StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Importance of Information Security Policy Information Technology Coursework
9 pages (2399 words) , Download 0 , Coursework
Free
Information security policy is a compilation of guidelines, procedures and processes, which ensure the safety of information in a business or an organization. It aims at helping an organization safeguard its intellectual property from unauthorized access, inspection modification, perusal, use, disclosure, disruption, recording or destruction.
Preview sample
Introduction to Fiber Optic Technology Information Technology Coursework
11 pages (2895 words) , Download 0 , Coursework
Free
Fiber optic technology is mostly used for local area networks. This is expensive in installation but maximizes the results for data transmission as compared with traditional metal cables. Many telephone companies around the world are planning to replace the network with fiber cables for better transmission. The long life with a high data rate and light in weight are the capabilities of fiber optic technology.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
An Insight Into Leading Smartphone Platforms and Their Market Share Information Technology Coursework
12 pages (3169 words) , Download 0 , Coursework
Free
Modern technology has produced such a deep influence on society that the majority of folks avoid leaving home without their mobile phone, and their laptop has turned out to be their best pal. The most life-changing fragments of the tech field for many continues to be the smartphone — a multi-function gadget that brings together the features of a mobile phone and a personal computer.
Preview sample
Copyright Systech Information Technology Ltd Information Technology Assignment
14 pages (3719 words) , Download 0 , Assignment
Free
In an age when most of our personal information has become public or lies behind an encryption program that maybe its only line of defense in addition to a group of firewalls, it has become all the more necessary for any company worth its name to make foolproof and secure measures to ensure that sensitive corporate, business or personal information always remains protected. 
Preview sample
The Service Oriented Architecture and Its Concepts Information Technology Assignment
8 pages (2246 words) , Download 0 , Assignment
Free
Service-Oriented Architecture (SOA) is independent of vendors and technology. These are designs and design patterns, which are used as services. It is a piece of software that is working as an application in terms of functionality. The retrieval of an online bank statement, the submission of an online form for opening a novel account, booking of an airline and the reservation of tickets, etc.
Preview sample
Financial Institution Auditing Techniques and Compliance Laws Information Technology Coursework
10 pages (2679 words) , Download 0 , Coursework
Free
Auditing companies are complying with the laws and the changing technology in the financial institutions such as online banking by application of Computer Assisted Audit Techniques (CAATs) like Audit Command Language (ACL), Interactive Data Extraction and Analysis (IDEA) and excel spreadsheets. Financial institutions are required to comply with the following laws.
Preview sample
The Operation of Java Applications in the Context of Operating Systems Information Technology Term Paper
6 pages (1889 words) , Download 0 , Term Paper
Free
An operating system (OS) is a compilation of software that manages computer hardware and services for computer programs. Application programs frequently necessitate an operating system in order to run. The paper discusses the various features and the capabilities of java that rely on and supporting the system operations.
Preview sample
The Primary Objectives of Information Security Information Technology Coursework
6 pages (1704 words) , Download 0 , Coursework
Free
Information security is becoming one of the most important concerns in almost every profession and every field of life. Information security is a business issue, not just a technology issue. Sensitive information about the consumers and employees, finances, inventories, payments, research work, is being maintained by governments, organizations and companies.
Preview sample
Security Issues of Bitcoin Information Technology Essay
5 pages (1371 words) , Download 1 , Essay
Free
Every Bitcoin contains an address with an encrypted key. This is done in order to secure payments for Bitcoin owners. Despite the implementation of several security measures, the risk of theft is high. Modern hackers can commit cybercrime by using malware. For example, Bitcoins are more like e-cash.
Preview sample
The Idea of Sandboxing and Its Techniques Information Technology Coursework
14 pages (3700 words) , Download 0 , Coursework
Free
The idea of sandboxing can relate to a child’s sandbox that is made to protect the sand from the outer environment and must be kept in a particular place. The idea of sandboxing in the world of information technology is that a virtual area is dedicated for the non-trust worthy applications that can risk other data present in the system can run smoothly in the system without creating a mess to other applications.
Preview sample
Frequency Domain Analysis of Control Systems and Time Domain Analysis Information Technology Term Paper
5 pages (1617 words) , Download 0 , Term Paper
Free
Signal processing has the primary goal of providing the underlying information on the specific problems for the purposes of decision making. In control systems, control theory is normally used both in the analysis and design of feedback systems. Such systems include those that regulate temperature, fluid flow, force, motion, pressure, voltage, tension and current.
Preview sample
Cloud Computing Information Technology Case Study
5 pages (1528 words) , Download 1 , Case Study
Free
The problem that the majority of companies faced with the traditional IT infrastructure consists of several problems. One of the critical problems is the fact that it takes high energy costs. In addition, the traditional mainframe networks take too much space. Furthermore, the heat that is generated through these servers must be cooled.
Preview sample
Software and Maintenance Change Control Plan Information Technology Case Study
4 pages (1385 words) , Download 1 , Case Study
Free
The main purpose of this report is to prepare and indicate the plan for software maintenance and change control for McBride Financial. To remain in the capacity of the software implementation for McBride Ltd., a plan for software maintenance is really obligatory. The software agenda only does not depreciate.
Preview sample
Risks of Using the Internet Information Technology Coursework
5 pages (1560 words) , Download 0 , Coursework
Free
Internet users must be vigilant enough to keep their computer’s anti-virus software updated with the latest improvements. It is probably wisest if internet discussion forums are restricted to adults, in the inevitable case that cyberbullying, trolling or other malicious predatory behavior takes place.
Preview sample
Mac OS versus Windows OS Information Technology Literature review
7 pages (1989 words) , Download 0 , Literature review
Free
MAC OS X Snow Leopard and Windows 7 differ in their basic approach to handling applications and documents. Mac vs. Windows (2010) described the two systems and considered the first one to be an application-centric operating system while the latter is a more document-centric operating system.
Preview sample
Website Critique: WebMD Information Technology Case Study
5 pages (1557 words) , Download 1 , Case Study
Free
Another factor that is involved in evaluating a health website is the correctness of the information that is provided by the website (Boklaschuk & Caisse, 2001). The website, WebMD, provides the readers with links that include a biography of the writers of the different articles it publishes online. The qualification and experience are clearly stated in those links.
Preview sample
IT's Role in Banking Information Technology Essay
5 pages (1442 words) , Download 1 , Essay
Free
Information systems were introduced in order to enhance efficiency in the activities and processes of businesses and therefore assist in attaining profits and other cost benefits. Doom points out that “information technology was mainly used internally, and not for communication with suppliers and customers” (33).  
Preview sample
The Use of Virtual Technology Information Technology Term Paper
5 pages (1327 words) , Download 0 , Term Paper
Free
The use of virtual technology has improved various aspects of user performances in terms of spatial understanding, training, memorization, and perception. The Duke immersion virtual environment enables the users to experience three dimentional computer graphics applications from the first-person perspective through the use of the six senses.
Preview sample
Crisis Response Elaborately in a Case of Facebook Cyber-Hacking Information Technology Case Study
5 pages (1550 words) , Download 0 , Case Study
Free
People, therefore, participate in discussion groups, team building, marketing, educating, disclosure of personal information, gossip, contact, stalking, and identity theft, among others. Student life without Facebook is almost inconceivable. Since its foundation in 2004, this popular social network service has quickly become a basic tool.
Preview sample
Cleanroom Software Engineering Implementation Information Technology Business Plan
8 pages (2251 words) , Download 0 , Business Plan
Free
The cleanroom software engineering procedure is the process that is geared towards is the construction of software with no faults during development (Mills 19). Testers can concentrate their efforts on assessing the dependability of code rather than taking time on discovering and debugging code on approximately an infinite figure of possible defects.
Preview sample
Prevention of Epidemics in Third World Countries Using Data Mining Information Technology Coursework
8 pages (2293 words) , Download 1 , Coursework
Free
In data mining, data is collected and looked at it through various dimensions. It is carefully analyzed, summarized and the relationship between various variables noted. This can be used to fight epidemics in third world countries by closely examining medical data about the region and coming up with solutions before they occur again.
Preview sample
Security Issues for Cloud Computing Systems Information Technology Research Paper
15 pages (4362 words) , Download 2 , Research Paper
Free
At the present, no one can neglect the significance of cloud computing in the information technology marketplace. Especially organizations using cloud environment for managing their business operations, have realized that implementation of cloud environment in an organization either at a small level or at a high level may lead to success.
Preview sample
Trusted Platform Module Vulnerabilities Information Technology Article
7 pages (1937 words) , Download 1 , Article
Free
The specifications as developed by the relevant trusted computing groups have faced resistance in some areas of this technology deployment especially in academic circles where some issues, not specifically related to trust computing, have been thought to raise privacy concerns as foreseen by the authors. 
Preview sample
Applying Decision Making Framework to IT-Related Ethical Issues Information Technology Report
6 pages (1732 words) , Download 0 , Report
Free
A large amount of employee, supplier and stakeholder data was already being collected in order to enable security checks and to compel people to sign confidentiality agreements regarding the sharing of company data or any data that might compromise the company’s position with external entities. However, this data was only visible to very few people within the entire organization.
Preview sample
Bridging the Digital Divide in Africa Information Technology Research Paper
35 pages (9773 words) , Research Paper
Nobody downloaded yet
The qualitative methodological method was applied to this research.  It focused on two countries (Ghana and Nigeria) to demonstrate the objectives of this research. This research revealed that contributory factors to the digital divide in Africa include poverty, corruption, limited access, limited education, limited resources, as well as socio-economic barriers. 
Preview sample
The Subject of Protection of the Computer System Information Technology Assignment
8 pages (2139 words) , Download 0 , Assignment
Free
The two articles provide certain information for the protection of the computer system from the web related vulnerabilities. A critique has been made in order to evaluate how effectively the articles have represented the findings and how the findings have contributed to the area of computer science. Other articles in the related subject area have also been evaluated.         
Preview sample
The Dilemma of Internet-Related Privacy Information Technology Coursework
5 pages (1530 words) , Download 0 , Coursework
Free
Ethical principles of confidentiality, autonomy and non-maleficence oblige all stakeholders to secure the information of medical records. It is analyzed that how three principles are used for personal and medical-related information of individuals over the internet. Stakeholders as well as federal governments can take action to hinder the individuals from illegal access to information over the internet.
Preview sample
The Use of Technology Related to the ISTE Standards Information Technology Report
6 pages (1852 words) , Download 0 , Report
Free
ISTE ( International Society for Technology in Education ) is an organization responsible for setting the national educational technology standards for students. The body operates under the following basic concepts; One, learners demonstrate a coherent understanding of the nature of and way technology systems work.
Preview sample
Protecting Intellectual Property Rights in Software Information Technology Coursework
5 pages (1466 words) , Download 0 , Coursework
Free
It is true that the digital age has made copying of other people’s works easier than before. As such, it has become very necessary for inventors and authors of software to consider seeking protection from intellectual property protection, as a way of guarding their inventions against pirates that are increasingly taking advantage of the digital revolution.
Preview sample
Evolution of Computer Technology Information Technology Essay
5 pages (1313 words) , Download 0 , Essay
Free
Much of the evolution that has seen the better performance of computers involves the improvement of the speed and performance of computers. Since computers process large amounts of data, most of the improvement is focused on processing speed, hence improving the performance of the computer.
Preview sample
Information Management Systems: Making the Airline Industry Competitive Information Technology Essay
5 pages (1365 words) , Download 0 , Essay
Free
The airline industry is continuously going through innovations and transformations, and the capacity to respond and adapt quickly is crucial. The amount of amassed and stored information is quickly enlarging and information management capacities become not just a means toward success but also continued existence.
Preview sample
The Concept of Digital Natives Information Technology Essay
8 pages (2384 words) , Download 0 , Essay
Free
Intense contact with technology has created behavioural changes among the digital natives and this has been described by sociologists as the digital divide. According to Tapscott (2008), the misunderstanding within the workplace pitying the digital natives and the digital immigrants has resulted from the behavioural changes.
Preview sample
Enterprise Architecture and the Foundation for Execution Information Technology Case Study
5 pages (1364 words) , Download 2 , Case Study
Free
E-participation and the success of businesses greatly depend on the strategies employed in the inclusion of information technology initiatives in their operations. Properly integrating traditional practices with the information technology facilities processes and facilities aid in the appropriate policy formulation and execution of business roles.
Preview sample
Organization Security Plan Information Technology Outline
5 pages (1424 words) , Download 0 , Outline
Free
All Members of the department of defence must understand the security planning guidelines from the engineering task and from Microsoft for the preparation of the security plan. The department as a whole must be reasonably literate in every technical aspect in order to consider computers as their best security tool.
Preview sample
Reliability Future of Wireless Network Information Technology Case Study
6 pages (1685 words) , Download 0 , Case Study
Free
The 802.11n is an IEEE standard for Wi-Fi wireless local network communication released officially in 2009. The 802.11n Wi-Fi wireless network technology is the latest technology developed to improve the reliability of older network technologies. This modern technology has now become the standard of the network.
Preview sample
Advantages and Disadvantages of Facebook Information Technology Literature review
6 pages (1659 words) , Download 0 , Literature review
Free
Social networks, especially Facebook have a wide influence upon the current generation across the world irrespective of a young, adult, or old people. In fact, social networks opened another channel of communication for the current world. One of the major advantages of social networks is their ability to enhance instant communication between different cultures.
Preview sample
How Technology Influences the Society Information Technology Literature review
6 pages (1742 words) , Download 0 , Literature review
Free
Technology is used both for leisure and curative, for instance, as Belkin states, a lot of research was carried out through technology to salvage life, especially to cure long term illnesses that could only be managed with stop-gap solutions so that the patient lives longer.
Preview sample
Ubuntu Operating System in Smartphones Information Technology Essay
6 pages (1691 words) , Download 0 , Essay
Free
Ubuntu operating system comes in several distributions. These distributions differ in several aspects as follows. A Linux distribution is an assembly of the kernel and supporting software applications for a specific use. There are several Linux distributions available and include; RedHat, Linux CentOS, Fedora, and Ubuntu.
Preview sample
Undeniable Merits and Limitations of Social Networks Information Technology Essay
5 pages (1533 words) , Download 0 , Essay
Free
Human beings have progressed and advanced as a social kind and have subsequently established an extremely refined social implementation, signaling, and execution mechanism that compensates and impose-compound forms of cooperative conducts. Evidence of human social character is evident in their ancestors as they used to live in groups.
Preview sample
The Wealth of Networks: How Social Production Transforms Markets And Freedom Information Technology Literature review
8 pages (2209 words) , Download 0 , Literature review
Free
Digital life and network technologies have dominated every society all in most parts of the world. Ever since the use of the Internet came into place, communication, commerce, and media heavily rely on it to facilitate the various operations occurring in these fields. Therefore, networked publics will remain relevant in today’s modern world provided the human race will remain in existence.
Preview sample
The Internet and Fame Information Technology Literature review
6 pages (1835 words) , Download 0 , Literature review
Free
During the period, people devalued the era because they considered it destructive to the world. However, this is not the case because the era enhanced communication (Schwabach 2006, p. 68). The internet has benefited different sectors, for example, it connects different universities around the globe in sharing their research data online.
Preview sample
Voice over IP Information Technology Coursework
8 pages (3272 words) , Download 0 , Coursework
Free
As the use of VoIP is growing at a tremendous pace, the problem of SPIT is likely to expand in the future. More and more people and companies are switching to VoIP from traditional telephone networks. A detailed study by Pras and Sinderen shows that 25% of the Western European households switched to VoIP from PSTN.
Preview sample
Contemporary Communication Technologies Impact on Economic Development Information Technology Report
15 pages (4433 words) , Download 0 , Report
Free
Right from ITES which has been declared as pillar of economic growth to the humble Pasha Centers in villages – ICT is making its marks in every aspect of life in Kenya. It is not only providing economic benefits but also empowering citizens through e-government initiatives.ICT in Kenya is bound to make a strong impact on the economic progress of Kenya in al spheres.
Preview sample
IT Implementation Plan for ProComm Technology Solutions Information Technology Business Plan
6 pages (1928 words) , Download 2 , Business Plan
Free
The IT infrastructure of a Firm provides the foundation for serving customers, working with vendors, and managing the internal firms’ business processes. ProComm Technology  Company’s IT infrastructure includes investments in both hardware, software, and services, such as consulting, education, and training, that are apportioned over the full spectrum of the business units in the firm. 
Preview sample
Impact of Cell Phones Information Technology Essay
5 pages (1604 words) , Download 0 , Essay
Free
Mobile phones are viewed as being one of the most significant and revolutionary devices in modern times. Martin Cooper who invented the device changed the world in both a negative and positive way. The impact of mobile phones has been felt across the globe and doctors and professors had predicted that this invention would have a huge impact on societies at large.
Preview sample
Smartphones and the Security of the Data in Them Information Technology Term Paper
7 pages (1868 words) , Download 0 , Term Paper
Free
With the information gathered regarding multiple security threats that are currently present and looming today, we can say that there is a significant issue regarding smartphones and the security of the data. It is our natural response to build a defense for any threat that we encounter and develop these defenses according to developing threats.
Preview sample
IPSec and Cryptography Information Technology Essay
6 pages (1691 words) , Download 0 , Essay
Free
The major source of security for the IP network layer is the Internet protocol security (IP sec). This implies that the security of all the IP packets is granted, regardless of the superiority of the protocol being transported in the packet payloads. When using the internet security protocol, the applications do not require further reengineering.
Preview sample
Securing and Protecting Information Information Technology Coursework
5 pages (1304 words) , Download 0 , Coursework
Free
Information security, which entails the practice of defending information from unauthorized parties, is a major issue among organizations. Securing networks is a process that has continuously been applied by individuals and firms. Within the network, a vast and evolving collection of threats is noted to compromise and exploit the weaknesses of organizations.
Preview sample
Mandarin Automation System Information Technology Case Study
5 pages (1349 words) , Download 0 , Case Study
Free
Mandarin M3 and mandarin OPAC are the two systems that offer complete automation functions that include circulation, cataloging, reports, searching, inventory, as well as modules. The Mandarin M3 library automation system is a search engine and native MARC database that has been designed specifically for library use.
Preview sample
EBuy Control Station Information Technology Case Study
5 pages (1454 words) , Download 0 , Case Study
Free
The information system security is in two levels, and the cloud is used at both levels. First of all, there internet service providers (ISPs) must keep secure all the data of those they secure. Everything starts at this point. The cloud service used must be an encrypted one to ensure that there are no data leakages at all.
Preview sample
1351 - 1400 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us