StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Mobile Computing and Social Networks
11 pages (3403 words) , Download 2 , Essay
Free
In fact, they should make necessary changes to their Bluetooth settings, for instance they should change it from always on to off for the reason that if it remains on it will search for other Bluetooth-enabled devices to connect to, which allows malware, hackers and viruses to enter to mobile phones.... Additionally, laptops and notebooks need a connection to a network for internet access that is available at fixed site in working or living structure or wireless access points....
Preview sample
The Impact of Web 2.0 Applications on the Use of Information
10 pages (2743 words) , Download 2 , Assignment
Free
A research conducted at the Pew internet and American Life Project revealed that well educated people tended to use Wikipedia more than their less educated counterparts (Lim, 2009).... While having the capacity to make radical changes in the way people learn and interact, it is worth noting that social sites can and have been abused in some cases.... Applications on the Use of Information Introduction Different commentators have discussed the impact of the internet on society....
Preview sample
Information Technology: Surveillance Security
7 pages (2030 words) , Download 3 , Assignment
Free
A definition associated with information and communication technology will demonstrate the concerns related to network communication privacy, confidentiality of data over the network, accessing unauthorized classified data, access to prohibited network domains and utilizing internet for concealed communication (Network Security.... This assignment "Information technology: Surveillance Security" shows that The report demonstrates a typical surveillance system for an organization, to protect critical information assets from physical theft, unauthorized access, and natural disasters....
Preview sample
ICT and Teaching and Learning of Modern Foreign Languages
12 pages (3270 words) , Download 2 , Assignment
Free
The credit goes to ICT in motivating and inspiring learners through internet, e-mailing pen pal, interactive video, internet and making teachers' job easy through word processing, blogging, authoring software, video-conferencing, multimedia resources, presentations software, spreadsheets, interactive whiteboards, and databases. ... Systematic application of the usage of computer technology in learning the languages needs to be researched and outlined so that students get the maximum benefit of the challenging new technology....
Preview sample
The Project Charter and Business Case Document
14 pages (3768 words) , Download 3 , Assignment
Free
Anticipate client change of mind whenever they wish to improve some designs or anticipate zoning changes from authorities.... As a project manager, ensure you have enough finances to implement the changes or even to continue if the client does not pay in time.... Regular discussion with the client can help in having a clear understanding with the client on cost and consequence of changes of all the entire chain effect.... Follow-up project 17 The current project will be followed by a website development project, which will avail the services to the clients, suppliers and the employees via the internet....
Preview sample
New Media and Democracy
15 pages (4492 words) , Download 2 , Essay
Free
New media and advent of internet and new technologies has led to transformations in how information are acquired and relayed.... New media and advent of internet and new technologies has led to transformations in how information are acquired and relayed.... elly, S & Cook, S 2011, Freedom on the Net 2011: a Global Assessment of internet and Digital Media (eds), Freedom House: London.... On the other hand, new media technologies such as multimedia, internet and computer-mediated communications can be utilized in encouraging active political citizenship as well as promotion of effective dialogue, debate, and political process critical analysis (Okoro 2009, p....
Preview sample
Computing Security & Computing Forensics
6 pages (1732 words) , Download 1 , Report
Free
Creating awareness will make the internet users to be extra careful whenever updating their account.... The government should set policies, which demand that whenever any device that can access internet is sold to a customer, to be supplied with personal safety advice.... The government should also give assurance to the internet users like banks, benefits of claim incase one loses money through hacking in order to raise trust on on-line services. ...
Preview sample
Social Interaction in the Modern World
5 pages (1593 words) , Download 2 , Essay
Free
Cyberbullying is the use of the internet and cell phones to attack somebody.... Cyber bullying is the use of the internet and cell phones to attack somebody.... According to an article entitled “Decline in Face to Face Contact Linked to Biological changes in Humans as Social Networking Increases,” “children now spend more time in the family home alone in front of TV/computer screens than doing anything else”(Sigman).... According to the article entitled “Decline in Face to Face Contact Linked to Biological changes in Humans as Social Networking Increases,” the more isolated people become, the worse that the society's overall health will be....
Preview sample
Technology in Education
5 pages (1250 words) , Download 7 , Research Paper
Free
While education has been a continuous quest, and it is through education that these changes and developments have been made, yet education too has undergone the modes in which it can be acquired.... The researcher analyzes the impact of technology and the internet, as well as the impact that Information Technology has on our lives today and mankind generally.... A gift of technology is internet, and internet is used as a dynamic and active medium for seeking and spreading education....
Preview sample
How did Technology connected our modern society together (such as Iphone)
5 pages (1250 words) , Download 2 , Research Paper
Phone is based on advanced technology.... iPhone is the invention of Apple Computers, a well known brand in the field of computer technologies.... The communication channels have become as fast as they were never expected before.... In the last few decades, uncountable inventions....
Preview sample
Intel: Business and Corporate Level Strategies
6 pages (1500 words) , Download 6 , Case Study
Free
To make better most companies deals their sales over internet since internet is better communication tool for current generation and more relevant and efficient.... Through this companies inform their customers about their products and services and via internet the buyers purchase their product or service.... This in return helps them manage their business more efficiently and also identify different ways to apply their technology to benefit the environment and the society at large (Intel Annual Report, 2013)....
Preview sample
Security of Voice-over-IP
17 pages (4925 words) , Download 0 , Report
Free
VoIP is an offspring of the internet and consequently inherits all the vulnerabilities of the parent network.... VoIP is an offspring of internet and consequently inherits all the vulnerabilities of the parent network.... There are also types of attack where a third party can monitor, record, block, or alter data transmission and autonomous software that can travel across the internet and IP networks and infect vulnerable host by replicating themselves....
Preview sample
Management of Information and Technology In Banking - Lloyds Bank
33 pages (8067 words) , Case Study
Nobody downloaded yet
changes in Information and Communication Technologies have recently turned out to be central to various developments within the banking as well as financial services industries.... changes in Information and Communication Technologies have recently turned out to be central to various developments within the banking as well as financial services industries.... changes in Information and Communication Technologies have recently turned out to be central to various developments within the banking as well as financial services industries....
Preview sample
Technical Writing
15 pages (3750 words) , Download 2 , Essay
Telephones, internet and many other electronic systems use wires as the transmitting media.... The changes in encoder and the decoder can be considered to be the changes in the medium.... This model also helps the group members access information from internet....
Preview sample
Globalization and Medias Influence of Perception of Luxury
8 pages (2000 words) , Download 2 , Essay
Free
The luxury industry milieu has also witnessed massive changes that undoubtedly redefined the brands existent in the market, in relation to Vigneron & Johnson (2004), and the consumer behaviours that shape the purchasing behaviors of the clients.... Persons of high class tend to have a taste and a liking for goods that have a higher value as compared to persons of low societal status.... Through globalization, it is possible to understand the relationship between various countries in an easier way as compared to the years of minimal technology....
Preview sample
Foundations of Business Computing
5 pages (1875 words) , Download 0 , Essay
Free
The importance of this is that rapid advancement of technology in the area of communications, computers, and information are the main aspects to economies structural changes in the globe.... on the internet.... ne of the methods for preventing and/or managing the spread of computer viruses is scanning traffic of internet such that only particular types of traffic of network are permitted past exterior firewalls.... The paper "Foundations of Business Computing" is a good example of an information technology essay....
Preview sample
History of Computing Timelines
6 pages (1576 words) , Download 3 , Essay
Free
1990 to 1993: According to Turner, internet and World Wide Web were realized. ... John Perry Barlow saw the Telecommunication Act being enacted that sought to restrict pornography on the internet.... This essay "History of Computing Timelines" provides a chronology of the development of computing, starting with Black's book IBM and the Holocaust, which explores the business relationship between IBM and the Nazi regime in Germany, where the Nazis used IBM punch card technology in the 1930s....
Preview sample
SME's Agains Large Corporations
19 pages (4750 words) , Download 2 , Dissertation
Free
SELECTION OF DOCUMENTS In this research, the researcher searched the electronic databases Academic Source Complete, Jstor, GoogleScholar, Primary Research, and ERIC using a combination of the following key terms: small and medium-sized enterprise, globalisation, technology, technological developments, information and computer technology, e-commerce, large enterprises, multinational corporations and global market economy.... Moreover, articles that provided a conceptual analysis of small and medium-sized enterprise, globalisation, technology, technological developments, information and computer technology, and e-commerce have been searched....
Preview sample
Marketing Audit and Marketing Objectives
9 pages (2250 words) , Download 3 , Essay
Free
Finally, by using different media channels to marketing its laptop computers including the television, print media, and the internet as well as through retailers, Dell's main objectives of achieving rapid and substantial expansion of its market share to greater heights will not only be achieved but guaranteed.... ) Legal: The United Kingdom still enforces laws that limit the technology market to safeguard national interests and local manufacturers.... The company boasts a powerful R&D that is responsive to changing market trends in the technology industry....
Preview sample
Setting up an Efficient Knowledge Sharing System
61 pages (10440 words) , Download 1 , Thesis
There are many computer applications today to realize the whole process including knowledge sharing.... This thesis "Setting up an Efficient Knowledge Sharing System" delivers a general idea of what knowledge, knowledge management and knowledge sharing are and the way to set up or develop a modern knowledge sharing system....
Preview sample
Creating Technology-Enhanced, Student-Centered Classroom
13 pages (3749 words) , Download 5 , Dissertation
Free
A private record created by an individual student, or a fast instant messaging contact with an instructor and the use of technology has ensured that the customary roles of instructors and students are experiencing swift changes required in education system.... "Creating technology-Enhanced, Student-Centered Classroom" paper identifies whether involvement in the development of technology-enhanced learning has an effect on the performance of students and whether the students like to have technology-centered classrooms....
Preview sample
Digital Literacy in Teenagers
7 pages (2132 words) , Download 4 , Essay
Free
internet and digital devices serve as a main source of entertainment to the teenagers.... The progressively growing internet and computers has become mandatory for teenagers in day to day life.... Many suggest that the internet and other digital gadgets are not only time consuming, but have an addictive effect.... Addiction to internet and digital gadgets can have negative impacts among teenagers.... With much broader approach to digital literacy teens can understand the risks involved in using internet and digital gadgets and ascertain the security of personal information and avoid scams and problems....
Preview sample
Denial-of-service Attacks
6 pages (1500 words) , Download 3 , Essay
Free
Computers and the internet provide a platform to the users for transferring data, communication, and ease of recording, executing, and evaluating information.... Computers and internet provide a platform to the users for transferring data, communication and ease of recording, executing and evaluating information.... The IP addresses, internet services and other information about each user in DDoS are different which make it problematic to be handled....
Preview sample
The Quality of Online Social Relationships
10 pages (2677 words) , Download 0 , Literature review
Free
changes in mode of communication have thus affected the society in a great way.... This literature review "The Quality of Online Social Relationships" presents Social networking that refers to the use of web-based communication tools to exchange information over the internet.... ocial networking refers to use of web based communication tools to exchange information over the internet.... At the moment, use of internet for communication has been in use than the rest of communication methods....
Preview sample
Effect of Software Technology and Electronic Transactions
8 pages (2228 words) , Download 2 , Assignment
Free
The Medicines and Healthcare products Regulatory Agency (MHRA) implements strict rules on advertising of medicinal products on the internet and had the internet service providers close down seven sites in UK and caused seven operators to modify their sites (202).... The trading prospects offered by the internet is faster than the law can cope up, the latter merely reacting to the changes (Thompson 202).... The Regulations apply to contractual transactions negotiated as distance sales or provision of services to clients on the internet, interactive digital television, mail order, telephone, etc....
Preview sample
Information Technology Operations Department - Configuration Management System
12 pages (3498 words) , Download 0 , Report
Free
This report "Information technology Operations Department - Configuration Management System" presents the analysis of Under Milkwood's IT Operations Department indicates that for efficiency in the management of the organization's operations, the IT Operations department needs to be fully equipped.... Businesses, technology, Organization, Processes and People Implementation (BTOPP) 12 ... technology 12 ... xpansion of the resort's advertisement capabilities using technology, including even multimedia desktop technologies and audio visual equipment (Pöyhönen and Tuononen 2012). ...
Preview sample
Virtual Private Network
5 pages (1563 words) , Download 4 , Research Paper
Free
Paid services are the best considering that they offer the best services such as anonymity, they do not keep logs, they offer a number of gateways in which the users can access the internet and also offer the best speeds.... They also serve to secure internet traffic.... A virtual private network (VPN) A virtual private network (VPN) is a form of a wide area network (WAN), it's a group of computers connected together in a discrete network over a public network such as the internet....
Preview sample
From Pac Man to Grand Theft Auto
7 pages (1750 words) , Download 2 , Research Paper
Free
Apart from being able to play movies it can also access Wireless internet for online gaming purposes. ... Apart from being able to play movies it can also access Wireless internet for online gaming purposes.... The survey 'From Pac Man to Grand Theft Auto' gives a detailed background of technological developments and innovations in gaming technology over the past four decades.... From Pac man to Grand Theft Auto: understanding the innovations in gaming technology: ...
Preview sample
Websites Providing Social Interaction
6 pages (1755 words) , Download 2 , Essay
Free
This story only tells about people living in the same region but in fact there are stories about people living in different parts of the world that met on the internet and went on to get married.... As the talk is live hence people can get a more vivid image of the person's expression on the other side due to changes in his voice amplitude.... As the internet gets more common in every country and every house people find it easier to connect to each other across the globe....
Preview sample
Cognitive Technologies in Enhancing Human Efficiency
7 pages (2172 words) , Download 2 , Research Paper
Free
The importance of cognitive technology in the modern societal setup is also a major consideration as systems do not work alone whether in the scientific field or in real life and the next article examines the approach of cognitive technology towards modernization.... The next article puts into consideration the aspect of cognitive technology in relation to internet usage an indication of the importance of cognitive technology in enhancing municipal services provision. ...
Preview sample
Social Media Effect on Interpersonal Relationships
6 pages (1749 words) , Download 3 , Essay
Free
The internet and social media are truly changing how we interact and how we choose to socialize; this is unlikely to change.... In the ideal situation the internet and growing technologies has the ability to open up informational horizons and broaden people's perspectives; it could be a very effective tool in this way (Vitak & Ellison, 2013).... The internet and social media are truly changing how we interact and how we choose to socialize; this is unlikely to change....
Preview sample
The Barriers of Using Technologies in Primary Public Schools in Developing Countries
21 pages (6878 words) , Download 1 , Case Study
Children can easily learn technology skills, especially when trained teachers and resources are available (Alias, 2012; Shin et al.... Many youth are already excited or used to using technology for entertainment purposes, so this awareness and interest can be transferred to educational settings (Al-Awidi and Alghazo, 2012; Couse and Chen, 2010).... technology can be used to improve learning engagement, since it can increase interest and hold attention among children (Nayak and Kalyankar, 2010: 208), although adult (teacher/parents/caregivers) supervision (school and home) may be critical to its success (Eagle, 2012; Plowman et al....
Preview sample
Globalization and Production Chain
17 pages (4250 words) , Download 2 , Essay
Since the dawn of the industrial revolution corporate orientations has undergone vast changes.... The best example of globalization is the internet revolution.... Experts believe that with the advent of technology in the past two decades and its increasing role in the business the only facet of the corporate sector that remains permanent with the passage of time is 'change'.... It is the myth of the modern corporate structure and is considered to be driving the contemporary business environment in conjunction with technology. ...
Preview sample
How the Internet Developed within a Period of 20 Years
10 pages (2846 words) , Download 1 , Case Study
Free
The Development of the internet and their Impact on Business The Development of the internet and their Impact on Business ... Chandra (2014) analyses the evolution of internet and business marketing.... Malviya & Sawant (2014) believe that the best way to analyse the development of internet and business is to analyse the online shopping market through websites like EBay and Amazon.... The paper 'How the internet Developed within a Period of 20 Years' focuses on the internet which came into existence when the USA launched an artificial earth satellite known as ARPA....
Preview sample
Company Analysis for Yahoo
14 pages (3500 words) , Download 4 , Research Paper
om their mission is to be the most essential global internet service for consumers and businesses (yahoo.... Yahoo needs no further introduction as it is one of the world's leading internet communications, commerce and media companies with over one hundred forty five million users each month and who hasn't visited Yahoo lately According to research, Yahoo retained to complete several successful banner campaigns for key Yahoo clients as well as execute conceptual work on a new global technology ventures for the company and it was said that one of its ion's banner campaigns was even served up ....
Preview sample
Digital Evolution Issues
24 pages (6303 words) , Download 3 , Essay
n line with this, it could be taken into account what was hinted that in the huge changes undergone by the world in terms of economy, there are, of course, losers and winners.... The turn of the new century has brought outstanding leaps in the realm of technology.... Moreover, the influence of technology has taken over our lives as a whole.... It is with this premise that indeed technology has changed everything, does the lecture of Craig Barrett, Chairman of Intel Corporation, revolve around....
Preview sample
Password and hacking under the privcy issues
21 pages (5250 words) , Download 2 , Research Paper
A proof of their rapid development is that, according to the FBI's National computer Crimes Squad, 85 to 97 percent of computer intrusions are not detected.... Of course, a hacker for us represents a law disobedient person, some kind of a rebel that instead of living his life normally chooses to spend days and nights in front of a computer and break into...
Preview sample
The 21st Century Classrooms Contribution to Student Enlightenment and the Global Age
30 pages (7500 words) , Download 2 , Research Paper
How far the 21st-century classrooms are contributing to student enlightenment is a test of time and also a matter of much debate, but it cannot be denied that equipped with refined technology they have great potential to do so.... How far the 21st century classrooms are contributing to student enlightenment is a test of time and also a matter of much debate, but it cannot be denied that equipped with refined technology they have great potential to do so.... A mere knowledge of computers is not enough but teachers must be thorough with an application of digital technology in their teaching....
Preview sample
Social Network Sites: Definition, History, and Scholarship
19 pages (4794 words) , Download 0 , Report
Free
, Broadband Society and Generational changes.... It is reportedly to be behind the lack of productiveness and low morale of the workers and an avenue that has promoted the spread of societal vices.... This report "Social Network Sites: Definition, History, and Scholarship" presents communication within our societies that has today become more effective as compared to before thanks to the internet.... ommunication within our societies has today become more effective as compared to before thanks to the internet....
Preview sample
Sobeys Distribution Department
9 pages (2572 words) , Download 0 , Case Study
Free
o wrap up the lengthy discussion, the changes that technology is presenting the modern day entrepreneur are limitless with all aiming at bringing positive changes to the trade.... The advent of the internet brought with it myriad possibilities which include the fact that people could easily communicate in spite of the demographic challenges or even distance.... he firm is seeking to begin employing the internet in retailing some of its product and services online....
Preview sample
Changing an Outdated Policy
7 pages (1750 words) , Download 3 , Assignment
This means that a school administrator should always strive to bring changes that will improve the performance of the students.... CHANGING AN OUTDATED POLICY Insert Introduction In his introduction to Rethinking Education in the Age of technology, John Seely describes a classroom as-a place for social learning where children learned from each .... This also entails review of outdated policies and making them up to date with the current trends in technology....
Preview sample
An evaluation of computerised accounting information systems
12 pages (3000 words) , Download 3 , Essay
The integration of the business practices and modern technology has facilitated dissemination of crucial information thereby improving the process of business decision making.... he data stored in the computer form a valuable asset for an organisation.... As long as 1958 there was no tabulation or tracking of the computer related crimes.... Such incidents have slowly gained momentum and currently the computer crime can be grouped into categories like financial frauds or theft, information theft and vandalism....
Preview sample
Types of Hacking
24 pages (6217 words) , Download 1 , Coursework
Like many malware software before it, Stuxnet was able to spread indiscriminately throughout systems, from one computer to another.... The term 'hacker' is presently too broad to represent the specifics of the different sorts of computer-related attacks.... In order to incorporate all of the different computer attacks in a way that facilitates understanding it will be necessary to identify specific sub-categories that will fall under the umbrella of 'hackers' (Howard, 1997)....
Preview sample
Intranet for Split Location
15 pages (4170 words) , Download 1 , Report
Free
Intranet (coupled with internet and online resources) facility can contribute substantially in reducing the burden on the staff and students and overcoming the time constraint.... Intranet (coupled with internet and online resources) facility can contribute substantially in reducing the burden on the staff and students and overcoming the time constraint.... ue to retirements there have been several changes to staffing and timetables within the technology department....
Preview sample
Corporate Social Responsibility at Apple
9 pages (2250 words) , Download 2 , Essay
Free
s opposed to the approaches adopted by Jobs that emphasised the need to introduce innovative technology into the market and not splashing cash in charities and societal activities, Cooks has announced a number of plans aimed at improving the relationship of the company with the stakeholders.... This has worked positively for the organization and improved its relationship with the stakeholders in the face of leadership changes in the company (Blanchard, 2012). ...
Preview sample
A Proposal on the Negative Implications of Social Networking in the 21st Century
13 pages (3250 words) , Download 4 , Research Paper
Free
societal evils lower the quality of life while presenting individuals to harm.... According to a late 2012 survey by Pew Research, Facebook takes the lead with a 67% command of internet users in the social media industry.... Twitter came in a distant second with only 16% command of internet users while Pinterest was third with 15% and Instagram claimed a 13% stake in the market (Duggan and Brenner, 2013).... The rise of social media among teenagers has been massively on the increase over the past decade, especially because the new mobile gadgets and devices are fully internet enabled....
Preview sample
Recorded Music a Paradigm in Transition
7 pages (1750 words) , Download 2 , Essay
Free
It is similar to streaming content but a podcast can be saved to a person's computer for later listening while a content stream has to be played while the computer is connected to the internet and it is very difficult to download a stream to a person's computer for later review.... The Recording Industry Association of America was created in the early 50s and was similar to the radio industry group that governed the use of airwaves by radio distributors who were once thought to be distributing music free of cost much like the internet is thought of today....
Preview sample
What Are the Features of a Gendered Approach to New Media
12 pages (3568 words) , Download 2 , Essay
Free
Gender considerations relate to feminist theories and how binary considerations of the disease refer to medical and societal considerations (Daniels, 2009).... Establishing more complicated and relevant images of women which eliminate the gendered ideals on the internet and in the mass media includes different smart people with suggestive feminist studies in play, spanning Haraway's monstrous cyborgs, Butler's gender performativity, and Octavia Butler and her discussions on recombinant genders (Wilding, 1996)....
Preview sample
How Technology, Texting Have Affected Our Language
6 pages (1801 words) , Download 3 , Research Paper
Free
The paper "How Technology, Texting Have Affected Our Language" states that children learn to decipher the fast-changing trends in computer-mediated communication and they need to do this because the internet and instant messaging are media that exist in a context of massive information overload.... An interesting study by Barron (2000) looks at the way all language develops and changes as new technologies arrive, for example when manuscripts gave way to printing in fifteenth century England there was immediately a much greater volume of written material available, and also a need for standardization....
Preview sample
Security issues in Online games
18 pages (4500 words) , Download 2 , Thesis
Free
Gaming remains one of the main drivers of computer technology.... Hackers normally try to gain hold of this password to barge into the account and make changes.... Along with the growth of internet, online gaming as also increased and along with this increase there have been the host of issues mostly concerning problematic and pervasive computer security issues.... s the number of games increased and the system performance, sped of playing and the graphics and the speed of the internet improved the advantages of playing games online started to outweigh the disadvantages....
Preview sample
1901 - 1950 results of 352273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us