Studentshare can solve a range of IT problems. Just join our amazing database of Computer Science academic papers. Whenever you face a challenge in the face of scientific and practical approach to computation and its applications, the samples of other stu
dents’ works will help you to understand the essence of this subject. With the help of free Information Technology material such as personal statements, essays, research papers, case studies, problem solutions, and outlines, you will raise your skills worth of Massachusetts Institute of Technology, Stanford University or Carnegie Mellon University, Harvard or Berkeley.
Is information society the consequence of a revolutionary change from previous social relations or has there just been gradual evolution?
5 pages (1250 words) , Essay
Only on StudentShare
This is a very interesting phenomenon because it touches upon quite a few significant areas – most important of that are the ways and means through which information actually reaches the intended recipients, or in layman terms, to the people themselves.
EBay Usability Testing Evaluation
3 pages (750 words) , Essay
Only on StudentShare
A Website usability or ease of use is important and a basic fragment of its realization, particularly with sites becoming more and more packed with features that are complex and interactive. The user-aligned design is all about creating websites that accomplish the objectives and requirements of its handlers.
Overview and Objectives of the Network Technology
5 pages (1250 words) , Term Paper
Only on StudentShare
There are many internet applications available to organizations that can help build reliable networks. However, there is need for careful analysis of the benefits and the costs of adopting such systems into medical facilities, that include logging in of patient details, keeping track of the treatment process and recording of prescriptions.
Social Media has Become a Ubiquitous Part of the Internet
6 pages (1500 words) , Essay
Only on StudentShare
Social media refers to the platform on the Internet where various people in the society share their ideas and daily experiences. Social media provides the society with an avenue to express itself freely and make friends across the globe. This essay provides a comparative analysis of various social media platforms such as Facebook, Ello, and Experience Project.
Private Search and Seizure and the Fourth Amendment
5 pages (1000 words) , Essay
Only on StudentShare
According to the paper, Private Search and Seizure and the Fourth Amendment, in State v. Buswell, the Minnesota Supreme Court held that the protection of the Fourth Amendment was limited to government action and thus any private searches conducted by private citizens were not covered by the exclusionary rule. 
Amazon
5 pages (1250 words) , Research Paper
Only on StudentShare
This report discusses the popularity of the technology and possible improvements to the technology. It discusses how the technology affects the life of an individual and the various ways it has aided the research process. The future role of the technology is also discussed and the impact it has on people who make use of it in research.
The History Of Women And Science
5 pages (1250 words) , Research Paper
Only on StudentShare
Women scientists have become the objects of a new field of study. For instance, in the last fifteen years, a new of field of inquiry referred to as Women and Science, Gender and Science or a combination of the two. The new fields have look at the inequalities that women have suffered in the profession of science.
Accounting Information System in Companies in Australia
6 pages (1500 words) , Research Paper
Only on StudentShare
The paper will also highlight the areas where the AIS need improvement such as poor quality information because it directly affects the decisions of organizations. By collecting the data from different organizations and in consideration to the previous literature findings, this report will evaluate the role of accounting information systems. 
Violence and Computer Games
2 pages (500 words) , Research Proposal
Only on StudentShare
This research proposal uses a few respective researches by ScienceDaily journal, Zisman and Gerbner psychologists. Majority of researchers consider violent computer games to be among the top causes of aggressive behavior and violence in real life, yet this research proposal also assumes that computer violence does not really causes violent behavior in real life.
Computer Science and IT
4 pages (750 words) , Article
Only on StudentShare
The author states the computerized accounting system has two main aspects that include accounting principles and a user defined structure for the upkeep of records and production of reports. There is a requirement to create innovative products and services to respond to the variable customer routines and their demographics.
Anonymity and Abuse on the Internet
6 pages (1500 words) , Essay
Only on StudentShare
Premium quality
Crime is on the rise within Internet and there is absolutely no denying this fact at all. This is because the people have started feeling frustrated while remaining confined within the domains of the Internet and have thus limited their lives due to a number of reasons (Crystal 2001).
The Use of Web Bugs at Home Connection
2 pages (500 words) , Case Study
Only on StudentShare
The researcher states that though the bugs were intended to collect information regarding their promotion, most of their subscribers were not informed of the intention behind the company’s venture. This therefore makes their illegal access to their subscriber’s personal information a violation of their privacy rights.
Universal Serial Bus 3.0
4 pages (1000 words) , Research Paper
Only on StudentShare
Likewise, in terms of data transfer is gigabytes or terabytes, data transfer speed is relatively slower and if the task is interrupted, everyone is reluctant to tries and initiates the troublesome and time consuming data transfer process again
How Learning Strategies Have Changed and May Continue to Change in Relation to the Application of Information Technology (IT) in Schools
5 pages (1250 words) , Essay
Only on StudentShare
According to the report over the past years, advancements have occurred in the field of IT especially in the use of computers as well as communication technologies. IT is applied in all aspects of personal and professional life. IT has also had great influence in the field of education especially distance education.
W4-Policy, Team, and Information Technology Differences
7 pages (1750 words) , Essay
Only on StudentShare
According to the report companies constantly lay emphasis on smoothing several areas of work and emphasize the need to streamline organizational policies and procedures such that every individual responsibility within an organization can be performed in a clear and concise fashion using the least possible resources, effort and time.
The process of measuring and comparing service utilization
2 pages (500 words) , Essay
Only on StudentShare
The methodology that was used in the research was mixed-methods. The researcher used a form that had input from the teams incorporating the basic data that they were collecting. The form allowed him to collect information such as contact location, the persons at the contact, unusual activities, indirect and direct client activity type.
Security Analysis and Redesign of a Network
14 pages (3500 words) , Coursework
Only on StudentShare
XYZ Invitation Printing and ABC Invitation Design have merged into A2Z Invitations Company. Prior to the merger, ABC, a virtual firm, hosts a proprietary website that enables its customers to carry out some preliminary work on its website; it usually consulted with a third party designer to perform for the end product.
Personal Trainer Inc.
2 pages (500 words) , Coursework
Only on StudentShare
A user of system interacts with the proposed system to fill the form of new membership, pays charges and gets receipt, gets scanable ID and also updates the information about its activities and preferences.
A Concept to Avoid and Minimize Security Risks in Cloud Computing
9 pages (2250 words) , Essay
Only on StudentShare
According to the report this computing technology greatly influence the way people use computers and access to their personal data or information. However with this new communication and technology models, comes personal and business data security challenges. The main concern in cloud technology is its security and privacy.
Ethics in Cyberspace
4 pages (1000 words) , Download 1 , Essay
This essay is going to study of code of ethics that are used pertaining computer networking and what behavior should be expected in such cases. It also deals with what computer is networks are used and how they are programmed nowadays. Topics such as display people’s personal information and the anonymity of their location are discussed.
Analysis that Compares and Contrasts UNIX/Linux and MS Windows
9 pages (2250 words) , Essay
Only on StudentShare
In the modern computer environment, the operating systems run by the majority of the world’s personal computers have become divided on the lines of MS Windows and UNIX/Linux both of which have their plusses and minuses.
Information Systems
2 pages (500 words) , Download 1 , Essay
The motivation behind this project is to seek an efficient mechanism for patients to electronically enter their data for safe uploading into the EMR. In the design, development, and implementation of an IT support to satisfy the patient requirements, a hybrid of agile and extreme software development methods is employed.
Overview and Advertisement related to Social Networking
16 pages (4000 words) , Essay
Only on StudentShare
Social software consist a large number of soft wares which helps the users to interact with each other, share data in form of pictures and media, learn new stuff and entertain ourselves with games and many different tools.
Help Desk/Technical Support Software Tools
6 pages (1500 words) , Research Paper
Only on StudentShare
At the present, help desks have become a very important part of high-quality business service as well as corporate operation. Though, dealing with the challenging issues, choosing the accurate tools, and handling the help desk properly could be an extremely daunting task.
Information Technology In Agriculture
3 pages (750 words) , Download 1 , Essay
Usually in under development countries economy is heavily dependent on the agricultural sector that also provides the basis for the development of other sectors. Its direct contribution to Gross Domestic Product (GDP) is 25% and indirectly contributes a further 27% through linkages with agro-based and associated industries.
The Significance of Software Development
5 pages (1250 words) , Essay
Only on StudentShare
Software Development is picking pace as an inalienable force in the information technology world. Nations worldwide have taken concern of the importance of ICT as being both a Social and Economic development facilitator. Therefore, Software Development can   be considered as a core of information technology (Cohn, 2004).
Benefits of Mobile Business Intelligence
3 pages (750 words) , Research Paper
Only on StudentShare
According to the report Mobile BI applications optimizes the traditional business intelligence reports so that they can be viewed easily on the small screens of mobile phones and is ideal for displaying alerts on the screens with simple graphs, spark lines and charts and also efficient in displaying key performance indicators.
IT & Entrepreneurship
14 pages (3500 words) , Download 2 , Essay
According to the report Dental Ease will have all these prices with any deals or discounts offered on our website from these dentists all across the region for our customers to compare and pay for these availed services easily. It will be one of its kind business and people will be attracted to this service, as it will not cost them any additional money.
Wireless Communication
2 pages (500 words) , Essay
Only on StudentShare
As all nodes are interconnected with each other hence mesh topology yields greatest amount of redundancy, so in the event that one of those nodes fails, network traffic can be directed to any of the other nodes.
Effective software development project
4 pages (1000 words) , Download 1 , Essay
According to the author, tools alone will not fully solve software engineering's problems. Neither will process alone. Both are needed to obtain a balanced result. They can improve productivity, reduce errors, simplify routine tasks and free engineers for more creative work. This is especially true for large systems performing more complex functions.
XIS13-6: Grid Services and Distributed Networking
5 pages (1250 words) , Download 1 , Essay
Grid technology promises to provide the next generation computational infrastructure; a layered network services that allow users single sign-on access to a picture perfect distributed collection of computers, data and application resources.
The Internet
3 pages (750 words) , Download 1 , Essay
According to the report browsing the internet has become a necessity as it is convenient and provides a portal to endless information with just a click of a button. It is important to consider both the advantages and the disadvantages of using the internet, as both are equally significant in their effects.
Social Responsibility
6 pages (1500 words) , Case Study
Only on StudentShare
The aim of the paper is to show all the problems that appear on Facebook. Privacy is very important. People do not like to be stalked and they want to ensure their safety. Third party software developers are able to get sensitive information as they have the behavioral tracking. Other people can view the profile or the can ask others to let them view the profile.
Information and Communication Technologies (Icts) In University
8 pages (2000 words) , Download 1 , Essay
According to the report a wide number of technologies have been developed to enhance the process of information and communication assisted technologies across the globe. These include the introduction of computers, mobile phones, the internet, use of wireless communication approaches among other gadgets.
Information Systems
3 pages (750 words) , Research Paper
Only on StudentShare
The paper explains that network design allows for the planning of the implementation of the entire computer network infrastructure within the business. Within the company’s framework, the whole network design is normally portrayed as a network diagram well enough to serves as the blueprint for realizing the communication network physically.
Local Area Networking Technology
15 pages (3750 words) , Download 1 , Assignment
As the report declares Local Area Networking technologies utilizes the concept of Local Area Network (LAN), which refers to the data communication network that connects computers, terminals, and printers in a building or within geographically limited areas. Wireless links or wired cables could be used to connect devices within a LAN. 
Evaluation of Save The Children Website
4 pages (1000 words) , Download 1 , Essay
The main problem is the usefullness of the website. The organization of Save the Children and the very name itself lends to the description and explanation of what the organization does and its respective efforts specifically to help children, however as previously mentioned the aspect of trafficking is not described or stated anywhere that is easily accessible from the landing page.
PHP Libraries and Frameworks
6 pages (1500 words) , Download 1 , Essay
User interactivity in the system is my area of focus. In this evaluation I will measure the overall user experience, satisfaction. First, the design representation of Google is appealing. It allows the user to achieve the goal at that step. It’s simple homepage is intuitive and easy to use, in addition, it provides the user with many options to use.
Case Study of Manheim Auctions : Application of Information Systems Strategy concepts covered to the analysis of business situations.
6 pages (1500 words) , Download 1 , Essay
Manheim, the largest used auto reseller in the world, wishes to expand into European markets with its online sales, while continuing to develop and increase its supply from Japan’s AUCNET.
Security Risk Mitigation Policies
2 pages (500 words) , Coursework
Only on StudentShare
Despite the fact that the wireless networking provides numerous advantages, it is also coupled with various security threats which can alter an organization’s overall security profile. In the case of the wireless network bridge, there is need for effective management to the threats linked with wireless technology. Thorough and sound assessment of the risk provided in the environment should be done in order to develop a plan to mitigate it.
Development of Cloud Computing
5 pages (1250 words) , Thesis
Only on StudentShare
From this research, it is clear that the community cloud is shared among many organizations having identical business requirements. Moreover, the required infrastructure is shared among all the organization that is connected to the cloud saving the cost and demonstrates one of the advantages of cloud computing.
Internet Censorship: The Great Firewall
11 pages (2750 words) , Download 1 , Essay
This essay discusses that Internet censorship is not entirely flawed because the principle behind it is that the internet should be a safe virtual space for everyone, especially children. Internet censorship is not all-encompassing, so it does not entirely obstruct the freedom of speech.
Service Desk Shift Supervisor's Guide
25 pages (6250 words) , Term Paper
Only on StudentShare
According to Pringle and O’Keefe (2003), “Task-oriented writing makes up the bulk of technical documentation—installation manuals, getting started manuals, and user guides, for example”. The main objective of technical writing is to help the consumer use a product—in this case, a software application.
Globalization and Business Information Technology
10 pages (2500 words) , Download 1 , Assignment
From a small cottage industry to a world renowned multinational, use of IT has greatly influenced the way operations are carried out in an organization which has resulted in greater efficiency and productivity. As per the e-commerce models such as Business to Business, Business to Consumer Business to Employees and Consumer to Consumer.
Network Security
9 pages (2250 words) , Research Paper
Only on StudentShare
This paper discusses some of the potential threats to network security and the ways to mitigate them. The paper also renders useful information about network security policing. Information presented in this paper can be used by companies to improve their network security and make the system efficient.
Intellectual Property
3 pages (750 words) , Download 1 , Essay
This essay discusses that everything in a computer is a collection of bits (the binary code), which are used by the computers to perform different operations. Thus, in the scenario of the computer, everything in a digital format such as music, images, video, and text can be duplicated not immediately once, however, an infinite number of times.
Enterprise System Semantics
7 pages (1750 words) , Essay
Only on StudentShare
Enterprise systems have begun as systems that have a capability to integrate and automate a business process. Due to the development of enterprise systems and its functionalities, all the market analyst, and correspondents join together to give new names for enterprise systems like “enterprise commerce management” or “ERP II”.
Information security legislation
18 pages (4500 words) , Essay
Only on StudentShare
Many financial services companies are realizing the need to expand the range of risk management and governance to incorporate information technology. This realization is increasing in the wake of increasing theft occurrences and other information security violation, and also an increase of legislation intended to control financial markets.
Research Problem Statement: The Utility of Polygraph in National Security
3 pages (750 words) , Essay
Only on StudentShare
There have been several studies on the utility of polygraph in ensuring National Security. It is also relatable here that there has been no consensus on the utility of polygraphs in national security, and the topic has always been one of the most controversial questions in the national security sector.
The major operating system and network you are using on a daily basis
4 pages (1000 words) , Essay
Only on StudentShare
The major operating system most used on a daily basis on our desktop computers is the Microsoft Windows 8.1 operating system (OS), the latest generation of the Microsoft Windows NT OS series. Microsoft Windows NT OS, would be classed as a major transformational OS running desktop computers.
1 - 50 results of 6470 items