StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Financial Crisis and Great Stagnation
5 pages (1334 words) , Download 2 , Essay
Free
The real risk for advanced economies is the rigidity of institutions toward accommodation of changes that are truly revolutionary rather than the slow pace of innovation.... Innovation and technology are used interchangeably but the two terms are different.... Nevertheless, it is undoubtedly true that human life has never been impacted as much by innovation and new technology as it has been impacted from the start till the first quarter of the 20th century....
Preview sample
(DEGREE LEVEL) INESTIGATING THE SOCIAL
4 pages (1000 words) , Download 2 , Essay
The report provides a background to the problem, indicating that reconstruction is only a part of the story and that more fundamental changes are required.... The research topic chosen is number (3), “the social origins or social impact of a single public event in the UK between 1900 and 2000 that was relevant to major social or cultural change....
Preview sample
Impact of Information Technology on a Career
10 pages (2992 words) , Download 4 , Term Paper
Free
The term paper "Impact of Information technology on a Career" states that there is movement today for improved uses of information technology in the field of Human Resource Management.... I will investigate how companies are influenced by information technology in Human Resources Management (HRM).... Information technology is an area that is ever-changing and improving.... Information technology in Human Resources Management ...
Preview sample
The Evolution of Active Directory
8 pages (2325 words) , Download 2 , Literature review
Free
This component was introduced at a time we can call the ‘internet age'.... This was the time when the internet had just been introduced and had become widely used in different organizations.... With introduction of internet, there was a need for greater computer networking to enhance sharing of information among several computers.... Because of this property, this component could enhance information management in an organization and thus it enabled organizations to use internet effectively....
Preview sample
Computing in the New Millennium
10 pages (2500 words) , Download 2 , Essay
Free
The high end PDAs include word processing, email, calculating, databases and internet access.... ne of the popular extra devices is a way to connect to the internet via wired or wireless connection.... Most computers used to come with a modem or a fax modem top use for dialing up the internet using the phone lines and sending and receiving faxes over the same lines.... (Gookin, Dan, 2006, 123-128) However, many devices are now coming with built in Ethernet cards which connect to a broadband cable, satellite or DSL connection for high speed internet....
Preview sample
Service Quality and Consumer Satisfaction in Academic Libraries
12 pages (3000 words) , Download 3 , Case Study
Free
Furthermore, with the advancement of information technology the standard operational procedures of a library have greatly changed.... The goal of this study is to develop a management plan for an academic library.... The points discussed to provide a step by step process that ultimately concludes to the creation of a holistic method on improving the service quality as well as consumer satisfaction of academic libraries....
Preview sample
The Idea of Social Networking
7 pages (1750 words) , Download 2 , Literature review
Free
Introduction Social network is one of the most novel methods of connecting people and the emergence of internet provided this phenomenon a new dimension and a new direction.... Though in modern day world, most of the people use internet however it is still unclear as to whether that specific target market use the same channels for social networking or not.... It is argued that the use of social networks, on internet, is a good way of creating an environment which serves as a good "indicator of diffusion, shape, and cultural specificity of the network society in a given social context" (Manuel....
Preview sample
Coal to Liquid Technology
10 pages (2500 words) , Download 4 , Essay
Free
Coal to Liquid technology 0 Introduction Coal is a resource that is both cheap and plentiful.... It therefore means that clean technology has to be found to produce energy from coal.... Why coal to liquid technology needs to be developed Coal to liquid technology needs to be developed for a number of reasons.... Coal to liquid technology Coal to liquid technology (CLT) is a process in which coal is transformed into liquid....
Preview sample
Wireless Transmission and Communication
14 pages (3832 words) , Download 2 , Essay
Free
“User acceptance of computer technology: A comparison of two theoretical models.... The far-ranging diffusion of the internet, and mobile telephony have all illustration how all-encompassing this technology has become.... The far ranging diffusion of the internet, of broadband networks and of mobile telephony has all illustration how all encompassing this technology has become.... According to Noll (2000), in spite of the economic crash of the global economy over the last five years and the passing of the internet fizz, these queries remain fundamental to the regulators....
Preview sample
Global Warming, Climate Change, and Ecotourism - Australia
13 pages (3250 words) , Download 5 , Case Study
Free
This paper "Global Warming, Climate Change, and Ecotourism - Australia" focuses on the fact that after the recent recession, the tourism industry has regained its original glitter, now with a sense of green adventure.... It is true the spirit never dies, especially an adventurous one.... .... ... ...
Preview sample
Auditing and Assurance - Fashion Adornments Pfy Ltd
8 pages (2274 words) , Download 0 , Assignment
Free
arket pressures for instance changes in rates of inflation and currency rates changes are ideal indicators for threats that assist in evaluating business risk.... For instance, the company segregates well all the duties in the payroll system, the weekly payroll listing is prepared in each store by paymasters, timesheets are approved by the department managers, each store has payroll assistant who does all the calculations and verification of figures, and the human resource manager is the one that approves changes to wage rates. ...
Preview sample
Development of Mobile Phones and its Effects on Peoples Lives and Society
8 pages (2269 words) , Download 0 , Literature review
Free
Electrical or electronic signal based telecommunication systems include television invented in 1927, videophone 1930, fiber optical telecommunications 1964, computer networking 1969, analog cellular phones 1981, SMTP email 1982, internet 1983 and satellite phones 1998 (Hashimi et al 47).... This enabled treatment of voice calls as streaming audio media and utilization of packet switching over internet through VoIP. ... The gadget also offers internet services....
Preview sample
Business Proposal for AMP Co
12 pages (3100 words) , Download 1 , Assignment
Free
ide Area Networking – connecting to the internet ... onnecting to internet Service Providers (ISP) ... T staff, to connect the organization to internet. ... "Business Proposal for AMP Co" paper outlines the services that XYZ Company can offer to the Australian Mutual Provident Society (AMP)XYZ is a specialist computer support and service company based in Brisbane, Australia servicing small and medium businesses.... CR (optical character recognition) Scanning text to the computer. ...
Preview sample
Contemporary Debates and Issues in Innovation and Technology Management
8 pages (2000 words) , Download 3 , Case Study
Free
This paper discusses the current significance of innovation and technology management using normative literature and critically analyzes the case study of Apple to identify contemporary issues in international technology management and hence to justify the arguments.... ontemporary debates and issues in innovation and technology management Introduction The concepts ‘innovation' and ‘technology' are of greater significance in today's business environment because they are vital to withstand the growing level of market competition....
Preview sample
Change & Continuity in Contemporary Business
14 pages (3500 words) , Download 2 , Essay
In the hurry to tackle immediate crisis, it has not made any provision for future market changes.... It is yet to act as per the perceived changes in the coming years.... It also attempts to seek the strategic differences of Harley Davidson with its competitor Suzuki....
Preview sample
Operating Systems and Networking
5 pages (1464 words) , Download 2 , Coursework
Free
As networks are improved, there two things that change: The speeds of data transmission increases as current network technology is improved and as new technologies are invented in an organisation.... There are administration offices, lecture halls, a library, and a computer lab.... At each of the five study centres, there is an office, a small library, a computer lab, Wi-Fi hotspot, and several rooms that serve as reading areas for students and also as exam centres....
Preview sample
The Radiology Technology Field Career Path
6 pages (1500 words) , Download 3 , Research Paper
Free
This paper "The Radiology technology Field Career Path" briefly explains the importance of radiology in today's job market.... The author of the a tells that radiology technology is very much that radiology in helping the doctors in the diagnosis of diseases.... The conclusion from this study states that radiology technology is one of the rapidly developing areas in medical science in which professionals have a lot of career prospects.... The demand for properly trained professionals in the radiology technology department is increasing every day because of the population growth and subsequent increase in the number of patients....
Preview sample
How does new technology affect education
2 pages (500 words) , Download 5 , Essay
Free
internet resource.... The acceptance level by people embracing or dealing with a given mode of technology greatly influences their respective performances in both working and learning settings.... In this case, individuals' attitude in regards to a certain technology is quite evident in their results.... This is especially in a learning settings whereby one ought t present or utilize a certain preferred mode of technology to present his or Annotated Bibliography Buche, Mari W....
Preview sample
Difference between Data Redundancy and Backup
9 pages (2661 words) , Download 2 , Essay
Free
Backup Media/Redundancy/Network/internet Number: Lecturer: Backup Media/Redundancy/Network/internet Back up storage is the creation of a copy of resident data, programs and processes and placed in another location for safety in-case of unprecedented loss.... Accessibility to the data depends on the speed of the internet connection; it may be slow to access if one is using a slow internet connection (Microsoft Inc.... etwork and internet ...
Preview sample
CGI Compromising Good Filmmaking
3 pages (1047 words) , Download 2 , Essay
Some artist suggests that using CGI technology in formulaic fashion is risky because the film business polarizes between blockbuster Hollywood and reduced budget films.... CGI technology in movie creation eliminates some of the story's integrity and the audience just finds themselves out of the film.... CGI technology can permit one artist to produce a movie without using actors and costly set pieces.... The modern availability of computer-generated image software and the enormous speed of the computer has enabled small companies, and artists to create professional-grade movies, aesthetic art, and games from their personal computers, (Tumblin, Rushmeier & Georgia Institute of technology, 1991)....
Preview sample
Impressions of Nursing inormatics
1 pages (250 words) , Download 6 , Coursework
Free
The role of a nurses is to provide care and nursing informaticists view the current changes in the health care as a.... The role of a nurses is to provide care and nursing informaticists view the current changes in the health care as a chance to affect features of care that nurses have considered to be essential; attention to prevention of diseases and health promotion, attention to the community and the family, empowering the voices of the patients under their care and coordinating care across the continuum....
Preview sample
Merging Movements of the Hewlett Packard and Compaq Computers
7 pages (2026 words) , Download 1 , Essay
Free
A Paper in Managerial Economics THE HEWLETT PACKARD – COMPAQ MERGER Introduction The IT industry is an oligopoly that includes erstwhile leader IBM, and Dell computer, the merged and Compaq and Hewlett Packard, and Gateway 2000, recently merged into Taiwan-based Acer.... The essay "Merging Movements of the Hewlett Packard and Compaq Computers" discusses the merging of two companies....
Preview sample
War Time Internment
4 pages (1000 words) , Download 0 , Research Paper
Free
This paper 'War Time Internment' discusses the history of the internment and the experiences people went through in the process.... The provocation for the Americans to enter into a war was brought about by Japan which by then had joined the Rome-Berlin-Tokyo Axis in September 1940.... ... ... ... The author states that the United States got alarmed when Japan anticipated building an East Asian empire....
Preview sample
Protecting Operating Systems, Security Vulnerabilities
8 pages (2138 words) , Download 4 , Essay
Free
Authentication This is the act of verification of a user's identity before they can log into a system and be able to execute any programs or do any changes to data in it.... Updating requires good quality internet connection whereas configuration means setting the software to scan automatically, detect, destroy, or restrict malicious files or unknown incoming connections.... Identification is crucial in safeguarding integrity, privacy, and availability of any information technology infrastructure or system (Lakshmana, 2007)....
Preview sample
Preview sample
P2P Bit Torrent (Torrents)
5 pages (1250 words) , Download 2 , Assignment
Bram Cohen an American computer programmer, widely recognized as the author of the (P2P) peer-to-peer BitTorrent protocol, made the first file sharing application to use the protocol also known as BitTorrent. ... hen a person opens a web page and clicks on a link, he will have initiated a file download to the computer.... Web browser software on the computer which serves as the client, tells the server (computer holding the required file) to transfer a copy of the file to the computer....
Preview sample
Introduction to the internet and e-business
4 pages (1000 words) , Download 2 , Assignment
internet and E-business Answer 1 Business-to-business (B2B) transactions are those in which a business sells certain goods and services to another business.... Answer 3 An e-business is a business model that enables the organisations, end-users and governments to do business through leveraging technology and using the internet and features of World Wide Web (the Web) to complete transactions (Roberts, 2004).... Answer 4 internet enables businesses and consumers in real time interaction and communication through email, videoconferencing, teleconferencing, chat etc....
Preview sample
Scientific Issue and Problems Involved with Climate Change
11 pages (2925 words) , Download 1 , Coursework
Free
The climatic changes have shaped the earth as they have led to either extinction or evolution of plants and animals.... Extinct animals, for instance, dinosaurs were believed to have existed many years ago until climatic changes were too hostile for them to survive thus due to their inability to adapt to the new changes they became extinct.... Animals and plants that survived the climatic changes had to adapt to the new climate (Coward, Hare and Hurka, 37)....
Preview sample
Cognitive Social Psychology
9 pages (2291 words) , Download 2 , Essay
Free
Along with the societal change, social psychological research too changes and it is important to find the variables in the altering framework that might lead to conflict, prejudice, hatred, fellow-feeling, their increase or sometimes their reduction etc.... The paper "Cognitive Social Psychology" highlights that discursive psychology does not depend upon psychological language; instead, they have created their tools of research....
Preview sample
What will be the hot jobs in the next decade
6 pages (1500 words) , Download 3 , Research Paper
Free
Advances in technology, changes in consumer habits, an aging population and the increase in offshore jobs, among other factors, result in a dynamic labor market.... dvances in technology, changes in consumer habits, an aging population and the increase in offshore jobs, among other factors, result in a dynamic labor market.... Employment trends are constantly evolving and jobs that are popular today can quickly become obsolete as these changes occur....
Preview sample
Strategic Change Management
15 pages (3750 words) , Download 7 , Research Paper
Free
It is especially important in situations when organizations have to introduce changes.... In case a company has to introduce changes to its operations, the first thing to accomplish is to develop a strategy of further operations of the organization (ibid).... The company's mission, objectives and goals are to be redefined in the first place in order for management to have a clear vision of what particular changes are to be implemented.... Change acceptance In relation to this fact and considering people's reactions to changes, Rogers (1995) distinguishes five categories of employees that participate in the change process: innovators, early adopters, early majority, late majority and laggards....
Preview sample
The Effects of Music Technology Curriculum on Young Children's Learning in Early Childhood Education
17 pages (4250 words) , Download 4 , Research Paper
Free
t is demonstrated that music technology can deepen the bond between parents and children.... technology encourages children to explore with different sounds and to listen to music from around the world.... The Effects of Music technology Curriculum on Young Children's Learning in Early Childhood Education ... usic technology is a term commonly used to refer to electronic form of the musical arts, particularly devices and computer software that enable the facilitation, playback, recording, composition, storage, and performance of various musical compositions (Carlisle, 2013, p....
Preview sample
Challenges of Global Warming in Modern Society
6 pages (1500 words) , Download 2 , Essay
Free
rg, the changes in the earths climate system has catastrophic effects in the society and corporate world operates .... Also the changes in the distribution of vector borne diseases such as malaria, the increased migration of people has a great impact on business in terms of lack of adequate supply of human workforce and a readily available market for business products and services....
Preview sample
Personal Computing Situation Security Assessment
8 pages (3130 words) , Download 1 , Essay
Free
For the personal computing situation, the home network and internet and provision of service by the cloud storage provider will be assessed under this criterion.... ome Network and internet ... The network and the internet provides a lot of resources but is also increases vulnerabilities due to the fact that it opens up access on the device to many other people.... or services offered by a third party such as cloud storage service or the internet, the terms and conditions were reviewed to check I data protection clauses exist and what contraction to the clauses may be present....
Preview sample
Social Class Determines Child's Success
4 pages (1000 words) , Download 2 , Essay
Limited to the context of the article, this article addresses an issue where the suburban and urban well-off access high-speed internet, with the rest, who are the poor and the working class group, either using restricted wireless internet access or failing to access it at all.... ?? The word “digital divide,” in this context, means the lack of access to the technology that is the latest, especially among the rural residents, ethnic or racial minorities, or citizens of developed countries....
Preview sample
How COVID-19 Pandemic Changed My Life
6 pages (1580 words) , Download 0 , Essay
Free
Premium+
Overall, these changes have been difficult to adjust to, but they are necessary to help keep everyone safe during the pandemic.... On a personal level, one of the biggest changes for me has been how I spend my free time.... n addition to the changes in how I spend my free time, I've had to make adjustments to the way I work.... While this pandemic has had serious impacts on everyone's lives, it has also offered an opportunity for personal growth and the chance to learn how to be more flexible with unexpected changes....
Preview sample
The Impact of Implementing Information Technology on Procurement Process
14 pages (3744 words) , Download 0 , Research Paper
Free
The paper "The Impact of Implementing Information technology on Procurement Process" is an outstanding example of an information technology research paper.... With the emergence of information technology, the way of doing business processes and how the organisations carry out their activities have modified to a great level.... The paper "The Impact of Implementing Information technology on Procurement Process" is an outstanding example of an information technology research paper....
Preview sample
Secure and Architecture and Models
5 pages (1000 words) , Download 3 , Essay
Free
This generally involves attacks through the internet.... This research is aimed at providing a report on issues like security and architecture and models; system components; common criteria; Information technology Security Evaluation Criteria (ITSEC); Trusted Computer System Evaluation Criteria (TCSEC); Cyberterrorism.... Common criteria are the set of nationally and internationally recognized operational and technical configurations and standards that allow for security evaluations of Information technology (IT) technology and products....
Preview sample
United States Assistive Technology Act of 1998
4 pages (1000 words) , Download 3 , Essay
Free
Assistive technology Act of 1998 as enacted by Congress.... United States "Assistive technology Act of 1998" ... o begin, the act provides for financial assistance through grant by the federal government for programs providing assistive technology.... United s "Assistive technology Act of 1998" Insert Insert Grade Insert This paper shall focus on the U.... Assistive technology Act of 1998 as enacted by Congress....
Preview sample
Gender Inequality in Dell
8 pages (2000 words) , Download 2 , Assignment
Free
Initiation of changes on Dell's technical process with a view of achieving gender equality would incur some costs to the organization.... With regard to the changes involved, there need to be an estimate of staffing, timeline estimates, and well as budgeting (McDermott & O'Dell, 2001).... It is presumed that changes in the timeline will lead to a budget increase especially during the initial three months specifically for the processes of recruitment and training131....
Preview sample
Tax Policy Change
6 pages (1547 words) , Download 0 , Case Study
Free
A complete understanding on income inequality is not only a significant but also the largest factor that creates a recognition to whether these extremely wealthy Americans should attract tax changes.... nother consideration regarding the take on whether tax policies should attract changes on the Americans making more than $250,000 per year is the recognition that trickle down economic theory has largely proven to be ineffective....
Preview sample
Social Media and Healthcare
4 pages (1262 words) , Download 0 , Essay
Free
ost people spend their time on social media, social media usage can account for 25% of all internet logged in the USA (Nielsen Company, 2010).... In additional to this health organizations should generate an internet reputation management plan. ... Available from internet: http://blog.... Any health information that is unsecured and protected is one that is considered unusable, indecipherable or unreadable to unauthorized through the use of a technology or approach stated by the Secretary in Guidance....
Preview sample
Description of Cyber Crimes
10 pages (2807 words) , Download 4 , Research Paper
Free
Ideally, all corporations and individuals that use the internet and the computer often are at high a risk of falling prey to these crimes because cyber crimes require devices or networks in order for their destruction attempts to be effective.... In business laws, cyber crimes refer to a set of criminal activities committed on individuals or groups aimed at causing intentional harm to their reputation either physically or emotionally using chat rooms, short messages from phones, and the internet in general....
Preview sample
Strategic Change Management Questions
7 pages (2255 words) , Download 4 , Assignment
Free
nstitutionalizing the changes 6 ... A proper vision must be developed in order to ensure changes take place with ease. ... nstitutionalizing the changes ... Leading changes.... This assignment "Strategic Change Management Questions" is about McKinsey's 7S Model The model interlinks the strategic objective of the organization and change management process The model deals with an eight-step framework for the change management process....
Preview sample
Implementing Strategy and Managing Change
4 pages (1000 words) , Download 4 , Essay
In case it does not, then there is a need to undertake strategic thinking and action that could channels it into constructive and positive changes, designed for common good.... Implementing Strategy and Managing Change Introduction: This paper seeks to understand the evolving patterns of change management in institutional settings and how organizational development needs to be underpinned by change management and enforcement of institutional paradigm shifts....
Preview sample
Organizational Change Theory
5 pages (1429 words) , Download 2 , Research Paper
Free
Organizational change theory is also important for managers because this theory deals with required changes that may occur in an organization due to the influence of various internal and external forces that affect organizational policies, as well as the major functions of management.... If we talk about the importance of organizational change theory with respect to internal forces of change, we can say that this theory helps managers understand changes in the working atmosphere, changes in employment rules and regulations, and required changes in employee retention strategies....
Preview sample
Experience with Market Place Live
12 pages (1250 words) , Download 2 , Term Paper
Free
After the rejection of the company's advertising, the company re-strategized by introducing rebates and investing more in advertising and by making changes to advertising and media placements as shown in the data below ... omparison – I learnt that comparing a company with another might not be the best as evidenced in the case of Space Age Technology when it compared its design with that of its competitors; made design changes which did not work to the company's benefit....
Preview sample
The Role of the Command Line Interface in Modern Computing Operating Systems
11 pages (3047 words) , Download 0 , Literature review
Free
pk file respectively thereby rendering the program ready for installing on a device and distributing via the internet.... inally, CLI scripting plays an important role in internet connections (see screenshot 9).... creenshot 10: CLI scripting in internet connections ... ander, TO & Kothe, C 2011, ‘Towards passive brain–computer interfaces: applying brain–computer interface technology to human–machine systems in general,' Journal of Neural Engineering, vol....
Preview sample
How does Zillow.com fulfill these drivers of the internet economy
1 pages (250 words) , Download 2 , Essay
Free
Since this is an online company, it fulfils the following drivers of the internet economy in different ways. ... The internet can be.... Since this is an online company, it fulfils the following drivers of the internet economy in different ways.... In this case, this information is readily available on the internet.... The internet can be instantly accessed anywhere and it is not affected by distance at all.... People are the key aspects of internet marketing....
Preview sample
Encryption Exploitation Technologies
6 pages (1914 words) , Download 3 , Research Paper
Free
What changes is the inability for unauthorized entities to have and understanding or acquires the meaning that is contained therein (Moore, 2007).... This method of encryption became necessary and was an innovation which was aimed at solving the problem of data communication via the internet.... This is due to the fact that exchanges of data via the internet have a high likelihood of falling into the hands of the unintended audience or recipients (Al-Riyami, Malone-Lee & Smart, 2009)....
Preview sample
21301 - 21350 results of 352273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us