 pages (566 words) , Download 2 , Essay
Free
The paper "technology Enhances Social Skills" discusses that technology indeed makes life a lot easier for many in general but experts are trying to uncover certain disadvantages which are said to put the social life of the young generation in jeopardy.... This shows that technology is not posing a problem to children's interpersonal skills instead; it creates a more accessible way of communicating through a busy lifestyle....
Preview sample
Impacts of Technology on Society
7 pages (1773 words) , Download 0 , Essay
Free
The paper "Impacts of technology on Society" describes that technology has had a huge positive impact on society.... EnglishImpacts of technology on SocietyHuman life has cyclical relationship with technology.... technology is in application in daily day life.... With each day that passes, human needs tend to necessitate technology and its improvement.... People have advanced technology for use in transport, entertainment, communication, learning, healthcare, sports and for general comfort....
Preview sample
Computer forenscis
1 pages (250 words) , Download 4 , Article
Free
Linux has distinct advantages in a forensic lab setting; they are; availability and accessibility; the software is readily available on the internet.... An Overview of computer Forensics.... ?A Practitioners Guide to Linux as a computer Forensics Platform 3.... computer Forensics....
Preview sample
The Internet Teaches Society about Leadership
11 pages (3271 words) , Download 0 , Essay
Free
The Post-Modern era, which spanned the first distinct stage from 1950-1990 signifying the end of cold war era and then followed by the second stage wherein myriad technological innovations boomed such as the cable television, the internet and also marked the end of cold war itself, is witnessing a new paradigm to leadership as well.... he internet and the World Wide Web together are probably the key differentiators and a delivery mechanism for not only teaching the society about leadership but also regulating and evolving the style of leadership into the future under the prevailing knowledge based economy....
Preview sample
Computer Ethics Is a Fundamental Issue
4 pages (1090 words) , Download 4 , Essay
Free
?The Impact of the internet on Our Moral Lives.... The ethical issues related to information technology are very many and they have been described in detail in many sources, with scholars taking different opinions on the privacy of data.... The regulation of information management is essential in the Information technology field, because the sensitivity of the information varies greatly.... Moral Philosophy and Information technology....
Preview sample
What Is Meant and Understood by the Term Computer Misuse
6 pages (1963 words) , Download 2 , Article
Free
he existing UK legislative provisions are currently inadequate to deal with the practicalities of the internet and one of the main complications for law enforcement is the presence of services providing anonymity and security on the Internet.... However, these provisions do not address the technological changes and Internet usage discussed above, which makes detection and tracing very difficult, further compounded by the gaps in the Computer Misuse Act.... Finally, the All-Party internet Group report was extremely useful in adding another dynamic to the assignment content by considering the industry perspective on the Computer Misuse Act and legislative provisions....
Preview sample
New Technology in Business
17 pages (4448 words) , Download 3 , Assignment
Free
This research-based report will provide a deep insight into the overall business enhancement, web-based business implementation, web hosting, main business changes for company operations and critical security recommendations and network considerations.... This research based report will provide a deep insight into the overall business enhancement, web based business implementation, web hosting, main business changes for company operations and critical security recommendations and network considerations. ...
Preview sample
Computer Communications & Networks
8 pages (2143 words) , Download 2 , Report
Free
Page 10 Introduction Today, the internet provides numerous opportunities for humans to communicate and exchange information.... Considering internet Protocol (IP) first is vital because the rest of the TCP/IP suite is constructed on the IP.... For instance, anyone wants to upload pictures, multimedia contents to share with family, similarly, chatting with friends and colleagues from internet Relay Chat (IRC) applications.... If anyone wants to access the X-stream server from the home computer, it must be connected to the internet....
Preview sample
Factors of Social Change
6 pages (1749 words) , Download 1 , Essay
Free
By alterations, the sociology scholars refer to changes that bring profound social consequences.... Some geographical elements do initiate great social changes.... By significant alterations, the sociology scholars refer to changes that bring profound social consequences (ECLAC, 2010).... ome geographical elements do initiate great social changes.... There are a number of instances where human civilizations have fallen prey to natural calamities leading to changes in population densities, agricultural production, etc. ...
Preview sample
Internet Skills Checklist
2 pages (732 words) , Download 3 , Lab Report
Free
The report "internet Skills Checklist" focuses on the critical analysis of the major issues in the checklist of internet skills.... The following information is found under the program of computer information technology.... The links include CIS-Health Informatics, computer network operations, computer programming, computer simulation, computer specialist, and computer information systems....
Preview sample
People Have Become Overly Dependent on Technology
4 pages (1000 words) , Essay
Nobody downloaded yet
The overreliance on the internet to gain knowledge is a worrying trend, especially for the youth who are still in the educational system.... First, there are people who claim that such an assertion is wrong because humanity invented and continues to invent technology in order to benefit from it.... Thirdly, there are those factions that hold that indeed, people have become too reliant on technology for their own good.... y point of view is that in contemporary times, people have taken the use of technology too far....
Preview sample
Phishing, Pharming, and Vishing: Computer Security
9 pages (2624 words) , Download 1 , Coursework
Free
n the field of the online computer technology and security, phishing is the unlawfully deceptive procedure of trying to get hold of sensitive data and information like that passwords, usernames, and credit card information through hidden and fake means as a dependable entity in an online and electronic communication (Tan, 2009).... Information Technology, especially internet is open for everyone and it also give the opportunities to criminal people, to steal, new ways to steal them, and new techniques to harm others....
Preview sample
Mobile Technology
10 pages (2500 words) , Download 3 , Research Paper
Free
ccording to Chan et al, (2006), educational institutions are getting laptops and internet services as a result of improve technological development.... part from students getting access to learning materials through the internet, by using mobile devices such as tablets and smart phones, they can now get in contact with manufacturing specialists.... In an education system, every class has about fifty learners, and they all want to use these devices, as well as internet services at once....
Preview sample
Computer and Technology / Web publishing / Semantic Web
2 pages (500 words) , Download 3 , Essay
Free
t is technological perspective that how to implement semantic web but there are few threats about its implementation like, Semantic Web is not an incredibly speedy growing technology.... ccording to Moore's law “Costs came down when technology speedups but Revenue came up as search ad monetization.... If you adopt a new technology then you have to invest but after it fruits will came to you (Berners, et al, 2001).... Placing information/ data into RDF files, it is possible for computer programs like web spiders to look for, determine, make a choice, gather, observe and for processing information from the web....
Preview sample
Criminal Profiling And Remote Monitoring Of A Computer
4 pages (1000 words) , Download 2 , Essay
Free
To monitor different computers, various internet or computer management tools were introduced, which have now developed into mechanized practices used by forensics experts to find evidence from computers during an investigation.... It collects relevant information while operating in the background, and lets the investigators know the activities on the computer and the internet, being done by the suspect or the criminal.... This software allows the officers or investigators to remotely monitor and control a computer through the internet....
Preview sample
Voice over Internet Protocol
2 pages (671 words) , Download 3 , Essay
Free
The paper "Voice over internet Protocol" claims that communication is an essential part of our life.... This modern technology offers traditional voice-based communication facilities through new internet-based platforms.... In addition, many people use internet Protocol (or IP) just as a way to transport information and data.... If anybody has a computer, a microphone, and speakers along with a high-quality internet link, they can communicate through VoIP for free (Unuth, 2011)....
Preview sample
Impacts of Communication Technology
5 pages (1409 words) , Download 2 , Essay
Free
Without internet and communication technology the 21st century is incomplete.... Countries that have access to computers and better internet have a more connected society.... The paper "Impacts of Communication technology" describes that the human race is becoming more intelligent, well-connected and knowledgeable than they were 200 years ago.... Impacts of Communication technology Communication technology has impacted our lives in so many ways....
Preview sample
Marketing for Dell Computers
11 pages (2750 words) , Download 2 , Essay
M/s Dell Computers, a renowned international company produce and distribute best quality electronic products of Desktop PCs, Servers, Laptop PCs, TVs, Printers & Ink, Electronics, Software & Accessories and provide support as well as services to Home & Home Offices, Small &.... ... ... As an initiative to promote and escalate marketing and sales of their Printers, Mr....
Preview sample
Should Computer Scientists Experiment More
1 pages (250 words) , Download 2 , Essay
Free
For instance, the author asserts that computer science deals with programs and software that are human creations.... This implies that computer scientists do not want to waste resources SHOULD computer SCIENTISTS DO EXPERIMENTS?... Summary Walter Tichy's article discusses reasons why computer scientists should not conduct experiments.... For instance, the author asserts that computer science deals with programs and software that are human creations....
Preview sample
Distributed Software Control: A Distributed Computer System
8 pages (2440 words) , Download 1 , Report
Free
In this case the software is hosted on a remote server and accessed through the internet by clients making procedural call.... emote Procedure Call software use the network or the internet to modify, expand and to grow.... Exploring the Future of Cloud Computing: Riding the Next Wave of technology-Driven Transformation, The World Economic Forum Report.... Gaithersburg, National Institute of Standards and technology ... inetix technology group ...
Preview sample
Technology
8 pages (2000 words) , Download 3 , Assignment
3D Printing and Remote Manufacturing Author's Name Institutional Affiliation Abstract The world is experiencing rapid changes in technology with the present day looking very different as compared to some decades ago.... The rate at which these changes occur gives an indication that in a few years to come, newer things will have emerged.... societal Impact with regard to 3D Printing It is hard to think that manufacturing could be done without factories and all that are entailed in the factories such as large machines, production lines, and many other manufacturing tools....
Preview sample
Basic Operating System Security for Spark Computer
12 pages (3079 words) , Download 1 , Essay
Free
In a situation where eight characters have been used, one changes the size converting the default length to zero characters.... In the group policy, one can be able to restrict access to a certain program like internet explorer by editing of the local domain.... In our current case, the programs are internet explorer and the windows messenger.... Many organizations today utilize the full power of the advancements that are ii the field of information and communications technology in various ways....
Preview sample
Information Technology and Computing
10 pages (2500 words) , Download 2 , Essay
Free
Considering the technology changes and the average life span of the components of a computer, the average life of a computer has been estimated to three-five years only.... Over the last few decades, computing and information technology has made notable changes in the different facets of life.... Considering the technology changes and the average life span of the components of a computer, the average life of a computer has been estimated to three-five years only....
Preview sample
Data Communications and Computer Networks
4 pages (1289 words) , Download 0 , Report
Free
It can be broadly termed as phone usage through the help of the internet.... It can be broadly termed as phone usage through the help of internet.... It requires high speed internet connection to establish a call (Kelly, 2011).... All the communication is conducted over the internet Protocol. ... The TCP/IP Guide: A Comprehensive, Illustrated internet Protocols Reference.... Ethernet is a prime example of LAN technology....
Preview sample
Computers under Attack: IDS Alert
2 pages (731 words) , Download 4 , Essay
Free
For this, I would use internet search engines like Google or Yahoo to know about the threat and effective procedures through which we can clean it.... The author states that computer systems are always vulnerable to threats and intrusion on a network.... A hacker can exploit it using a remote desktop connection and could send malicious threats or Trojans to gain access to the computer from this port.... After the computer has been isolated the next step would be to detect and remove the threat using the appropriate Intrusion Detection Systems....
Preview sample
History and philosophy of International Baccalaureate programme
21 pages (5250 words) , Download 2 , Essay
With the educational needs of the globalized world, the International Baccalaureate Program (IBP) has gained popularity in the twenty first century in most parts of the world.... To understand the popularity of the IBP, this research investigates the roots, history and philosophy.... ... ... the IBP, and further discusses its three programs: International Baccalaureate Diploma Program, International Baccalaureate Middle Years Program, and International Baccalaureate Primary Years Program, thereby, the research discusses the novel approach of the IBP towards The research also finds that there is need for further research regarding the efficacy and efficiency of the IBP versus those of ordinary educational programs....
Preview sample
Impact of Nursing Shortage on the Healthcare Industry
39 pages (9455 words) , Download 10 , Essay
ue to drastic changes in the social and employment attitudes and layouts, the latest contemporary world population is aware of more options to switch to the profession that gives more facilities (Keenan & Kennedy, 2003).... The participants possessed the computer skills....
Preview sample
Social Media and Technology
5 pages (1438 words) , Download 2 , Essay
Free
Uniting the internet with the mainframe, introduced the use of electronic mail.... Another very critical point is that it depends on speeds of the internet, when they are down, one may not be able to attend a lesson or the lesson may not take place at all (Singh 18-19).... This essay "Social Media and technology" is about technology is affecting the current generation in that most of the people around the world are busy with their social network be it doing business or just socializing....
Preview sample
Benefits of Technology-Based Education
4 pages (1000 words) , Download 8 , Essay
Free
owadays technology is infused to each and every school due to which they have the internet access.... Teachers and students use the internet as it is considered as a valuable tool for accessing information easily and quickly.... Facilities like computers and internet give the students a platform for easy storage and retrieval of information.... The essay 'Benefits of technology-Based Education' resumes this approach improves the scores of all students, even those with communicative issues and special needs, allows students to receive updates in the database for each subject, and teachers to monitor the dynamics of academic performance....
Preview sample
Atlantic Computer Pricing Strategy
2 pages (500 words) , Download 2 , Essay
Free
This paper gives information that low pricing could benefit Atlantic Computer but it will require additional changes in a customer based and marketing strategies oriented on low-end server model customers.... Low pricing could benefit Atlantic Computer but it will require additional changes in customer based and marketing strategies oriented on low-end server model customers.... This paper tells that fierce competition and new economic conditions force Atlantic computer to search for a new pricing strategy....
Preview sample
Excessive Filtering of the Internet in Schools
9 pages (2410 words) , Download 2 , Essay
Free
The paper "Excessive Filtering of the internet in Schools" tells us about wireless security issues for a library.... PDA's give you the opportunity to access to the internet, check your email and much more.... You can also use General Packet Radio Service (GPRS) that is probably provided by your mobile phone network's operator to access to the internet.... Newer versions allow users to download their e-mail and to connect to the internet....
Preview sample
Organizational Change of Hilton International
4 pages (1000 words) , Download 3 , Term Paper
Free
The main changes took place three years ago and were aimed to transform traditional structure and services into a global Internet based structure and organizational performance.... For example technology, will influence tasks (nature of work changes, i.... The author examines the organizational change of Hilton International, a part of Hilton Hotel Group, is one of the organizations which have changed from a traditional organizational model to a transformed organizational model based on a skilled workforce and the internet-based services....
Preview sample
Ethical Issues of Australian Computer Society
4 pages (2202 words) , Download 2 , Assignment
Free
he Australian Computer Society (ACS) is a body that aims at promoting professional excellence and integrity in information technology.... This association has a set of codes of ethics that seek to govern and give guidelines to personnel in the field of information technology.... These codes of ethics have stipulations on what is ethical and unethical amongst professionals in practice in the field of information technology.... tandards of conduct provided by the Australian Computer Society in the codes of ethics further stipulate that the priorities of professions in information technology should endeavor to preserve continuity of services....
Preview sample
Technology of Information Security
2 pages (500 words) , Download 3 , Essay
Free
FirewallsIt is an admitted fact that the majority of business organizations are exposing their personal networks to internet traffic; as a result, the deployment of firewalls has become a basic need.... Basically, “a firewall stops illegal communication inside and outside of the network, facilitating the company to implement a security strategy on traffic running between its network and the internet” (Turban, Leidner, McLean, & Wetherbe, 2005; Laudon & Laudon, 1999)....
Preview sample
Free Trade Agreements' Negative Effects on the U.S Economic
12 pages (3351 words) , Download 0 , Coursework
Free
It also due to changes in government policy or regulations it gave them rights to earn profits.... Transferring technology ... Business trade agreements are agreements that are reached by different countries in order to come up with policies and regulations for a barrier free trade....
Preview sample
The Implication of EU Energy Performance of Building Directive
69 pages (17795 words) , Report
Nobody downloaded yet
The paper "The Implication of EU Energy Performance of Building Directive" states that implementation scenarios have been examined in the model, based on the annual property transactions, tenure, compliance and the labeled households taking action and comprehensiveness of the adopted measures.... ....
Preview sample
The Increasing Use of Computers in Schools
2 pages (677 words) , Download 3 , Essay
Free
It has been observed by many educators that the present generation or the so-called internet generation, have a shorter attention span compared to those of the previous generation.... Many young people in schools where computer laboratories are provided have utilized computers to play games, chat with friends, or surf the internet.... The advent of the modern and advance technology computers in this generation has dominated the lives of the students and has transformed those of the educators as well....
Preview sample
Computer Modeling
8 pages (2212 words) , Download 0 , Term Paper
Free
International Symposium on Fire Investigation Science and technology, 2008 USA.... The paper "computer Modeling" is a perfect example of a term paper on science.... otential applications and limitations of computer modeling to fire and explosion investigations ... Types of computer Fire Modelling 5 ... Application of computer Modelling in Field Fire Investigation with Proof 9 ... computer-based Fire Models for Fire Investigation 9 ...
Preview sample
The Evolution of Information Technology
4 pages (1262 words) , Download 0 , Essay
Free
Example is the side rule technology which is an analog computer technology used for multiplication and division. ... It is in this age that changes in the sections of digital computing occurred. ... Much of information about the evolution and development of information technology is available in the internet.... The paper 'The Evolution of Information technology ' is a creative example of an information technology essay....
Preview sample
Traffic related air pollutants: risks to human health
18 pages (4500 words) , Download 2 , Essay
Free
This study however did not demonstrate changes in lung function and bronchial hyper-reactivity.... There is some evidence that customs officers, who are exposed to high levels of diesel-engine emissions have changes in mucus membranes like dysplastic epithelia, goblet cell hyperplasia and metaplastic epithelia (WHO, 2005). ... Riedecker et al (2004) conducted a study to evaluate the physiological changes in state troopers who were healthy....
Preview sample
Computer Aided Design Software
6 pages (1787 words) , Download 1 , Assignment
Free
This is done by taking into account any symmetry, loadings, material changes or boundary conditions.... Nodes or nodal points reflect the changes in geometry, material properties, applied loads and constraint conditions.... f Science, technology, Engineering and Social Studies.... From the paper "computer Aided Design Software " it is clear that the FEA method has several advantages compared with manual methods.... The 2D computer Graphics software enables users of CAD systems to develop two-dimensional geometric models that are used in generating computer-based digital images....
Preview sample
Buying a Computer
4 pages (1126 words) , Download 2 , Term Paper
Free
The inbuilt software with the device includes software package of Norton internet Security 2013 with an availability of 60-day subscription period among others.... 0 GHZ CD-ROM Speed SuperMulti DVD burner 16X Software Norton internet Security 2013, Amazon Kindle e-reader, CyberLink PhotoDirector, CyberLink PowerDVD, Netflix Trend Micro Worry-Free Business Security Services Peripheral Devices Keyboard and Mouse Keyboard and Mouse Warranty 1 year 3 Years Price US$669 US$660 Source: (HP, 2013; Dell, 2013) References Carter, B....
Preview sample
Whether or Not the Internet Should Be Censured
15 pages (3904 words) , Download 1 , Coursework
Free
With the threat of terrorism in the modern world becoming a real threat to world security, it is indeed quite important to censure the internet and ensure that the terrorist do not have access to critical information that they can exploit to cause harm to other people.... The paper "Whether or Not the internet Should Be Censured" discusses that employees within an organisation should not be monitored by the CCTV cameras.... Ethics and E-Privacy By Ethics and E-privacy A Discussion on Whether or not the internet should be censured internet censorship can variously be defined as the suppression or the control of what can be accessed, or published on the internet....
Preview sample
Lightning Protection of Electrical Substations
37 pages (9157 words) , Thesis
Nobody downloaded yet
The writer of the paper 'Lightning Protection of Electrical Substations' states that the lightning protection measures prescribed in the BS EN/IEC 62305 will help reduce the negative impact of a lightning strike by minimizing the risk of damage and allowing the service to be restored expeditiously....
Preview sample
Internet protocol and VoIP security
15 pages (3750 words) , Download 3 , Essay
oIP (Voice over internet Protocol) in simple words would be transmission of voice signal over internet such as SIP and H.... So as we said SIP handles the setup, modification and responsible for ending a session between two terminals, these can be transmitted over internet using either UDP or TCP.... 23 is the standard for using audio-video protocol over the internet.... l 2006)SIP is also an important factor of VoIP because as we know SIP stands for Session internet protocol....
Preview sample
The Use of Computers in Education
4 pages (1000 words) , Download 3 , Admission/Application Essay
With increased access to intellectual materials on the internet, today's learners begin to think professionally from an early stage.... Arguments for Use of Computers in Education Since we live in a society replete with technology characterised by constant innovations and inventions, it is only logical that children are introduced to computers at an early stage in their lives through education.... Once the student is familiar with computer programmes, they begin to wonder and imagine how they could come up with their own programmes and models, which increases their critical thinking and empowers their creativity....
Preview sample
13901 - 13950 results of 352273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us