Information Technology Essays and Research Papers

Addiction to social networking sites
Statement of Qualification Numerous research studies have been conducted relating to the proposed research topic i.e. addiction to SNSs wherein a comprehensive understanding has been gained regarding its positive as well as negative impacts and the solutions to mitigate the pessimistic consequences. Literature Review According to LaRose & et al. (n.d.), SNSs have eventually become an extremely renowned online activity in this present day context amid the young adults comprising the school…
Read Text
An Evaluation of the Recent IEEE 802.11ac Wireless Protocol
Therefore the main concern of the wireless networking systems, both the LAN and the WLAN is to device ways that can be used to install highest security to the networks and curb the malicious technologies that have been set to tamper with the information. There are ways of enabling security by enabling the public key authentication and encryption between the access points. This article therefore describes the possible methods that can be applied to the IEEE 802.11ac for security that is still…
Read Text
A systematic comparison between traditional and agile methods
A Systematic Comparison between Traditional and Agile Methods By Table of Contents Table of Contents 2 Introduction 3 Traditional project management approaches 3 Agile project management approaches 5 Comparison of traditional and agile project management approaches 7 Conclusion 9 Bibliography 10 Introduction A project is a short-term activity to reach some specific objectives. At the present, organizations perform business operations in the form of projects, which are managed through some…
Read Text
A Systematic Comparison between Traditional and Agile Methods
Project Management Methods: A Comparative Study Introduction: The concept of project management is defined as the discipline of planning, organising,securing and managing resources in order to accomplish specific goals and objectives in any field or domain. In other words, it systematically organises a project and its components. A project is a one-time effort that is aimed at producing specific results in a specific duration. That is to say, a project has a defined beginning and an end.…
Read Text
Building an apps farm for university student
The users have to be keen with these apps because if information is provided using the device, there is someone that may be collecting them, it could be the feature developer, the app store, advertisers or an ad network, and if data is being collected then it is bound to be shared to other companies. The users are supposed to know the type of data that an app can access and how the app is used. Before downloading any app, it’s the responsibility of each user to know, the developer and its…
Read Text
Business Systems Analysis and Design
4. Storage of a large amount of information allowing for data mining; The system will ensure data from different years will be available allowing easier analyzing of data in future. This analysis would be cheaper if everything had been stored on papers. 5. Easy to operate- easiness will be ensured in the system because of usage of the graphical user interface. This will ensure workers with only basic knowledge of computer can use the system. Technologies Used This system will be a web based…
Read Text
Business Systems Analysis and Design 2
Some of the positive things will be, there will no favoritism in promoting workers because the system will always give correct data. Support of the top management is also important. This will come in place because they are the one who will see into it the system is used. The top leadership is mostly made up of decision makers who will be required to appreciate the help of the system in things like making promotion decision. Lack of necessary Infrastructure for Implementation The system might be…
Read Text
Cloud computing for Management Information Systems
Cloud computing is often utilized in the form of outsourcing. The development of cloud computing has enabled many individuals and groups to engage in various forms of outsourcing that have immense economic benefits. Businesses, governments, organizations, and individuals have relied significantly on outsourcing to achieve great aspects of success that would not have been met without the application of cloud computing. This implies that cloud computing, which is a key enabler of outsourcing is…
Read Text
Computer 3500 3day
A wireless access points is abridge that serves to join wireless devices and clients to a wired Ethernet network. Each access point supports up to a maximum number of users without loss of connectivity. This is referred to its capacity. Also the access points have the ability to serve a specified area radius depending on the specifications of the hardware i.e. access points’ density. Access points can be set up in specific areas depending on the purpose and the users. For instance, it could…
Read Text
Contingency Planning in Action
It also contributes to development of professional accountancy which ensures high-quality practices by accountants who are professional. The organization promotes the value of accountants worldwide by ensuring issues of public interest are addressed (Jackson, P. M. 2006). The vision of the organization is to ensure that the accountancy profession is recognized globally as a leader in development of sustainable organizations, robust economies and performing financial markets. Need for…
Read Text
Cyber Crime Complaint Center (in United Arab Emirates)
Higgins, G. (2010) discussed the challenges and threats due to increasing cybercrime to the economy and the businesses. The best example of the rapid growth of internet connections is United Arab Emirates where the broadband connection charges are very low therefore majority people are making use of it and establishing online businesses. According to statistics and that mentioned by Dwyer, P. (2010) and Kshetri, N. (2010), the internet use in Middle East has been increased up to 920.2% from…
Read Text
Do first person shooter video games affect the players perception of violence
According to Travers (2008), adolescents from the ages of eight to 18 use over 40 hours per week on some form of media, not including homework or school assignments. In the past, TV was the main source of accessing media violence; however, today, video games have become more and more popular. Playing vicious video games is turning into more of a greater worry since empirical evidence proposes violent video games raise adolescent aggression (Travers, 2008). The three school shootings, which…
Read Text
E-comernce Security
This project paper describes the windows blind Ecommerce website. Windows blind has three different users with different privileges. The first section of the paper describes the situation analysis of the paper. Under the situation analysis, we look at the target market needs which describe the target group of the ecommerce website and how the website is going to help them automate their transactions. This section also describes the market demographics. Market demographics describe the…
Read Text
Geographic information systems
of the of the of the INTRODUCTION TO GIS (Geographic Information System) INFORAMTION SYSTEMS Computer software that takes raw data as input, process information and output useful information in line with the usability requirements of the stakeholders is referred to as an information system. Information systems are often termed as a means of acting as an intermediary between the output processes and backend computer systems. Specific information systems are often designed for specific…
Read Text
Global Data Synchronisation for supply chain
Further, the neural data can be divided into three groups that include the core product data, category specific data and the target market data (Deek, Tommarello & McHugh 2003, p.357). The core product data entails the features that apply to all products for instance, the brand name or description. On the other hand, category specific data involves the features that apply to a particular product such as the colour. The target market data involves data characteristics of a particular product…
Read Text
How are online technologies changing the way we live
Secondly, the authors also report that online shopping is becoming famous due to the ability of the internet to provide product and services information. Online sellers offer detailed descriptions and explanations relating to their products, and this information is used by consumers when deciding on the items to purchase. Finally, online shopping exposes consumers to more products and services, and this makes the shopping process cost effective and easy. Consumers are able to get the best…
Read Text
Information Security Incident Management
The work of Killacree [Georgia Killacree, 2006] shows that the IS main threats to an enterprise come from Disgruntled Employees (often the chief source of internal threats - a critical tasks for enterprise HR!) so-called ‘hackers for hire’, organized crime, competitors, cyber vandals and governments (the latter particularly applies to technology developments, as the rewards accrue to those who apply and sell a new technology rather than those who develop it!). Of these, to a typical…
Read Text
Internet Broadcasting In China
Internet broadcasting enhances information flow thus allowing people to participate in the country’s political-economic affairs. The Chinese political economy mainly relies on the internet as most business people engage in the online platforms for business growth. Advertisement is a vital aspect of the Chinese online business that also impacts on the economic state of the nation. The government’s control over the use of the internet enables it to manage the economy thus having a stronger…
Read Text
IT System Analysis and Design
The core service or product that the company provides is brand protection and safety solutions using various methodologies to protect brands and their products from piracy, counterfeiting, especially for products such as life-saving drugs, edible items, etc. System Development Life cycle The system development life cycle provides a structure that the designers and developers of the system can follow. The cycle involves a sequence of activities that build upon on the results and outcomes of…
Read Text
Literature Review
This activities will involve the detachment of the knowledge from one context to another, carrying out the transfer process and the finally making sure the knowledge is applicable in this new current context. Therefore, different educational institutions or parties within a single institution may be at different contexts in terms of the knowledge they contain in different formats. This therefore may affect the way this knowledge is share across the parties involved hence need for detachment of…
Read Text
Local Area Networking Technologies
1.2 Modern devices such as tablets and Notebooks will require unique LAN connectivity comprising of different practices. The designed network should have small cell size and have average coverage in order to house high bandwidth demands. The access points will be mounted at close range and evenly spaced in order to minimize the distance travelled from the access point to the portable device and to increase the surface area for the access points respectively. In ensuring the above criteria…
Read Text
Muath
The use of Facebook then expanded rapidly to the outside world (Kirkpatrick, 2011). Presently, Facebook is the major social networking site with more than 800 million users worldwide. Using Facebook, we can establish strong relationships with people who are a distant away. Also, it is now easy to find the information required from a friend or a relative. The information can be phone contacts, email, and location, understanding the relationship status and also viewing one’s photos. The…
Read Text
Network Security setup
Figure 1 Part 2 SSCP Domain Research Paper on securing intranet and extranet Vulnerabilities of the network Securing organization’s data from external threats has been one of the major goals of network security since the inception of the TCP/IP protocol that generated the internet. TCP/IP is an open protocol designed to meet the needs of packet transfer in the network5. About fifteen years ago, intranet and extranet have developed in order to branch off the normal internet connection and…
Read Text
Object Oriented Programming is the main drain in project development time due to its complexity
Object Oriented Programming is the main drain in project development time due to its complexity 22 November Outline Object oriented programming Data structures in OOP Procedural programming Data Structures in Procedural Programming Object oriented programming versus procedural programming Code re-usability and Efficiency Conclusion References Object Oriented Programming Object oriented programming refers to a design philosophy that uses various sets of programming languages other than the…
Read Text
Organizational behaviour
“Motivation is the force that initiates, guides and maintains goal-oriented behaviors on the part of the employees and it is what causes them to take action in the right direction.” (Cherry). According to Robbins (2012), motivation or employee motivation in particular is defined as the willingness of the employees to exert high levels of effort towards organizational goals conditioned by the efforts ability to satisfy some needs of the employees. Worsch (2004, p.6) provides a similar…
Read Text
Contact Us