StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Real-Time Systems Design, Robustness Challanges Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
This type of design is applicable in areas where there is need for control or execution of certain complex processes in a real time environment. However, designers of these systems do face a lot of challenges in their process of ensuring they make these systems as robust as possible.
Preview sample
Delivery of Effective E-Government Systems: The Case of Oman Information Technology Research Proposal
15 pages (4089 words) , Download 2 , Research Proposal
Free
According to Sideridis and Patrikakis (2010), democracy has proven to be an exceptionally adaptive form of government through the ages. Democracy refers to a government of the people, by the people and for the people for dealing with problems and concerns that arise when individuals live in an organised society.Paivarinta & Saebo (2008) suggests that a democratic government depends on effective and participatory decision-making about public issues with an emphasis on participation by all citizens. 
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Virtual Memory Paging and Segmentation Information Technology Article
9 pages (2638 words) , Download 2 , Article
Free
Virtual memory (“virtual” means something that is not real) (Joseph, 2007) is an attribute of computer systems in which permanent data storages are utilized in various procedures, thus allowing RAM, or main memory, i.e. “active” or “fast” memory, to be free for other software (Virtual Memory, 2007). If the additional RAM is inserted, the computer system is then able to handle large files and operate with the help of “headroom” memory. 
Preview sample
Online Booking System for Parking Information Technology Research Proposal
10 pages (2799 words) , Download 5 , Research Proposal
Free
An online booking system for parking will make it easy for people to know the exact location of available parking spaces and book them in advance before driving there. This will save people time wasted in the search for available parking spaces and also help in mitigating the issue of unnecessary traffic jams.
Preview sample
Overview and Discussion of the Current Trends in Web Development Information Technology Coursework
18 pages (4760 words) , Download 2 , Coursework
Free
The study obtained that there are a number of open sources of web development tools that have emerged in recent times and are expected to have significant positive effects in the coming years. With products like the HTML5, CSS3, and others, the web development tools are bringing to their user's new means of usage such that they can achieve their needs and works based on these tools.
Preview sample
Public-key cryptography and information security Information Technology Essay
2 pages (500 words) , Download 5 , Essay
Free
In this scenario, the public key part is used for encryption entirely at the receiver side, whose private key part is applied for decryption. However, in order to make this communication safe it is necessary to make sure that only the intended receiver is able to access the private part of the key.
Preview sample
Electron Microscopy Information Technology Coursework
4 pages (750 words) , Download 3 , Coursework
Free
This essay analyzes that spherical aberration also occurs in the Electron Microscopes when electrons passing through the side of the lens are refracted greater than those passing along the axis.2 (Lam, 2009); while Diffractive aberrations are brought about by the deviations from geometrical optics caused by the wave nature of light.
Preview sample
Content Management Systems Information Technology Essay
4 pages (1245 words) , Download 2 , Essay
Free
The content management system is a procedural system that determines how work flows in any given work environment. With reference to the web environment, the content management system may be limited to the creation, control, storage and deployment of individual contents on a given web page. The content management system is differentiated from static pages in a number of ways.
Preview sample
VoIP Security Problem and Solution Information Technology Essay
5 pages (1250 words) , Download 3 , Essay
Free
The author states that the major benefit of this technology is that it reduces the expenditures that go together with a traditional phone line, at least at this point in the game. In other words, this is a new communication technology structure that offers the savings of hundreds, or yet thousands of dollars for a number of people.
Preview sample
Implementation of Enterprise Architecture Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Information architecture in most cases is executed under the business architecture (Bernus, Nemes & Schmidt, 2003). Enterprise Business Architecture Enterprise business architecture involves a portrayal of the processes, entities and functions on a business scale.
Preview sample
User Interfaces for Environmental Decision Support Systems Information Technology Article
3 pages (750 words) , Download 3 , Article
The author states that Numerous Environmental Decision Systems (EDSS) are present to help consumers compare options. Nevertheless, these schemes rarely try to foster the consumer’s knowledge. The right clustering procedure of customers in terms of their manufactured goods quality favorites would permit the building of personalized user interfaces.
Preview sample
The Technological Infrastructure of the Charles Schwab and Zara Information Technology Case Study
8 pages (2021 words) , Download 2 , Case Study
Free
The very structure of Charles Schwab’s backend infrastructure design greatly contributes to the effectiveness of their system. The architecture of their information technology systems is such that all front-end designs should consistently access back-end systems; the operative word in these regards being consistent.
Preview sample
Operating Systems That Are Common on the Internet Information Technology Research Paper
4 pages (1060 words) , Download 2 , Research Paper
Free
A web operating system can be defined as a user interface that provides users with access to applications that may either be partly or completely stored on the Web. “It might mimic the user interface of a traditional computer operating system like Windows, but it doesn't interact directly with the computer's hardware” (Strickland, 2012).
Preview sample
Paul Smith Logo: Conventional Principle of Fashion Information Technology Essay
4 pages (1160 words) , Download 2 , Essay
Free
The Paul Smith logo is a trademark of a fashion company that was named after the owner Sir Paul Smith. The company is among the British fashion designers. Paul Smith adopted the small design to identify his fashion and company products (Smith & Busch 2001). The logo portends an outward simplicity on an ordinary viewing but complexity on analysis.
Preview sample
Physical Tamper-Resistant Devices Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Physical Tamper-Resistant Devices. One of the basic goals behind the development of a secure and safe computer or information system is to make sure that a number of cryptographic keys can only be accessed and utilized by their intended users and simply for their proposed tasks.
Preview sample
Social Networking Sites and the Legal Framework in the UK Information Technology Literature review
8 pages (2134 words) , Download 2 , Literature review
Free
The protection offered to the innocent users of social networking sites is not satisfactory. Although laws have been established to ensure the safety of children who use social networking sites, and they have also been modified from time to time to keep pace with the changing needs of the time, yet the laws are not complied with and there is ineffective supervision of their implementation.
Preview sample
Smart City and Its Enablement Information Technology Research Paper
5 pages (1417 words) , Download 5 , Research Paper
Free
The urban sensor technologies, electronic identification, and digital media have resulted in being rampant, but the sheer scope of information that an urban metropolitan provides for study becomes hard to be incorporated into the rational concerns that the current computing power is being asked to provide solutions to.
Preview sample
The Virtual Memory Manager Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
The virtual memory is the storage being which holds the files on the hard drive and can be retrieved when the computer run out of memory. The virtual memory and physical memory are the two types of the computer memory which are used in the storage of data in the computer systems (Hosford-Dunn, 2000).
Preview sample
Information Management and Design - Critical Thinking Mod 4 Information Technology Essay
3 pages (750 words) , Download 2 , Essay
The CD shop should be in a position to factor in the following considerations so as to help in managing the outflow and inflow of the products and the information from one point to the other so as to increase the profitability of the shop. The system designed should be able to have a collective forecast movement in predicting the kind of revenues and the real time profit that the shop achieves.
Preview sample
Software Development Methodologies Information Technology Assignment
2 pages (756 words) , Download 4 , Assignment
Free
Traditionally, there were numerous software development models, including the waterfall, spiral, and incremental models among many others. Whereas these models were widely accepted, several deficiencies have been realized in their effectiveness over time; the methodologies assume that project requirements can all be identified at the beginning of the project.
Preview sample
Alpha Omega Industries Information Technology Case Study
6 pages (1719 words) , Download 3 , Case Study
Free
Most notable would be introducing vital components such as new application servers, database servers, file servers, and data warehouses for data backup. This will see the need for other subsidiary components such as routers, network interface cards, and custom-made software that will facilitate the smooth operation of the overall network.
Preview sample
Social Media Usage in the Workplace Information Technology Research Paper
5 pages (1250 words) , Download 3 , Research Paper
Free
Many people today use social media to connect to friends and families from different parts of the world (Abate et al. 2011, p. 6). In fact, the introduction of social media has made communication easier than ever before. It is certain that social media is impacting on almost every aspect of human life today; workplace, not an exception.
Preview sample
Resolution to the Security Vulnerabilities Facing Voice Over Internet Protocol Users Information Technology Dissertation
39 pages (10203 words) , Download 2 , Dissertation
This paper evaluates and explains VoIP in detail in order to understand its functions, advantages, disadvantages, VoIP protocols and, best protocols for VoIP application. The research reveals Session Initiation Protocol or SIP as the best protocol given that it is easier to secure and sustain the quality of VoIP service. Although VoIP has been commendable in replacing PSTN, its application is not without drawbacks.
Preview sample
Modern Cryptographc Protocol in Fixed and Mobile Communication Information Technology Research Paper
7 pages (2080 words) , Download 3 , Research Paper
Free
Therefore, safety frames an important part for validation as well as determining the effectiveness of information. By taking into concern the aforesaid subject matter, this study further entails the description about the procedures or protocols that are being used and implemented in fixed as well as mobile communications for fostering effective communication.
Preview sample
Computer Hacker Information Technology Research Paper
6 pages (1500 words) , Download 2 , Research Paper
Free
According to the paper despite the fact that technology is of great benefit to humans today, the same technology exposes the human race to considerable danger, especially if used in the wrong manner, and with the wrong motives. Nonetheless, with regard to computer technology, this will benefit and serve people in the most appropriate manner, if it is used with the right motives.
Preview sample
Software Implementing Database Security Information Technology Essay
4 pages (1096 words) , Download 3 , Essay
Free
Big and medium businesses are susceptible to security breaches from outside which might compromise their competitive advantage. For security breaches within data transfer, different encryption techniques are employed for safe data travel but the data connecting to database servers must be subjected to policies and mechanisms to protect it from vulnerabilities.
Preview sample
Project Paper: How to Use Linux Operating Systems as a Network Security Device or Component Information Technology Essay
11 pages (2750 words) , Download 2 , Essay
Free
This paper intends to identify the ways in which Linux operating system can be used as a network security device or component. The history of internet is short but its growth has been explosive. The size of internet users has grown to millions and every year the figure is increasing at a rapid pace.
Preview sample
Using Wireshark To Solve Real-World Network Problems Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
Time synchronization is necessary because data packets are traveled from one-time zone to another. In order to address this challenge, a methodology named as packet marking will be implemented. Likewise, this methodology will integrate fractional information with data for conducting a successful traceback.
Preview sample
Computer Hardware and Operation Information Technology Essay
7 pages (2037 words) , Download 2 , Essay
Free
The monitor is determined as an electronic visual display.  For the standard user configuration, the monitor should be CRT based monitor and the size of the monitor should be 19 inches.  Similarly, the size of the monitor of the power user should be 19 inches as well but it should be an LCD monitor.
Preview sample
Network Infrastructure Planning Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Permission software are the most helpful infrastructure to help the fashion-ware company control the operations of the satellite branches at different times of the 24 hours in a day and still share the same resources at the central server at the head office.
Preview sample
Strategic Information System Information Technology Essay
8 pages (2276 words) , Download 4 , Essay
Free
When it comes to developing an information system the correct approach must be selected after a careful analysis. These approaches tend to significantly aid in the development of the information system. These approaches can be used as a framework or as a guideline that provides steps that eventually lead to the final product.
Preview sample
Implementing a New CRM System Information Technology Admission/Application Essay
4 pages (1201 words) , Download 4 , Admission/Application Essay
Free
Good customer relationship is key to the success of any business organization. Therefore, different business organizations employ various strategists to learn and understand their customers’ needs and behaviors, with the goal to develop stronger relationships with customers. One such strategy is Customer Relationship Management (CRM).
Preview sample
Systems maintainence Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
For efficient functioning of any system, reliability is the main concern. Reliability is considered as an attribute of any given computer-related component; hardware or software, or a network that steadily performs in accordance to its specifications. Reliability has for a long time been regarded as a significant aspect of design and maintenance (Huo, Zhang, Wang, & Yan, 2005).
Preview sample
Multimedia Website Report Information Technology Case Study
9 pages (2554 words) , Download 3 , Case Study
Free
This website is set to provide the best and reliable collection point of all video, audio, pictorial and written programmes that may meet the requirements of our customers and are also within the specifications of all country’s laws and regulation mandates. This means therefore that forbidden information, though may be a requirement of any of our clients, will not be available.
Preview sample
School of Computing Information Technology Report
12 pages (3097 words) , Download 3 , Report
Free
EEC has to address many challenges in order to secure the information residing on the network assets i.e. workstations and servers. For mitigating these issues, certified and skilled staff employment is required, as they will contribute significantly to safeguarding and identifying potential threats and vulnerabilities that may lead to a backdoor for cybercriminals.
Preview sample
How Can Websites Design Be Improved by the Study of Ergonomics Information Technology Research Paper
28 pages (8242 words) , Download 3 , Research Paper
With reference to website designing, this research may provide critical insight to the website developers to understand the ergonomics design requirements of the users. For e-commerce websites, ease of navigation is of prime importance and would require access to the product, price, and related information.
Preview sample
How to Fail with the Rational Unified Process: Seven Steps to Pain and Suffering Information Technology Essay
3 pages (500 words) , Download 2 , Essay
The Rational Unified Process (RUP), and subsequently the iterative methodology, has become one of the leading software development processes. In doing so it is seeking to replace the outdated, unrealistic, methodologies outlined by the Waterfall approach.
Preview sample
TM Forum Framework Overview Information Technology Literature review
5 pages (1422 words) , Download 2 , Literature review
Free
The TM Forum stands for TeleManagement Forum. It is a well thought integrated business architecture for Service Oriented Enterpises. The framework is designed for the standardized implementation and automation of business processes and operational management.
Preview sample
Riding on the Waves of Online Retall Business Information Technology Literature review
6 pages (1653 words) , Download 2 , Literature review
Free
In terms of social networking, several sites have thrived in connecting people and enriching their social lives, albeit in cyberspace. Sites like the now defunct Friendster, the very popular Facebook, the controversy-eliciting Twitter are just a few examples of social networking sites that attract people to log in and meet people whether from their past, or new ones for their present and future.
Preview sample
Upgrading Windows XP Information Technology Term Paper
5 pages (1250 words) , Download 3 , Term Paper
Free
Upgrading Windows XP The upgrading process can face many problems and failures. In order to avoid those problems, you need to make sure that your PC is ready to get upgraded by finding issues that may prevent the upgrading process from becoming unsuccessful.
Preview sample
Technology: A Blessing Information Technology Term Paper
10 pages (2774 words) , Download 3 , Term Paper
Free
Aside from the convenience and easy access, the power of computers and internet have opened up access to invincible quantity of information as never before. This has contributed a lot to advancement in medical field, educational field, business world and social life.
Preview sample
Benefits of Dynamic Host Configuration Protocol Information Technology Essay
6 pages (1654 words) , Download 2 , Essay
Free
Traditionally, all the TCP/IP parameters were configured manually which is commonly referred to as static configuration. Every machine required an IP address, subnet mask and a default gateway be inputted manually. If one of the values was wrongly entered, it disrupted the communication and it was hard to quickly establish the cause.
Preview sample
IT Security Threats and Countermeasures Information Technology Literature review
8 pages (2244 words) , Download 2 , Literature review
Free
The invention of the internet has made the whole world come closer to the same platform. The emergence of e-learning has replaced the conventional forms of educational practices with online modes of acquisition of education and collaboration. The field of business has benefitted from the introduction of e-commerce and information management systems.
Preview sample
Data Communications Bluetooth Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
Premium+
Historically, “The word "Bluetooth" is taken from the 10th century Danish King Harald Bluetooth.”
Preview sample
How E-Commerce Has Changed the Way to Do Business Information Technology Research Paper
5 pages (1318 words) , Download 2 , Research Paper
Free
Mechanical failures arise in E-Commerce. These failures can lead to unpredictable effects on the total processes. Moreover, there is also a restricted opportunity for the customer to interact directly with the company offering goods and services (Reynolds, 2009). This originates from factors associated with the location. 
Preview sample
Vocabulary and Practice of Organizational Finance Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
Since all business must understand, how they are performing after a particular time, maintaining financial statements is necessary since they avail basic information that helps in analyzing and understanding how the prospective business is performing. Financial statements are reports that a business designs in order to summarize certain financial activities over a given period, which could be a month, year, or five years (Seifert, 2011).
Preview sample
Biometrics as an Important Part of Information Technology Information Technology Essay
6 pages (1500 words) , Download 3 , Essay
Free
The present study focuses on an understanding of the use of biometrics and the commercial factors associated with it along with the current trends in its growth and use. In the present times, the use of information technology has increased to a great extent that calls for the need of privacy and security of all data and information.
Preview sample
Mechanism of Locating the Client's DaTa in the Clouds Information Technology Research Paper
4 pages (1441 words) , Download 5 , Research Paper
Free
A string matching algorithm is an effective data identifier mechanism that can be used to allow Clients to locate data within the cloud. This is primarily because data stored in the cloud is usually encrypted to enhance security and privacy and the clients are therefore unable to locate data within the cloud using traditional keyword searches. 
Preview sample
Establishment of Firewall and Related Findings Information Technology Assignment
2 pages (500 words) , Download 3 , Assignment
Free
After turning on my personal computer (PC), I clicked on the Start button located at the lower left corner of the desktop screen. Next, I clicked on the Control Panel located in the right pane of the Start menu. Step 1: Screenshot 1 In the Control Panel, I clicked the System and Security option.
Preview sample
Quality of Service in Service Oriented Architecture Applications Information Technology Research Proposal
7 pages (2292 words) , Download 2 , Research Proposal
Free
Currently there are multiple ways of defining both reliability and performance for QoS in SoAs. This paper will look into reliability and performance models for SOA developed for multi-tier inventory control system using simulations of the mathematical models.
Preview sample
8551 - 8600 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us