StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Computer Software Review
2 pages (500 words) , Download 2 , Essay
Free
includes an improvement in the start screen, a tight integration of OneDrive, additional number of snap views, internet explorer 11, an additional bundled apps, a unified search system that is empowered by Bing, capability of restoring a visible start button on the computer taskbar, capability of restoring previous behavior of an opening of the desktop of a user on the login, as opposed to the start screen (Sosinsky, 2013).... It uses a graphical user interface, and a point to click technology of the cursor and the mouse....
Preview sample
Ways in which The Internet Has changed political interactions globally
2 pages (500 words) , Download 2 , Essay
Free
n most dictatorial regimes most of the internet and Global Political Interactions There has been debate as to what extent the internet has influenced political interaction globally.... Indeed internet has played a key role in transforming political debates around the world as people can contribute either to policy debates or in demanding change in their.... n most dictatorial regimes most of the people who oppose the elites in power end up in exile but even in exile they continue to contribute their views via internet....
Preview sample
The Latest Technology in Health Information Tracking
5 pages (1465 words) , Download 4 , Research Paper
Free
Developed countries are integrating computing technology and internet to their critical infrastructure but he health sector still lag computerized information which is needed to access health inequities.... The paper "The Latest technology in Health Information Tracking" states that Thomson Reuters provides the solutions, information, insight, and analysis of its healthcare customers' requirements to manage healthcare cost, quality, market positioning, and enterprise growth....
Preview sample
Testing Internet Applications
8 pages (2215 words) , Download 0 , Literature review
Free
However, the time for developing the test environment should entail a test environment that does not result to changes of the internet applications.... "Testing internet Applications" paper discusses strategies that are applied in the testing of internet applications.... Different models for internet testing and the tools have been presented and described.... Testing of internet applications is very crucial if quality applications are to be developed....
Preview sample
Characteristic of Computers
10 pages (2559 words) , Download 1 , Term Paper
Free
The main work of ASPs is to manage and maintain business applications and to deliver them to customers via the internet.... The main work of ASPs is to manage and maintain business application and to deliver them to customers via internet.... Due to wireless fidelity radio chip installed in it, any device can sync up to a hotspot to access the internet.... The three sectors, which derive utmost benefit from this technology, are business, military and private sectors....
Preview sample
Comparison of Computer Platforms: Macs versus PCs
2 pages (686 words) , Download 3 , Essay
Free
The result is that the Mac user must spend more money to accomplish a task because the proprietary technology is more expensive than the standard technology.... "Comparison of computer Platforms: Macs versus PCs" paper argues that the differences between these two platforms are not as great as in the past but are still significant.... A Macintosh computer typically comes from the factory with nearly maximum performance.... Apple provides very few options to expand the computer or add to its performance....
Preview sample
Levels of computer control
2 pages (500 words) , Download 2 , Essay
Free
There are various levels at which a computer system can exercise control,each of which will be discussed herein and compared to the specifics in the case at hand.... he purpose of this paper is to agree or disagree that the level of computer control implemented in the Therac system was appropriate to the maximum efficient operation of the device.... It is given in the assignment that Although the computer is under operator control Introduction There are various levels at which a computer system can exercise control, each of which will be discussed herein and compared to the specifics in the case at hand....
Preview sample
Strategy of HardCo Computers
4 pages (1000 words) , Download 3 , Essay
Free
HardCo Computers needs to strategically position itself to enjoy the windfall from computer hardware tech sales in the region.... HardCo Computers In order for HardCo computers to strategically position its self to enjoy the windfall from computer hardware tech sales in the region, it is practical that it re-organizes its operational environment and mode of doing business in order to remain profitable and maintain an upward growth impetus....
Preview sample
Risk Analysis of the InSycure Computer System
8 pages (2240 words) , Download 2 , Assignment
Free
A current case for InSysecure Corporation where all its connections to the internet are protected by firewalls and network intrusion detection systems, it will be important to have updated virus-scanning software and the central console used to project the signature updates. ... internet Security Systems, Inc.... "Risk Analysis of the InSycure computer System" paper argues that as a result of the efficient defense-in-depth approach applied to disaster recovery planning, the management of InSysecure Corporation will ensure protective practices for their computer security are not ignored....
Preview sample
Private Internet Usage in the Workplace and Privacy
16 pages (4000 words) , Download 2 , Research Paper
Free
This paper 'Private internet Usage in the Workplace and Privacy' is a critical evaluation of internet usage in the workplace.... It discusses the concept of private internet usage in the workplace and privacy.... It also evaluates why organizations should be concerned about employees' use of the internet.... The author states that organizations have found it necessary to regulate internet usage in the workplace, especially with the emergence of many social networking sites....
Preview sample
How Safe Is Your Computer
1 pages (329 words) , Download 2 , Case Study
Free
Every computer user should have basic information on how to protect one's computer from viruses and scams that thrive on the internet.... 'A firewall acts as a barrier between your home computer and the internet' (Cbc.... This case study "How Safe Is Your Computer" discusses computer security as a fundamental issue in this age of information technology.... It is not only an issue for large organizations; rather, it is a concern that every computer user should know and take action towards its implementation....
Preview sample
Leadership, Strategy and Change for Apple Company
12 pages (3515 words) , Download 5 , Case Study
Free
One of the greatest challenges that Apple successfully weathered is the threat of bankruptcy the company faced in 1997 but a number of changes and strategies have over the years led to change of fortune with the company returning to solvency.... However, doing change with people is perceived as having significant impact on organisational success and can be more effective when changes are to undertaken within a short time.... The future of an organisation is a direct outcome of the decisions made by those in leadership and is dependent on ability to recognize necessary organisational changes that will lead to realization of the desired future position....
Preview sample
What Is Bluetooth Technology
8 pages (2209 words) , Download 3 , Research Paper
Free
A Bluetooth is used to allow a Laptop to connect to cell phone via Bluetooth to use the internet by making use of cell phone's wireless connectivity (Ray, 2004, p.... The paper "What Is Bluetooth technology" discusses that Bluetooth technology offers a simple and convenient method of facilitating a variety of computer devices to communicate to each other to their peripherals, at the lowest cost.... In this research, I have presented a detailed analysis of Bluetooth technology....
Preview sample
Neil Postman's Technopoly and Raysa Leer's Rethinking the Future of Learning
3 pages (750 words) , Download 2 , Essay
The author examines Neil Postman's and Raysa Leer's statements about technology in teaching.... Neil Postman proposed that technology is related to culture, and Raysa asserts that reliance on the use of technology in learning would soon kill creativity in students and encourage laziness.... technology helps teachers in the expansion text-based, linear learning and engaging students who learn best through other ways.... Evolution of the role of technology has taken steps from being a 'computer class' to a versatile learning tool....
Preview sample
Evolution of Internet: TRENDNet, D-Link and Linksys
4 pages (1102 words) , Download 2 , Essay
Free
"Evolution of internet: TRENDNet, D-Link and Linksys" paper to research these three companies selling high-speed router products.... A dial-up modem with an internet speed of about 28 kbps was extremely high in the early 1980s.... Currently, there are various applications with faster speeds and greater bandwidth for the internet.... There is video streaming, social networking, and downloading of immense files, as examples of what people can do over the internet....
Preview sample
The Internet Speed and Wi-Fi Coverage at Camps and Dormitory
7 pages (1936 words) , Download 2 , Research Proposal
Free
There are many wireless internet users at our camps and dormitory; high traffic is certainly one of the reasons for slow internet and limited Wi-Fi coverage.... This paper ''The internet Speed and Wi-Fi Coverage at Camps and Dormitory'' discusses that the slow internet connection at our camps and dormitory could be caused by various reasons.... Slow internet is often experienced when users do more that 1 thing whilst on the internet....
Preview sample
Computer Assisted Language Learning For Kuwaiti Pupils
9 pages (2563 words) , Download 1 , Coursework
Free
CALL is a technique for using technology in the field of language learning.... Computer-Assisted Language Learning (CALL) is a technique for using technology in the field of language learning.... who say, we identify four types of knowledge which must be integrated in order to produce effective language learning environments: a theory of instructional design, a theory of language teaching, a theory of language learning, and knowledge of the applicability of technology ( 1990: 136)....
Preview sample
Computer Training Program at Fortis Hospital
4 pages (1000 words) , Download 2 , Assignment
Free
In theoretical module audiences will have to give the answers of some multiple choice questions related with the computer technology and in the case of practical module staffs will be given a practical situation which has to be completed within the stipulated time.... This training will bring significant behavioral changes among the staffs of the help desk as they will feel more confidence on their own capabilities.... This assignment "computer Training Program at Fortis Hospital" deals with the problem of helpdesk staffs of the hospital who are facing serious challenges in terms of their handling of the computers....
Preview sample
The Use of Information and Communication Technology in Teaching Mathematics
9 pages (2812 words) , Download 2 , Term Paper
Free
oday, the situation is somewhat different with the advent of computer technology to assist us.... s regards generating graphics and models, computers have been used as an aid to teaching Mathematics since the beginning when computer technology had graphical capabilities.... A successful integration of computer technology depends on (1) accuracy, (2) reasoning, (3) representation, (4) communication, and (5) connections.... The thrust of the teaching strategy should be (1) ensuring that essential mathematical concepts are understood and essential skills are gained, (2) providing opportunities for self-discovery and collaboration, and (3) taking advantage of computer technology in areas where it can prove useful....
Preview sample
Victorian internet
2 pages (500 words) , Download 2 , Essay
Free
both the internet and the telegraph of the 19th century can be compared to in terms of defying distance.... The Victorian internet is, thus, a term fit to describe the advancements in technology at that time.... expression is, actually, a title to Tom Standage's 1998 book in which he describes how the telegraph technology changed the way people communicated; how it revolutionized business, and made way for new levels of contact and communication, be it romance, crime or Victorian internet Introduction The 19th century saw, what we could call, a telecommunication revolution....
Preview sample
Contemporary Issues in Information Technology Systems
6 pages (1678 words) , Download 2 , Essay
Free
The visual paradigm has thus undergone several changes due to the forward engineering process.... The designers of the oracle middleware utilize the reverses engineering process when making changes to the software.... Once the user has complied with all the requirements, it is possible to download the version of the software directly from the internet.... As the paper "Contemporary Issues in Information technology Systems" states, Middleware software has adopted cloud technology which is one of the most recent advancements in information technology....
Preview sample
Rich Internet Applications Development
6 pages (2322 words) , Download 2 , Research Paper
Free
This paper highlights the Rich internet Application.... Rich internet Application is a model of modern technology that describes a new type of application linked with the internet cloud and client.... The main idea behind the development of this model is to solve the 'rich versus reach' conundrum, facilitating internet implementation and applications to be mutually rich in functionality as well as holding to use, yet able to take full benefit of the internet's connectivity, reach and deployment model....
Preview sample
Computer Technology: Crimes
3 pages (1 words) , Download 2 , Essay
Free
This essay "computer technology: Crimes" focuses on Computer crimes that can be committed in a variety of ways including gaining unauthorized access to someone's computers, reading confidential files, deleting or modifying data, defacing websites, or sending bogus requests for web pages, etc.... Crime hurts society and while in some rare cases motivation for crime may find ethical justification, in most cases the societal and economic damage far outweighs any ethical justification....
Preview sample
Edwin Catmull and computer graphics
3 pages (750 words) , Download 3 , Essay
Free
internet resource.... He also served in the same position at the New York Institute of technology.... Kin and Jim indicate that in the same year, Edward received a contract request that would elevate him to the position of director of new Computer Graphics Laboratory at the New York Institute of technology (9).... While serving as a director at the NYIT, Edward formed a research group that worked to find proper and efficient tools that would help animator achieve easy and good animations using 2D technology....
Preview sample
Prosthetics and Computer Generated Imagery
10 pages (2723 words) , Download 2 , Essay
Free
So close, that not many people would know how it is done and some times the technology developed itself might be lost for posterity.... n the technology front, the foam latex had a number of shortfalls including the chemical characteristics of the make up that could react with the number of material in common use and could not be held up in rain or water or even exposure to air.... However, we still find the usage of CGI in specific instances and there are also full length movies that get done using this technology where the images need not be realistic and very well can be computer generated....
Preview sample
Is There any Such Thing as Digital Divide in Contemporary Society
15 pages (3750 words) , Download 2 , Research Paper
Free
This terminology came into being in 1990s soon after people started utilizing the internet and the web to find information.... Therefore deregulation through privatization of technology has spurred the use of internet and fueled the global digital divide (Columbia, 2003). ... The expansion of internet use and the associated global digital has got the attention of policy makers, strategists, scholars, entrepreneurs, and journalists (Martin Ryder, 2005)....
Preview sample
Advantages of the Internet Towards Society
1 pages (250 words) , Download 0 , Thesis
Free
Such groups create several opportunities over the internet and create value out of it.... The aim of this paper "Advantages of the internet Towards Society" is to identify the advantages of the internet towards society.... The communication aspect is capitalized for its behavior among This factor and all other factors combinedly have taken a stand to define the internet.... In the fast society life where people barely have time to see each other, internet has revolutionized the concept of togetherness and company....
Preview sample
The effectiveness of Hong Kong Law on antipirate relating to Information technology
22 pages (5500 words) , Download 2 , Essay
Record companies, for example, have protested the practice of computer users' sending unauthorized copies of digital recordings over the internet (Riordan, 1994).... irated software could be bought openly, cheaply and safely everywhere from the Golden Shopping Arcade (GSA) and Computer 33 Plaza in Shumshuipo to the "internet Zone" at Whampoa Gardens and the Sinoplaza in the Mong Kok section of Kowloon (Wong, 2005).... In August of 1996, the Business Software Alliance (BSA), working closely with the Alliance Against CD-ROM Theft (AACT), closed down an internet site called Sammy Game Center, which offered illegal CD-ROM products for sale and export to the United States, the Netherlands, Sweden and Canada, via the net....
Preview sample
Monopoly Power in the Computer Industry
3 pages (750 words) , Download 2 , Essay
But now the internet has come up to finish off the job.... Although there will certainly be many huge new internet companies, there probably won't be any major new monopolists.... Last year the company brought out its Zero Administration, which is designed to go nose to nose with the network computer.... The history of monopoly power in the computer industry is in fact extraordinarily clear-cut.... Understandably, the computer business has become more competitive over time....
Preview sample
The Digital Presence of Technology and the Advanced Usage of the Internet
8 pages (2074 words) , Download 2 , Essay
Free
This is one of the most dangerous and potential threat posed and added to the number of threats faced by the individual users of internet and social media around the world. ... he terms of use and terms and condition which are often taken for granted by the users who sign in and start using the internet and the social networking websites, all these amount to the privacy concerns and penetrating into the secrecy of individuals who may not realize the repercussions but through the usage of internet, they are enrolled into a system and mechanism through which the users are easy to trace down, easy to monitor and their activities can be noticed more actively....
Preview sample
Forensic Accountants: In the Fight Against the Misuse of Technology
8 pages (2000 words) , Download 2 , Term Paper
Free
lso, e-scams which involve fraudulent offers sent over the internet can really lead to serious fraud from third parties who approach organizations with fraudulent offers.... This paper examines the role of forensic accounting in the fight against fraud committed through the use of advanced technology.... technology gives rise to a large range of white-collar crime around the world.... Most of this technology-based fraud is related to the use of computers....
Preview sample
How the Internet Creates Communities of Interest, Helping to Forge Global Village
7 pages (2077 words) , Download 0 , Literature review
Free
In addition, people are able to find likeminded individuals on the internet and form communities regardless of the country of origin.... The internet and Governance in Asia: A Critical Reader.... Activists can now mobilise individuals to effect global environmental changes from the comfort of their homes and raise their grievances to oppose political suppression.... The paper "How thе Intеrnеt Сrеаtеs Соmmunitiеs оf Intеrеst, Hеlрing tо Fоrgе а Glоbаl Villаgе" emphasizes the internet created a new sense of community amongst individuals....
Preview sample
Biochemistry and Enzyme Technology
9 pages (2569 words) , Download 3 , Essay
Free
The paper "Biochemistry and Enzyme technology" highlights that enzyme technology is a quarter of sizeable current concentration and expansion.... Notable biotechnologies for food processing include fermentation technology, enzyme technology and monoclonal antibody technology.... Examples of the former include the production of gasoline from ethanol which in turn is produced from sugar; the production of insulin using recombinant DNA technology; the production of hepatitis B vaccine using recombinant DNA technology and the extraction of copper using mineral leaching bacteria....
Preview sample
Apple Computer, Inc
2 pages (500 words) , Download 3 , Essay
Free
In the mid 90's there was a shortage in the production of computer parts.... Almost all the computer manufacturing companies were effected and Apple was the worst effected, since Apple received all of its parts from one supplier and they were custom designed.... Apple computer, Inc In the mid 90's there was a shortage in the production of computer parts.... Almost all the computer manufacturing companies were effected and Apple was the worst effected, since Apple received all of its parts from one supplier and they were custom designed....
Preview sample
Fundamental Advances in Video Gaming Technology
8 pages (2296 words) , Download 1 , Case Study
Free
One of the most impressive modern innovations expanding the potential of gaming in general is the adaptation to the internet, and online networking in general.... This technology first became available in the 1990s, and was achieved using local area network LAN protocols allowing limited connections between adjacent devices, but on the internet it became possible also for devices to connect with one another using TCP/IP protocols.... This refers to the transmission control protocol combined with the internet protocol, a model specifying the ways in which data should be addressed, routed, and prepared for reception upon reaching its destination....
Preview sample
Violence and Computer Games
2 pages (500 words) , Download 5 , Research Proposal
Free
This reserach proposal describes computer games and a controversial issue such as violent behavior, that video and computer games may cause.... Majority of researchers consider violent computer games to be among the top causes of aggressive behavior and violence in real life, yet this research proposal also assumes that computer violence does not really causes violent behavior in real life.... Violence and computer Games 2008 Violence and computer Games Video games are a relatively new type of entertainment that first appeared only some thirty years ago in the 1970's....
Preview sample
Innovation and Change - Open Innovation and Strategy
3 pages (750 words) , Download 3 , Essay
Such innovation eventually replaces the original technology.... These computers were basically an extension of the technology used in the mainframes which were in much use in the 1970s through to the 1980s.... The computer industry across the world has greatly been disrupted by new innovations that are always meant to add value to the existing products in the market.... However, developments in the computer industry led to the introduction of personal computers....
Preview sample
Information Technology for Managers
17 pages (4250 words) , Download 2 , Term Paper
Free
In 1986, The Caterpillar Tractor Company changes its name to Caterpillar Inc.... This technique can bring drastic changes in the progress of any organization.... Currency With respect to sales and revenues, currency represents the translation impact on sales resulting from changes in foreign currency exchange rates versus the U.... With respect to operating profit, currency represents the net translation impact on sales and operating costs resulting from changes in foreign currency exchange rates versus the U....
Preview sample
How does Technology Affect Students in Classroom
8 pages (2000 words) , Download 4 , Research Paper
Free
Moreover, the use of internet applications will also provide significant benefits to gather relevant information independently.... The students are enabled to use internet applications in order to achieve extensive educational support through collecting information and study related materials from different sources from the web.... Moreover, it further enables students to consult with teachers and it also provides the benefit of gathering information from various internet sources from different locations....
Preview sample
Modern Terrorism and the Internet
3 pages (963 words) , Download 2 , Research Paper
This research paper "Modern Terrorism and the internet" discusses where the internet provides terrorists with several advantages.... Furthermore, cyber-attacks tend to attract the attention of the media to a considerable extent (Why Terrorists Use the internet, 2005).... For instance, the intricacy and distributed nature of the internet make it very difficult to control a terrorist attack and achieve the sought objectives.... The proliferation of the internet has simplified the task of terrorists in obtaining publicity....
Preview sample
Choosing a Small Business Computer
4 pages (1000 words) , Download 2 , Assignment
It is a simple small office application with minimal users, an internet connection, and printing capacities. ... This has a WI FI card for wireless connection to the internet.... There is no tool more important in the small business office than the computer.... Every transaction and communication will originate and be forwarded by the office personal computer (PC).... We will hear tales of the Mac, Linux, UNIX, and mainframes in the quest for the perfect computer system....
Preview sample
Computer Fraud Tools
3 pages (750 words) , Download 2 , Essay
computer Fraud Tool Name Institution Instructor Date computer fraud tools There are so many softwares, programs and techniques that can be used to recover lost or deleted files (Sammons, 2012).... All work on different platforms and environments, this means it is not guaranteed that one program can automatically work on two different environment although it is possible....
Preview sample
Rationale behind Increasing Computer Crime
1 pages (462 words) , Download 3 , Essay
Free
The extreme dependency on an electronic system, the increasing complexity of the IT system to support the business operations of e-commerce, and the cost of digital signature and assets has made the internet system complex as a medium of online shopping.... technology and outsourcing model of business has taken the pressure off the management team to some extent.... It is evidently clear from the paper "Rationale behind Increasing computer Crime" that hackers dent into the security system of companies to steal sensitive data....
Preview sample
Brain Computer Interfaces
2 pages (500 words) , Download 2 , Term Paper
Free
This is the reason why BCI s is also termed as “mind reading technology” (Wolpaw, R & Birbaumer, Niels p.... ?? (Wolpaw, R & Birbaumer, Niels p Brain computer Interfaces Affiliation with more information about affiliation, research grants, conflict of interest and how to contactBrain computer Interfaces              As the name suggests Brain computer Interfaces (BCI) enables communication between brain and other devices....
Preview sample
Culture, Technology, and Politics - Assignment
2 pages (500 words) , Download 5 , Essay
Free
Social media has made it easier to organize and execute regime changes and thus bring down authoritarian regimes and usher in regimes that are more democratic.... In a different example, Howard Dean initially rose to prominence by using internet donations to fund his campaigns.... The same technology later led to his downfall through excessive internet play of the “Dean Scream” video.... In the recent Egyptian protests, the protesters used internet to proliferate the protest....
Preview sample
Technology and Children
2 pages (500 words) , Download 4 , Coursework
Free
computer technology plays a vital role in the promotion of education of the infants have the need that require particular attention within the classroom.... Development of the sophisticated devices in computer technology has assisted a bigger number of pupils with more complicated disorders to overcome extensive limitations that obstruct them from classroom participation (Lindsay Daugherty, 2015).... Training the teachers and those that are mandated to offer this education to be well equipped with this computer technology is an idea we have implemented and all the teachers are well trained for effective participation in the class....
Preview sample
The Subject of Protection of the Computer System
8 pages (2139 words) , Download 0 , Assignment
Free
By only viewing the advertisements, the attackers can hijack the internet Protocol (IP) address and accordingly send spam messages, commit fraudulent activities and abuse the open network proxies.... NS rebinding attacks are well known internet security threats where attackers can infiltrate the computer security system by web browsers, java applications and flash applications.... Since, present generation is highly related with the use of internet technology, it is highly essential to understand the type of harm that can arrive from various sources and one such source is DNS rebinding....
Preview sample
E-Learning That Requires a Change in Culture
5 pages (1463 words) , Download 0 , Essay
Free
To enhance the HR practices, to increase employee involvement and commitment, organizations have been using the internet and its benefits in different ways.... Internet has introduced changes at the workplace and this has made certain issues easier to handle for the organization.... E-learning can deliver training and development across nations because of the internet technology but requires proper needs identification, establishing a need-based program, communicating to the employees, aligning with the business strategy and leading by example....
Preview sample
Suggesting Violent Computer Games are Morally Wrong
9 pages (2250 words) , Download 2 , Essay
Introduction The age of electronic and digital technology has brought forth various advancements in computers and video games.... Explain the different arguments suggesting violent computer games are morally wrong.... While some users declare that these violent computer games are not morally wrong, others insist that they encourage violent and immoral behaviour among gamers.... Body Violent computer games have increased in type and number in recent years....
Preview sample
Dell Example of Effective Usage of Internet Technologies
8 pages (2000 words) , Download 2 , Case Study
Free
The paper "Dell Example of Effective Usage of internet Technologies" highlights that companies and marketers specifically may have to boost their competitiveness through better prices and high quality.... internet security may also be improved in the future due to higher levels of innovation.... Dell is an example of a company that has embraced the full benefits that come with the utilisation of internet technologies.... n order to get to such a position, it was essential to employ sound internet technologies and e-marketing principles....
Preview sample
14701 - 14750 results of 352273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us