StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Broadband Internet Connection Information Technology Essay
7 pages (1991 words) , Download 2 , Essay
Free
While technology changes at a rapid pace, so do Internet connections. Internet users’ need for faster internet connections grow as technology grows. The Internet’s high demand has led to the development of connectivity methods from dial-up methods to more sophisticated connectivity methods that are faster and reliable.
Preview sample
Advantages of Open Source Software Information Technology Assignment
2 pages (631 words) , Download 2 , Assignment
Free
Mostly, the development of open source software is done as a collaborative project, though in some instances it is done by an individual. The distribution terms of open source software must comply with certain terms which include free redistribution, free source code availability, and must allow derived distribution under the same on-source license.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Information Systems Development Philosophies and Methodologies, and System Analysis Information Technology Essay
2 pages (500 words) , Download 4 , Essay
Free
Information will be gathered from the case and the already taken care of, PIECES analysis. There will be a feasibility assessment of the project and a likely methodology that can be used to solve the current problem. The patient registers at the reception desk and the
Preview sample
Fundamental Concepts of Advanced Networking Information Technology Case Study
3 pages (873 words) , Download 2 , Case Study
Free
TCP/IP is the hierarchal protocol, which is made up of interactive modules. Each module presents a special functionality. Layers of the TCP/IP protocol are not interdependent. Hierarchal means that protocol on the upper layer is supported by the protocol of the lower levels. The paper will identify and briefly describe each of TCP/ IP’s five layers.
Preview sample
Neuromorphic Computing Technology Information Technology Research Paper
5 pages (1513 words) , Download 3 , Research Paper
Free
Neuromorphic computing refers to a technology that has been developed by Scientists from the Freje University of Berlin, the Beratsain Center Berlin, and Heidelberg University. This new technology that is still being worked on by the scientists from the three above-named institutions works on the basis of parallel data processing.
Preview sample
Week 2 Discussion Information Technology Assignment
1 pages (250 words) , Download 2 , Assignment
Free
There are different methods and tools to score cyber competitions. My model for scoring cyber competitions would involve awarding points for display of skills and abilities related to projects, completing the tasks
Preview sample
Comparison and Contrast of RFQ and RFP Information Technology Essay
1 pages (439 words) , Download 3 , Essay
Free
Request for quotation focuses on pricing, and not on concepts or ideas on how the contract will execute the project at hand. It tends to award the contract to a supplier or contractor with the lowest bid provided such supplier meets the minimum criteria put in place for the bid.
Preview sample
Forensic Response and Investigation Plan Information Technology Business Plan
11 pages (3072 words) , Download 6 , Business Plan
Free
For the past decade, computer systems have increased in their capacity and speed. With this change, network communication has grown and improved allowing computers to communicate with each other easily from remote locations. This has added opportunities for illegal activities where data can be destroyed or changed maliciously.
Preview sample
Improving Palm Chemist Systems To Cope With The Expansion Needs Information Technology Essay
45 pages (11250 words) , Download 2 , Essay
The firm aims to provide local community and the international market with some of the best and latest affordable pharmaceutical products. Palmcy chemist meets quality management through the creation of a full cycle of development, production and distribution of its products.
Preview sample
Main Types of User Interfaces Information Technology Assignment
5 pages (1350 words) , Download 2 , Assignment
Free
The author states that it is the space where the interactions of/between machines and humans occur, with their goal being to allow effective operation as well as control of the machine from the user end. The machine feeds the back information simultaneously to aid operators in the process of making decisions.
Preview sample
Using Digital Media for Civic Engagement Information Technology Book Report/Review
2 pages (500 words) , Download 4 , Book Report/Review
Free
The author states that civic education among the youth is greatly enhanced through digital media. The internet is an important media where young people converge and discuss important issues. Therefore, using the internet platform for youth civic engagement is critical in involving the youth in civic matters.
Preview sample
RACI Chart Analysis Information Technology Coursework
5 pages (1445 words) , Download 3 , Coursework
Free
For instance, there is this new company seeking my consultation services. The company needs technology to help it set up a unit selling tractor parts. They have found my expertise in networks invaluable. They have as a result hired me to develop their office network. My team consists of an infrastructure architect, an installation expert, and me.
Preview sample
Educational Resources Evaluation Information Technology Research Paper
6 pages (3029 words) , Download 2 , Research Paper
Free
The learning activities of mainstream students greatly differ from the SEN students in terms of the depth of each subject the students are taught and the kind of teaching techniques used to promote the students’ learning. The use of information and communication technology (ICT) is considered by many educational institutions as an important teaching tool.
Preview sample
Terror on Facebook Twitter and YouTube Information Technology Case Study
1 pages (550 words) , Download 0 , Case Study
Free
To classify a website and rate it in relation to other sites, its usability, content, functionality, quality of design, speed, reliability, and confidentiality of user information are factors that are evaluated. This paper classifies Facebook, Google and YouTube websites which are very popular within the modern online communities.
Preview sample
Types of Computer Networks Information Technology Essay
1 pages (328 words) , Download 3 , Essay
Free
The advantage of a computer network is that a user does not necessarily have to rely on a single workstation to access his files and documents. Instead, he can log into any computer in a network, from where it is possible to access the server, which is a centrally located computer that provides storage for all information in a network.
Preview sample
Organizational Model of Positions, Functions, and Roles - Light Walkers Ltd Information Technology Research Paper
2 pages (778 words) , Download 2 , Research Paper
Free
Functions of Vice President Marketing: Device strategy, tactics and programs for creating interest, demand and recognition for the company’s products. Planned, organize, staffed, trained, and manage all marketing functions to achieve the company objective of sales, growth, profits, and visibility while marketing a message and position consistent with the corporate direction.
Preview sample
Organizational IT Related Privacy Policy Information Technology Essay
3 pages (750 words) , Download 2 , Essay
The author states that worker email monitors and employee surveillance in working environment present in most cases conflicting ethical issues. Tangible business reasoning stipulates that it is legally and ethically practical for an employer to develop a written workplace policy that comprises monitoring use of computer.
Preview sample
Computer and Network Hardware Information Technology Assignment
3 pages (750 words) , Download 3 , Assignment
HHF-CTO, for installation of Local Area Network (LAN) in your organization, dated 1st July 2012. It is to inform you that we have finalized a proposal for installation of LAN in your organization with low costs that would fulfill your requirements and the core
Preview sample
Genetic Fingerprinting Information Technology Essay
2 pages (550 words) , Download 2 , Essay
Free
Thanks to the discovery and identification of the Human DNA Chain, it is now possible to use genetic fingerprinting in the further advancement of various fields of research that include, but are not limited to scientific and legal fields. Although there are sectors of society that feel uncomfortable with the idea of genetic fingerprinting among babies.
Preview sample
Secure Software Development Information Technology Annotated Bibliography
9 pages (2494 words) , Download 3 , Annotated Bibliography
Free
Enhancing application security should be very important for a vendor to sell our software. It is really important for a number of users for the pure cost of implementing security based updates formulates it worth obtaining privacy, security as well as reliability right untimely in the procedure rather than placing the burden on our clients to implement updates.
Preview sample
Computer sciences and technology Information Technology Essay
2 pages (500 words) , Download 3 , Essay
Free
The connection they made that day will be the very foundation of the most revolutionary invention mankind had ever seen; the internet. Although they have predicted that their accomplishment will soon be a household necessity, its far more extensive scope in the future
Preview sample
Developing the Forensics, Continuity, Incident Management Information Technology Case Study
6 pages (1622 words) , Download 5 , Case Study
Free
Security policies provide a framework for the procedures and steps that should be taken to protect business assets and information from destruction via the physical intervention or use of technology. The core role of such policies is to protect business assets, data confidentiality, and integrity (Sumeet Dua, 2012).
Preview sample
Database Design- Dependency Diagram Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
These dependency diagrams are used to assist in the normalization of data in a given database. They are used to show the high level of dependence between modules in a database structure. It might
Preview sample
35 Years for Wikileaks Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
mpson and Roshan in Reuters (Aug 21, 2013), Bradley Manning, a 25 year old intelligent analyst was sentenced to lifelong imprisonment for not less than 35 years. The reports disclose that the Wikileaks gained valuable and secret information about battle field, military
Preview sample
New Technology Development in the Primary Sector Information Technology Assignment
4 pages (1102 words) , Download 3 , Assignment
Free
The primary sector involves the extraction or harvest of products from the earth. It includes the production of basic foods as well as raw materials. Another way to describe it would be to say that it is involved in the growing, harvesting, extraction, and sometimes processing of raw materials which form the basis of the products we need in our everyday lives.
Preview sample
Socket Programming - BSD UNIX by Bill Joy Information Technology Case Study
7 pages (1973 words) , Download 2 , Case Study
Free
Sockets are mainly bidirectional in that either side can send or receive data. They are usually independent of the programming languages that implement them in that a socket program in Java language can interact with a program written in C++ or C language. Stream, Datagram and Raw socket provide a viable interface in the development of socket programming.
Preview sample
Modernizing Components of the Traditional or Manual Chain of Business Processes Information Technology Assignment
9 pages (2473 words) , Download 4 , Assignment
Free
The availability of information from the MIS, allows managers to make appropriate decisions in planning for the organization's future. All organizations need to make plans for expansion in order to survive and grow. Information is vital in the planning processes. As mentioned earlier, any decision-making process requires accurate and timely information. MIS improves quality control and supervision.
Preview sample
History of the development of the Apple Newton Information Technology Case Study
2 pages (500 words) , Download 7 , Case Study
Free
The name Newton was chosen because of its close resemblance to the company’s trademark. As an innovative company, Apple Inc was interested in producing a gadget that would revolutionalize the telecommunication sector. For a long time, people had been using desktop
Preview sample
Collaborative work in IDE development Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
One of the best elements of Agile is the fact that one can prototype. Prototyping allows Agile engineers to draft an idea in a constructive manner. Programmers are big on prototyping and developing this on
Preview sample
Network Operations Information Technology Coursework
2 pages (500 words) , Download 3 , Coursework
Free
LAN uses a peer to peer network topology while WAN, on the other hand, uses a Client to Server model of the topology. LAN uses Ethernet standard while WAN uses T1. LAN uses layer two devices switches and bridges and Layer 1 devices like hubs and repeaters. WAN mostly uses
Preview sample
Research proposal is feasible to delivering package with drone in the nearest future Information Technology Research Proposal
2 pages (500 words) , Download 3 , Research Proposal
Free
I propose a study that looks into the consequences and the possibility of adopting this technology in the delivery of parcels. Unmanned aerial vehicles were introduced in the early twentieth century and commonly used in the Second World War. The main
Preview sample
Implementing a Student Management System Information Technology Essay
2 pages (747 words) , Download 3 , Essay
Free
The school corporation bought and installed the DEC PDP 11/34 computer that was useful in the development of student management computer applications over the period. The school appointed a data processing task force to replace the existing built-in systems with purchased systems but this led to disappointment due to the wrong decision.
Preview sample
Professional Profile of the Program Analyst and System Engineer Information Technology Essay
4 pages (1000 words) , Download 3 , Essay
Free
He's also seeking an IT Management, Project Management, Program Analyst, or Contract Specialist position in an operational environment that will effectively utilize acquired technical skills and abilities while demonstrating extensive education in Software Engineering and Project Management.
Preview sample
Physical Security Related to Computer Systems Information Technology Term Paper
8 pages (2000 words) , Download 4 , Term Paper
Free
Proper monitoring of the physical security measures is very necessary to make the security perfect. Even if the door has been locked, persons who have to use the server will keep on coming in and out. The door might remain open for sometime when an authorized person enters or leaves and this is when the intruder or enemy gets the opportunity.
Preview sample
Internet Interest Levels Information Technology Term Paper
10 pages (2677 words) , Download 2 , Term Paper
Free
The elderly population is expected to increase dramatically. By the year 2050, the population is forecast to more than double, with those 85 years and older to increase in population more than five times its current count of 4 million at the moment. Although 56% of U.S. residents report using the Internet, a study conducted by the Pew Internet.
Preview sample
The Security Risks Associated with Online Access to Databases Information Technology Essay
2 pages (500 words) , Download 2 , Essay
Free
The author states that database administrators and application developers usually don’t know much about security while security personnel usually don’t know much about the needs of database users. This leads to only minimal security if any, despite regulations requiring organizations to secure their data.
Preview sample
Performance Measures Information Technology Assignment
2 pages (500 words) , Download 3 , Assignment
Free
Measurement of performance is critical to the successful implementation of security recommendations provided in Verizon 2010 Report. The
Preview sample
Computer-Mediated Communication Trends Information Technology Essay
2 pages (524 words) , Download 4 , Essay
Free
CMC, in as much as it applies to correspondence through computer-linked formats, has its main focus on the social aftermaths of these communication media. Among the major CMCs are Instant Messages. IM, as it is usually referred, is a real-time communication technology that incorporates texts between two or more individuals over the internet. 
Preview sample
Networking Explained Information Technology Essay
1 pages (373 words) , Download 2 , Essay
Free
The rate increased to 100 Mbps and today Gigabit Ethernet technology extends maximum performance up to 1000 Mbps. Higher-level network protocols IP use Ethernet as a transmission medium. The run length of personal Ethernet cables is limited to 100 meters; however, Ethernet networks can be extended easily using network bridge devices
Preview sample
Health and Criminal Justice Professionals Information Technology Coursework
3 pages (860 words) , Download 5 , Coursework
Free
But going through further to their findings, it became clearer that internet addiction does seem to be a mental disorder. As to the question of policymakers going for treatment, and considering internet addiction as a disorder, rather than imprisonment of hacking cases, I think it would be a better solution.
Preview sample
Green Computing for Sustainable Development Information Technology Case Study
2 pages (711 words) , Download 17 , Case Study
Free
Commonly, the environment is brought under much pressure from the activities of technology-related activities. As far as technology is concerned, the hardware and software effects may be discussed. As far as hardware is concerned, the impact of computer parts such as servers, monitors, printers, papers, and system units will be reduced on the environment through effective and efficient disposal.
Preview sample
Cyberethics Issues Information Technology Essay
9 pages (2467 words) , Download 2 , Essay
Free
The safer legal and disciplined use of the internet is the basic understanding of Cyber-Ethics (Cyberethics, 2011). Ethics have some standard rules and principles that are followed by humans. The same standards are followed in cyber activities. How one can behave on the internet comes under cyber ethics. It involves legal concerns as well.
Preview sample
Personal statement Information Technology Admission/Application Essay
2 pages (500 words) , Download 6 , Admission/Application Essay
Free
I am interested in pursuing a master’s degree in information management within Syracuse University in the commencing academic year. I feel as an
Preview sample
Economic analysis of the new system Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
The new system operation costs will include services such as correct usage of power, maintenance of firm physical facilities,
Preview sample
Cain and Abel Product Review Information Technology Research Paper
1 pages (322 words) , Download 2 , Research Paper
Free
To poison the client the user must click the APR tab to open the poison routing page. Now the blue icon is inactive. Clicking on it or anywhere on the tab activates it. When it is active new ARP poison Routing dialog is opened. The user should then select the AP’s address. This makes Cain know the IP address required.
Preview sample
I need a conclusion statement (ppragraph) for Google Glass Information Technology Research Paper
2 pages (500 words) , Download 2 , Research Paper
Free
The Glass is convenient since it does not involve use of hands; images are displayed on a transparent screen in front of the eyes. Google Glass is also mounted with a microphone and a
Preview sample
Is DES cipher not security anymore Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
arried out by Electronic Frontier Foundation (EFF) in 1998 revealed that given a finite time, DES can easily be cracked by a modestly financed adversary. This is further compounded by the fact that while it may have cost EFF $250,000 to successfully crack DES in 1998, it can now
Preview sample
Characteristics of Networks Types Information Technology Assignment
3 pages (971 words) , Download 2 , Assignment
Free
A personal area network (PAN) always operates within individual closed range say10 meters and it is an interconnection of information technology. It is always organized around an individual person and as such may tend to be reliable. An individual can use these networks to transfer heavy files such as email and calendar appointments, music, and digital photos.
Preview sample
Outsourcing and Offshoring - WW Distribution Company Information Technology Case Study
9 pages (2370 words) , Download 2 , Case Study
Free
All through the development stage, until the end, various kinds of tests are performed for the software under various test conditions. This ensures that the system being developed is reliable and performing as expected. After the development, implementation takes place. Maintenance may be essential after the implementation, but may not be a problem since WW has an IT department.
Preview sample
Use of the Border Gateway Protocol Information Technology Essay
2 pages (610 words) , Download 2 , Essay
Free
A lot of the routers contained in the service provider's main networks partake in exchanging of information around several IP prefixes. BGP is a procedure for exchanging routing information amid gateway hosts (Beijnum, 2002). The hosts should have their peculiar router in a network of automatic functioning systems.
Preview sample
7251 - 7300 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us