StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Crime Scene Investigator
7 pages (2071 words) , Download 4 , Essay
Free
The paper "Crime Scene Investigator" states that the investigator may need to put on personal protective equipment such as splash protection, SCBA breathing apparatus, respirators, Tyvek jumpsuits, hardhats, rubber gloves, head and shoe covers, safety shoes among others.... .... ... ... A crime scene investigator refers to an expert in organized scientific collection and processing of evidence (Fish, Miller & Braswell, 2010)....
Preview sample
Supply Chain Principles and Operations
7 pages (2080 words) , Download 1 , Essay
Free
The author of the paper "Supply Chain Principles and Operations" will begin with the statement that the consultancy project was quite involved the subject under study was significantly extended, and it required a lot of personal sacrifices for it to be accomplished.... ... ... ... The entire exercise provided a learning exercise for me as I got to understand new ideas and concepts that I previously did not know....
Preview sample
Biomedical Imaging and Emerging Technologies
7 pages (1994 words) , Download 0 , Lab Report
Free
The paper "Biomedical Imaging and Emerging Technologies" is a wonderful example of a lab report on medical science.... To investigate the biomedical imaging and technologies on different types of materials having varying structures and densities.... ... ... ... The paper "Biomedical Imaging and Emerging Technologies" is a wonderful example of a lab report on medical science....
Preview sample
Grade point average and sleep relation
8 pages (2000 words) , Download 3 , Annotated Bibliography
Free
Present research holds that unsatisfactory sleep contributes significantly to grade point average.... This is not only on an adult's work presentation but also on how sound students perform at school.... Young students who suffer sleep interruptions are likely to receive awful grades (Weisler, 2012)....
Preview sample
Teaching Hacking as a General Subject
9 pages (2466 words) , Download 0 , Term Paper
Free
This term paper "Teaching Hacking as a General Subject" proposes an analysis of whether hacking can be considered a general subject.... The application of the program as a subject will improve the security systems that are being used in the business industry.... ... ... ... The paper provides an analysis of the benefits of training students about hacking in comparison to the context of failing to implement the program as a general lesson....
Preview sample
The Effect of Corruption on the Productivity of a Country
9 pages (2560 words) , Download 2 , Essay
Free
The paper "The Effect of Corruption on the Productivity of a Country" states that the corruption level is declining then the GDP level increases, declines in GDP levels are a s result of reduced economic activities due to corruption such as reduced investment levels in an economy.... .... ... ... In terms of corruption, countries are ranked as the most corrupt countries and those that are clean countries, Finland, Switzerland, Singapore, Denmark, New Zealand, and Sweden are some of the countries that have the least corruption incidences in the world while countries such as Sudan, Chad and Guinea are considered to be the most corrupt countries in the world....
Preview sample
Mode of Research and Rationale for Approach
9 pages (1919 words) , Download 0 , Essay
Free
The paper "Mode of Research and Rationale for Approach" is a perfect example of a management essay.... Completing the module was a process rather than an event.... What this means is that there were several disintegrated activities that were put together to form the successful completion of the module....
Preview sample
The Relationship between Executive Remuneration and Corporate Performance
6 pages (1909 words) , Download 2 , Literature review
Free
This literature review "The Relationship between Executive Remuneration and Corporate Performance" deals with the literature review related to the manager's compensation is linked with the firm's performance, which is a critical factor in the maximization of shareholders' value.... .... ... ... The decision-making power and the control of the firm remain with the management, whereas the stockholders are expected to be benefitted from the decision taken by the managers....
Preview sample
How Much Can the Internet Help General Motors
8 pages (2143 words) , Download 0 , Essay
Free
The paper "How Much Can the Internet Help General Motors" evaluates the business strategy and the role of the Internet in relation to this strategy.... More importantly, it will explore the significance of General Motors' e-commerce and e-business initiatives.... ... ... ... When Wagoner became president and chief operating office in 1998, he moved to merge GM and create a 'one company' philosophy....
Preview sample
Communication and Organizational Identity
8 pages (2215 words) , Download 0 , Essay
Free
The paper 'Communication and Organizational Identity' states that the introduction of telephones, fax machines, online messaging, Facebook etc.... have been used by Deakin University as a form of mediated communication.... These mediated forms of communication have resulted to the change of the concept of confidentiality and down times....
Preview sample
Handbook on International Insurance Law and Regulation
8 pages (2325 words) , Download 2 , Essay
Free
The paper "Handbook on International Insurance Law and Regulation" explains that the Amsterdam treaty depicts that the Union shall respect all fundamental rights already guaranteed by the European Convention for the Protection of Human Rights and Fundamental Freedoms enacted on 4 November 1950 Rome....
Preview sample
Managing No-show Rates in Tertiary Care Hospitals
8 pages (2543 words) , Download 3 , Research Paper
Free
The paper "Managing No-show Rates in Tertiary Care Hospitals" investigates the reasons why no-show rates are high.... This paper shall investigate the methods of managing and reducing the no-show figures so that the rate at which patients fail to show up for appointments can be kept low.... ... ... ...
Preview sample
Notion of Marriage in The Stronger and Trifles
7 pages (2044 words) , Download 4 , Essay
Free
The essay "Notion of Marriage in The Stronger and Trifles" focuses on the critical comparative analysis of the notion of marriage in The Stronger by Johan August Strindberg, and Trifles by Susan Glaspell.... Trifles and The Stronger depict the baneful effect of a broken marriage.... ... ... ... It means reputed 'good husbands,' the patriarchal oppression, characteristic coldness, the underappreciated woman's work, forgiveness/unforgiveness, the establishment of discord and disorder, and the testing of the strength of character....
Preview sample
The Difficulty in Implementation of the Electronic Health Record and Ethical Dilemmas of Its Use
6 pages (1897 words) , Download 2 , Research Paper
Free
This research paper "The Difficulty in Implementation of the Electronic Health Record and Ethical Dilemmas of Its Use " discusses ethical issues concluded from the whole research is that the main concern is about security.... People feel that their personal data is not safe with the hospitals.... ...
Preview sample
Design of a Microwave Path Profiling Link
6 pages (1972 words) , Download 0 , Coursework
Free
"Design of a Microwave Path Profiling Link" paper makes a comprehensive study of the design of a microwave path profiling link and budget calculator for various designs and applications.... The software that is designed should be capable of defining the application.... ... ... ... An appropriate design process for the system will be formulated and the particular details of the applicability of the same analyzed....
Preview sample
Cotton Company Internal Control Measures Review
6 pages (1870 words) , Download 0 , Case Study
Free
There have been a number of corruption cases in the past which have revealed that the management of stores, is an area that has a very high probability of the occurrence of fraud and corruption.... This has been due to the accessibility offered to the staff in the stores and they.... ... ... The paper "Cotton Company Internal Control Measures Review" is a perfect example of a finance and accounting case study....
Preview sample
Conflict Resolution Related to Legionella Infection
6 pages (1815 words) , Download 0 , Assignment
Free
The paper "Conflict Resolution Related to Legionella Infection" draw conclusions to the current risk of exposure to legionella bacteria and defines responsibility placed on given companies.... The latter has put up control measures to prevent legionella bacteria amplification in its water system....
Preview sample
Consumers Preferences on Mobile Phone Plan Application
8 pages (2443 words) , Download 0 , Term Paper
Free
This term paper "Consumer's Preferences on Mobile Phone Plan Application" examines demonstrates the rate at which each of the features on the consumer preference is important to their selection of a particular cell phone type.... Mobile phones have become one of the key necessities of our activities....
Preview sample
A Home-Based Nurse-Coached Inspiratory Muscle Training Intervention in Heart Failure
8 pages (2026 words) , Download 0 , Article
Free
The paper "A Home-Based Nurse-Coached Inspiratory Muscle Training Intervention in Heart Failure" is research on the nurse-coached program, called Inspiratory Muscle Training Program which helps in improving the strength of inspiratory muscles.... The research is based on a selected group of people....
Preview sample
Enterprise Information Security
7 pages (2075 words) , Download 2 , Essay
Free
The paper "Enterprise Information Security" highlights that the system should be able to be used by the user and other clients as well as other services.... This means that the system should avoid server limitations.... This might reduce the number of clients of the organization.... ... ... ... One should also be able to know the challenges that are very crucial and potential to the engineering section of the system....
Preview sample
Virtual Private Network Tools
18 pages (4500 words) , Download 3 , Term Paper
Free
The focus in this paper is on a VPN, a network connection that is built on top of already existing publicly accessible telecommunication infrastructure like the internet and is used to provide access to the central organizational network to traveling users and remote offices.... ... ... ... According to the research findings, it can, therefore, be said that reliability, privacy, and security of data are some of the key component considered essential with critical data and information being exchanged within an organization's network....
Preview sample
How to Implement Antivirus Filtering
8 pages (2097 words) , Download 4 , Case Study
Free
This paper "How to Implement Antivirus Filtering" states it's difficult to prevent insider attacks and firewalls do little to prevent them.... The paper sheds light on internet firewall security and how a good firewall can protect a person from malware, Trojan horses, and other undesirable viruses....
Preview sample
Pervasive Computing in Security
7 pages (1821 words) , Download 2 , Report
Free
This paper outlines the new revolutionary computing technology that we are confronting today upholds a paradigm that envisions a world surrounded by processors, computers, sensors, and digital communications.... Pervasive computing provides us with the opportunity to develop an enriched environment with a comfortable and convenient information era equipped with the required secure measures....
Preview sample
Employee Privacy Rights at Work
7 pages (2030 words) , Download 3 , Essay
intrusion of privacy or they are simply unaware of how limited their rights actually are, employers feel it is an essential security measure to protect the company, as well as ensure employees are not wasting valuable company time on unproductive personal business in the workplace.... ... ... ... The issues of the rights of employees to privacy versus the right of the company to protect their interests in preserving company security and monitoring productivity has created a contentious debate....
Preview sample
Unified standards
6 pages (1500 words) , Download 2 , Essay
Free
System wide rules imply standards imposed across the entire enterprise.... In view of the fact that the classical IS function has been decentralized to accommodate distributed systems, assess who should be in charge of developing and enforcing such broad standards.... ... ... ... ... First of all, I want to mention that the unified standards are essential for any kind of information systems....
Preview sample
A Hydrograph of River Cynon and Design of an Open Channel
9 pages (2524 words) , Download 1 , Report
Free
This paper "A Hydrograph of River Cynon and Design of an Open Channel" focuses on the fact that River Cynon is geographically located in South Wales and stretches from Hirwaun to Abercynon as a major tributary of the River Taff.... The river has a catchment area of 160 square kilometres.... .... ...
Preview sample
Identity Theft Through Unsecure Wireless Networks
6 pages (1821 words) , Download 2 , Literature review
Free
This paper ''Identity Theft Through Unsecure Wireless Networks'' tells that the best way to ensure that information is not obtained when using a public Wi-Fi is not only by sending any sensitive information over the network but also keeping into consideration the above steps.... ... ... ... Unfortunately, internet has become one of the ways that the thieves use to steal our personal and financial information....
Preview sample
Developing Implementation Plan Obesity in Children
7 pages (1750 words) , Download 3 , Essay
Free
The researcher shall ensure and declare that all necessary ethical considerations and stakeholder involvement are secured.... In both cases however, it is always important to obtain necessary approval and permission from individuals and authorities that matter.... ... ... ... As the paper highlights approval is sought through the issuance of consent letter or consent form to organization's leaders on their role and involvement in the study....
Preview sample
Project Plan for an Online Music Store
8 pages (2000 words) , Download 2 , Essay
Free
This paper aims to develop a business project plan for an online music store that sells music in physical and digital form, music gear, and other music related paraphernalia.... The music site will also offer added services to improve the client's experience.... ... ... ... According to the paper the aim of the store is to be a leading brand in the sale of music and associated products....
Preview sample
Definition, Organisation, and Creation of Botnets
7 pages (1890 words) , Download 2 , Case Study
Free
The paper "Definition, Organisation, and Creation of Botnets" portrays botnets as a major problem facing networks, devastating the economy to the extent that if they are not checked they could lead to a shutdown of online business.... It is necessary to have new mechanisms that will avoid botnets....
Preview sample
Utah State Capitol Building: Fort Douglas
8 pages (2257 words) , Download 1 , Case Study
Free
The author of the paper titled "Utah State Capitol Building: Fort Douglas" describes this museum as an example of a place that has adapted as America has changed in its priorities and interests, both in the local area and nationally and internationally.... ... ... ... At first dugouts and tents were used as a shelter from winter cold and the fort was staffed by members of the California-Nevada Volunteers force, but after four years these were replaced by regular army personnel....
Preview sample
Window Server 2012
8 pages (2000 words) , Download 4 , Research Proposal
Free
The author of this proposal "Window Server 2012" casts light on the Windows Server deployment proposal as an Information Technology consultant for Shiv LLC.... It is stated that the company is primarily involved in the manufacturing and distribution of solar panel for the consumer market.... .... ...
Preview sample
Introduction and conclusion
2 pages (500 words) , Download 3 , Essay
Free
Among challenges are the growing number of students with multicultural diversity, inclusion of learners with disability into the mainstream, and multiplicity of intelligences that characterize.... ... ... In response to these trends, school classrooms should be equipped with tools and aids that are pivotal in promoting learning across student cultures, levels and abilities. ...
Preview sample
Success in Marriage
6 pages (1787 words) , Download 0 , Case Study
Free
The paper 'Success in Marriage' presents marriage as is supposed to be the merry-age.... But not so for more than 50% of the married couple in America; it is the sorry-age for them.... When an individual feels that his/her marriage is on the rocks the solution is not in the number of books one reads....
Preview sample
Cognitive Behaviour Approach
10 pages (2503 words) , Download 13 , Essay
Free
The paper "Cognitive Behaviour Approach" discusses that the cognitive behaviour approach can broadly be defined as the learning process by observing actions and using internal perception to evaluate them for one's well-being and behavioural change, as well as identifying external factors.... ... ...
Preview sample
Cloud Computing and Virtualization
7 pages (1840 words) , Download 1 , Term Paper
Free
The author of the paper "Cloud Computing and Virtualization" states that in general terms cloud computing is the use of a single software application that allows users to log into a Web-based service that hosts all programs that are needed by a given company or organization (Erl et al.... 2013).... ...
Preview sample
Windows XP Operating System
8 pages (2255 words) , Download 3 , Essay
Free
This paper ''Windows XP Operating System'' tells that Windows has evolved from a program consisting of 4000 lines of codes of an assembly language that ran in 8 Kbytes of memory using then Intel 8086 microprocessor to a more complex and robust type of computer system which runs most of today's computers....
Preview sample
Chief Security Officer
8 pages (2092 words) , Download 2 , Assignment
Free
The paper "Chief Security Officer" discusses that the security of important documents in learning institutions is a factor that should never be ignored.... The chief security officers serving in the institutions of higher learning should establish measures that enhance reduced cases of cyber-crimes....
Preview sample
Communication Technologies
9 pages (2531 words) , Download 1 , Report
Free
This paper ''Communication Technologies '' tells that Focusing on the different approaches of dealing with the economy, new features and trends have developed.... The uncertain nature of the economy has led people to find different alternatives to mitigate the impacts of the harsh economic conditions....
Preview sample
Strategic Planning and Control
8 pages (2240 words) , Download 3 , Assignment
Free
The paper "Strategic Planning and Control" states that time management is very important for the successful completion of tasks or projects.... In order to manage the time, we need to place the most essential assignment at the top, even if the assigned tasks are dreading; we need to deal with them first....
Preview sample
The Importance and Relevance of Chain of Custody
6 pages (2138 words) , Download 0 , Case Study
Free
The paper "The Importance and Relevance of Chain of Custody " has demonstrated the importance and relevance of chain of custody to criminal investigations and judicial outcomes drawing reference to the murder case of Pamela Lawrence and the Madrid Bomber case.... ... ... ... Chain of Custody can be described as a procedure used to handle evidence through a series of inquiries....
Preview sample
Learning Team Assessment Strategies
7 pages (1938 words) , Download 2 , Research Paper
Free
From the paper "Learning Team Assessment Strategies" it is clear that with Olga Bartold being new in the United States and furthermore coming from a German-speaking country with no experience of working in the healthcare environment, special attention will have to be given to her.... ... ... ... Flexnet course, being one of the best flexible course designs, means that the learners can always log in online anytime for the classes and complete their coursework at their own pace (Jackson, Jamieson, & Khan, 2007)....
Preview sample
Risk Analysis of the InSycure Computer System
8 pages (2240 words) , Download 2 , Assignment
Free
"Risk Analysis of the InSycure Computer System" paper argues that as a result of the efficient defense-in-depth approach applied to disaster recovery planning, the management of InSysecure Corporation will ensure protective practices for their computer security are not ignored.... .... ... ... Information systems and hardware need to be secured from threats within and outside the enterprise....
Preview sample
Cryptographic Protocols: Kerberos and IPSec
6 pages (1895 words) , Download 1 , Assignment
Free
The author of the paper "Cryptographic Protocols: Kerberos and IPSec" paper tries to explain and contrast the role, and function of Kerberos and IPSec.... IPSec protocol has been designed to provide integrity, verification or authentication, and confidentiality in a network .... ... ... Unencrypted passwords sent over the networks are vulnerable to attacks....
Preview sample
Portfolio Risk Utilising a Value at Risk Methodology
37 pages (9250 words) , Download 3 , Dissertation
The dissertation "Portfolio Risk Utilising a Value at Risk Methodology" is aimed to examine A-Share and B-Share market segmentation conditions by employing Value at Risk (VAR) methodology to analyze daily stock-return data for a specific period.... ... ... ... In its rapid transition to a modern economy, China is undergoing dynamic change in all of its business sector and industries, a situation that presents features unique to Chinese culture and China's economy....
Preview sample
E-Learning And ICT Integration In Universities Of Saudi Arabia
26 pages (6500 words) , Download 3 , Research Paper
More and more countries are taking up e-learning for the better education system.... The paper "E-Learning And ICT Integration In Universities Of Saudi Arabia" examines the pros and cons of e-learning in Saudi Arabia and how it can improve the overall literacy and education scenario of a country....
Preview sample
Global Technology Human Resources
6 pages (1500 words) , Download 3 , Essay
Free
The paper tells that the approaches to optimizing the technical workforce in developing technology solutions across nations and cultural boundaries that include On-Line Absence Management; Employee Self Service; Enterprise Compensation Management; On-Line Employment Application Management; Vertical private networks....
Preview sample
Popular Forensic Tools
10 pages (2537 words) , Download 1 , Essay
Free
The paper "Popular Forensic Tools" compares the commercially available FTK and its open-source counterpart, Autopsy.... FTK is a high-priced commercial forensic toolkit but its ability to perform digital forensic is unquestionable.... An autopsy has features commonly found in its commercial counterparts....
Preview sample
Analysis of Stone and Paper Game
9 pages (2276 words) , Download 0 , Assignment
Free
The paper "Analysis of Stone and Paper Game" tells us about program what enables the user to play the stone/paper/scissors game against the computer.... When this game is played between two people, the players simultaneously choose one object (stone, paper, or scissors).... ... ... ... After a count of three, the players make either a fist for a stone, a flat hand for paper, or a 'V' with two fingers to represent scissors....
Preview sample
Audience Ethnography
8 pages (2071 words) , Download 0 , Report
Free
This paper ''Audience Ethnography'' tells that According to Wilson (2004), Audience Ethnography is a field that deals with research done by observing behaviors, culture, and habits of a certain group of people while watching a live performance, concerts, television programs, speeches, or even downloaded movies on their computers....
Preview sample
15901 - 15950 results of 32118 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us