Sign In
Not register? Register Now!
Essay Available:

All Pre Written Papers From The IT & Computer Science Category

  • Impacts of Cell Phones to the Environment IT & Computer Science Essay
    Description: In the US, people acquire cell phones and use them for less than two years in which they finally discard them. Manufacturing and discarding these cell phones have a direct negative impact on the environment. First, there are catastrophic mining wastes of various metals that spills into the environment...
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Essay |
  • Smart Homes IT & Computer Science Research Paper Essay
    Description: It is widely anticipated that the future networking of the home will experience numerous devices connected to each other to the internet. With the introduction of many such new sophisticated technologies as tablets and smart phones, the demand for connectivity in consumer ...
    9 pages/≈2475 words| 3 Sources | Harvard | IT & Computer Science | Research Paper |
  • Cryptography IT & Computer Science Coursework Paper
    Description: A digital certificate enables hosts, users, and organizations to exchange information securely over the internet. It verifies and authenticates that users sending a message are who they claim to be. It can also provide confidentiality for the receiver with the means to encrypt a reply...
    3 pages/≈825 words| No Sources | APA | IT & Computer Science | Coursework |
  • System Approach IT & Computer Science Coursework Paper
    Description: It is important to choose the most suitable project management approach for any given project as each approach has its own functionality. For the Melbourne Student travel Service, it would be required to adopt the System Approach to project management....
    3 pages/≈825 words| No Sources | APA | IT & Computer Science | Coursework |
  • Network Plan and design IT & Computer Science Coursework
    Description: The total number of routers needed according to the diagram provided would be seven (7) routers, although I would recommend 14 (2 for each location) for redundancy. The type of router recommended would be Cisco ISR 4000 or ASR 1000 because these devices support large packet throughput...
    3 pages/≈825 words| No Sources | MLA | IT & Computer Science | Coursework |
  • Embedded system IT & Computer Science Essay Research
    Description: It is important to understand that a system is an integration where each component is designed to work within a set rules or guideline to perform a single or numerous tasks. Embedded system now refers to linking the elements of a computer software and hardware to work either independently...
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Ethical Theory Critical Thinking IT & Computer Science Research Paper
    Description: The last decade has seen significant growth in the use of computers. The advancement in technology means that there is increased access to information and automation. However, computers’ increasing power has created an opportunity for some people to create malicious programs...
    2 pages/≈550 words| 5 Sources | APA | IT & Computer Science | Research Paper |
  • BIG DATA VISUALIZATION DESIGN PRINCIPLES. Research Paper
    Description: In the contemporary world of Big Data, the technique of visualizing large sets of data involves a step-by-step process of presenting data mainly by encoding it using design elements that provide accessible ways of understanding data patterns, outliers, and data trends....
    3 pages/≈825 words| 3 Sources | Harvard | IT & Computer Science | Research Paper |
  • COMPUTER LANGUAGE. IT & Computer Science Assignment
    Description: Registers in the CPU refers to small storages in the computer architecture that perform functions of holding instructions and data that are to be executed by the processor. Processor registers are critical in program execution since they allow for fast access to data. ...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Cryptography IT & Computer Science Term Paper Essay
    Description: A technique that allows the protection of communications and information through codes to ensure that the intended person uses every data is known as cryptography. Cryptology is the process of protecting communications and information through coding in various computer systems....
    3 pages/≈825 words| 3 Sources | APA | IT & Computer Science | Term Paper |
  • Information Governance and Cyber Security IT Research Paper
    Description: Information governance is the technology, strategies and policies of a firm used in optimizing the information to meet the needs and regulations of the business by minimizing risks (Mukherjee, 2019). It controls the information in the organization such as usage, storage and creation of data...
    8 pages/≈2200 words| 13 Sources | APA | IT & Computer Science | Research Paper |
  • Interior Design Effects on Mental Health IT & Computer Science Essay
    Description: The interplay between interior design and mental health is significant even though designers ignore it in most cases, with the relationship between a housing interior design and mental being bidirectional (Connellan et al., 2013). The housing interior design plays a crucial...
    1 page/≈275 words| 8 Sources | APA | IT & Computer Science | Essay |
  • Comparative Analysis of Data Mining (DM) Platforms Research Paper
    Description: Abstract: This paper serves to present a comparative analysis of decision tree data mining techniques using the various software platform. Only two platforms, the SAS Enterprise miner and Python, are used for study from various existing data mining platforms. Data mining...
    13 pages/≈3575 words| 34 Sources | Other | IT & Computer Science | Research Paper |
  • Different Ways to Authenticate a User. Authentication Methods.
    Description: Authentication is a process through which requests to access a system, network, or device by a user are identified (Lal, Salendra, and Mohammed, 246). The authentication of users helps make sure that unauthorized users are flagged and kept from accessing sensitive and confidential information. T...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Cyber Crime Challenges IT & Computer Science Essay
    Description: In this era of internet and digital age technologies have taken a different shape the way individuals react and the empowerment of the internet. The use of cyber space has created an avenue for criminals to manipulate the system for their own selfish needs. Hackers and computer...
    3 pages/≈825 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Blackbaud charities hack IT & Computer Science Essay
    Description: The invention of the internet and the computer was meant to increase opportunities for interaction and improve trade. With time, this technology is being integrated into society, and although it has multiple benefits, it has some of its own flaws. With the increased integration of technology...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Cyber Security IT & Computer Science Essay Research
    Description: Cyber security is a specialized course in the field of Information Technology. By taking this course, I will be equipped with the knowledge and skills needed to protect the operating systems of a computer, networks, and data from external threats. Threats to sensitive data occur in various forms...
    1 page/≈550 words| No Sources | MLA | IT & Computer Science | Essay |
  • Creating Accessible Documents in Microsoft Word IT & Computer Paper
    Description: he core components to incorporate to the word document are the use of Headings, Lists, Alternate Text for visuals, Meaningful hyperlinks, Accessible Tables, and Color scheme. Follow the practices below for creating accessible Word documents....
    1 page/≈550 words| 1 Source | Other | IT & Computer Science | Other (Not Listed) |
  • Creating Accessible Documents in Microsoft Powerpoint IT Paper
    Description: The core components to incorporate to the presentation are the use of Alternate Text for visuals, Slide Titles and Design, Order of Slide Contents, Meaningful Hyperlinks, Accessible Tables, Text Accessibility and Color Scheme, and Accessible Videos. Follow the practices below...
    1 page/≈550 words| 1 Source | Other | IT & Computer Science | Other (Not Listed) |
  • Building a computer from scratch IT & Computer Science Essay
    Description: Begin the computer building process by adding the case to the workstation. The process involves splitting the entire computer case apart in preparation for the installation of the computer components. According to Labsim (2020) the back screws are always removed to allow for the opening...
    4 pages/≈1100 words| 7 Sources | APA | IT & Computer Science | Essay |
  • User Frustrations with Modern Applications. IT & Computer Science Essay
    Description: According to Hassenzahl & Tractinsky (2006), user experience (sometimes represented as UX) can be described as the result of the internal state of the user, the characteristics of the system, and the context in which the interaction occurs. ...
    4 pages/≈1100 words| 4 Sources | APA | IT & Computer Science | Essay |
  • Four Differentiators and Four RAMP Components. IT & Computer Science
    Description: With the increasing need for shorter turnaround time, improved creativity, lower operation costs, and utilization of international skills, virtual teams have become a solution....
    3 pages/≈825 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Modern-day Cryptography IT & Computer Science Research Paper
    Description: Cryptography is an art as old as mankind. Over time it has been used as a secure means of communication that only those initiated into the group could understand. Some examples of cryptography were witnessed in Egyptian hieroglyphs and Julius Caesar's cipher system that was used to facilitate...
    3 pages/≈825 words| 7 Sources | APA | IT & Computer Science | Research Paper |
  • Internet Security IT & Computer Science Coursework
    Description: The technological advancements in the ICT sector have led to the growth of businesses through the deployment of information systems and other computer-based platforms that drive business ventures. One negative impact of the advancements, especially of the internet, has been cybercrime...
    1 page/≈275 words| 13 Sources | Other | IT & Computer Science | Coursework |
  • Fareportal Company Survey IT & Computer Science Paper
    Description: In a bid to understand the network infrastructure, topology, and implementation at Fareportal, the team conducted a thorough survey of the existing systems and made findings that would be useful to the organization. The intention of the survey was to enable the team to perform ...
    2 pages/≈550 words| No Sources | Other | IT & Computer Science | Other (Not Listed) |
  • Risk Management Report IT & Computer Science Coursework
    Description: This report is dedicated towards providing risk analysis to the senior executives of Caduceus Partner Pty Ltd. A dedicated team has reviewed the risks associated with company’s IS/IT/ information security and management practices and their impact, by identifying the key source of threats...
    40 pages/≈11000 words| 4 Sources | Harvard | IT & Computer Science | Coursework |
  • Risk Analysis and Management IT & Computer Science Coursework
    Description: Organix is an establishment in the food and supplement industry in Australia. The organization is made-up of an inter-web of a complex system of companies that transcends geographic barriers by linking electronically to Australia, a group of Asian countries, New Zealand and other parts...
    50 pages/≈13750 words| 4 Sources | APA | IT & Computer Science | Coursework |
  • Understanding the Importance and Requirements for Web Accessibility and Usability
    Description: This paper provides the importance and requirements of web accessibility and usability that further gives web developers a reason for enhancing the two in their web development. ...
    9 pages/≈2475 words| 13 Sources | APA | IT & Computer Science | Essay |
  • Shared security responsibility model that a dba must be aware of when moving to the cloud
    Description: The cloud presents critical issues despite being an effective, efficient, and low-cost archetype for dynamic firms. Organizations are more concerned about security and privacy, mostly due to inadequate visibility of the cloud computing infrastructure (Sharma, Husain & Ali, 2017)....
    2 pages/≈550 words| 4 Sources | APA | IT & Computer Science | Essay |
  • SECURITY CERTIFICATIONS. IT & Computer Science Essay
    Description: GIAC Certifications establishes and oversees certifications for premier, qualified cybersecurity. GIAC Certifications offer the highest and most stringent guarantee of expertise and cybersecurity skills available to business, government, and military customers worldwide....
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • SOX COMPLIANCE FRAMEWORK. IT & Computer Science Essay
    Description: Compliance with SOX is not only a legal requirement but also a profitable business practice. Corporations should, of course, act ethically and restrict access to sensitive financial systems....
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
  • BUSINESS ANALYST ROLE IN THE COMPUTER SOCIETY. IT & Computer Science
    Description: In the IT sector, there is an increasing demand for business analysts. The business operates in close cooperation with the IT company; the latter is qualified to meet the company requirements....
    19 pages/≈5225 words| 15 Sources | APA | IT & Computer Science | Dissertation |
  • Multimedia Networking Principles homework. IT & Computer Science Essay
    Description: create a unique node that corresponds with the sum of the two nodes' preceding frequency. The first node that is extracted makes it the left child, and the child on the right will be the remaining extracted node and include this said node to the min-heap....
    2 pages/≈550 words| No Sources | MLA | IT & Computer Science | Essay |
  • Computer Science and Cybercrime IT & Computer Science Research Paper
    Description: Cybercrimes have been a cause of concern because of the increased reliance on information technology. Cybercrime can be costly for the government because functions such as military, surveillance, and internal security can be affected by the theft of information or materials (Pomerleau, 2015)....
    3 pages/≈825 words| 6 Sources | APA | IT & Computer Science | Research Paper |
  • Long-Term Effects of Living in A Technological World IT Essay
    Description: The advancement of technology has influenced modern societies both positively and adversely. Globally, technology has been used to benefit people in various sectors, such as communication, education, and healthcare. Technology has simplified multiple aspects of these sectors making them smooth...
    2 pages/≈550 words| 10 Sources | APA | IT & Computer Science | Essay |
  • How Does One Avoid Fraud on The Internet? IT & Computer Science Essay
    Description: The rapid growth and proliferation of technology over the last decade have facilitated extensive social communication over vast geographical regions. The technological advancement has created an opportunity for social engineering practices in which opportunists manipulate users and systems...
    2 pages/≈550 words| 4 Sources | APA | IT & Computer Science | Essay |
  • Abudant data IT & Computer Science Essay Research Paper
    Description: The advancement and proliferation of technology over the last few decades have seen the cumulation of massive amounts of information referred to as “big data.” The data is either user-generated or as a remnant of actions performed using technological devices. The vast information...
    2 pages/≈550 words| 5 Sources | APA | IT & Computer Science | Essay |
  • Dark Web IT & Computer Science Essay Research Paper
    Description: The dark web seems to be a good thing that can bring some positivity into humanity. However, even if that is the case, more effort should not be expended to enable more comprehensive access to the dark web. The consequences of doing that will automatically supersede its benefit....
    2 pages/≈550 words| 2 Sources | Harvard | IT & Computer Science | Essay |
  • I need a report on software quality assurance IT & Computer Article
    Description: This task was a report on software quality assurance which i did for a client from peopleperhour.com the report was required to be single spaced and and withe maximum number of 7 pages I had done it on PDF now this system has forced me to convert it to word my appologies...
    1 page/≈550 words| 20 Sources | APA | IT & Computer Science | Article |
  • WannaCry Ransomware Attack. IT & Computer Science Essay
    Description: Computer and information technology has evolved over time from simple inventions to more complex devices and tools that have eased how humans conduct their daily activities....
    6 pages/≈1650 words| 10 Sources | APA | IT & Computer Science | Essay |
  • Factors to consider in determining the competitive value of IT
    Description: For an organization to succeed in the current market structure and working environment, it is very vital for the business to in invest most resourcing in improving the technology. Companies have to improve processes such as technology that controls the value chain, procurement,...
    3 pages/≈825 words| 3 Sources | Chicago | IT & Computer Science | Essay |
  • Python Final UFO Reporting Database IT & Computer Science Essay
    Description: trows = dt.find("tbody").find_all("tr") for row in trows: #get the city name fonttag = row.find_all("td")[1].find("font") city = fonttag.text print("city tag: ",city) #look for the location tag in dict if location not in mydict: mydict[location] = {city:1} #assign a count of 1 else: mydict2 ...
    3 pages/≈825 words| 2 Sources | Other | IT & Computer Science | Essay |
  • The rise of artificial intelligence IT Science Research Paper
    Description: Over recent years, technology has changed dynamically giving rise to artificial intelligence. Artificial intelligence is a process in which machines try to simulate human intelligence or behave in a manner that imitates human behaviour. In this case, the machines can learn, reason and conduct...
    1 page/≈275 words| 15 Sources | Harvard | IT & Computer Science | Research Paper |
  • Career Reflection. IT & Computer Science Assignment
    Description: Data science and big data analytics are one of the most critical courses in the field of manufacturing. Data analytics is about quantitative and qualitative techniques applied to advance productivity in businesses and increase profits. ...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Removing Malware. IT & Computer Science Coursework
    Description: Malware is malicious software that disrupts computer functionality by engulfing the operating system. Malware is a collection of computer viruses; Trojan horses, spyware, and a whole host of malicious programs are commonly referred to as computer contaminants. ...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Coursework |
  • Governance and Accountability using COBIT. IT & Computer Science Essay
    Description: Enterprise Architecture Governance (EAG) as a process encompasses the essential aspects of business management. This means that leadership has to be firm and focused while at the same time possess a comprehensive understanding of the organizational structure....
    4 pages/≈1100 words| 2 Sources | APA | IT & Computer Science | Essay |
  • MICROSOFT CORPORATION. IT & Computer Science Research Proposal
    Description: The report advises Microsoft to develop hardware products and promises three key benefits. The first one is reducing the company’s overreliance on software products....
    8 pages/≈2200 words| 10 Sources | MLA | IT & Computer Science | Research Proposal |
  • Back-propagation. IT & Computer Science Assignment
    Description: This is a standard mathematical tool used to train neural networks. It was invented in the 1970s but was not appreciated until 1986 when Rumelhart and his co-authors published a paper on learning representations utilizing the method....
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • APPLE VS ANDROID PHONES. IT & Computer Science Case Study
    Description: The advent of the new technology has sparked off debates between Apple and what individuals would prefer. Unending debates and arguments have not critically outlined, which is the best technology between the two. ...
    3 pages/≈825 words| No Sources | APA | IT & Computer Science | Case Study |
  • FAIR Model Assignment. IT & Computer Science Coursework
    Description: In the modern world, information has a great value. Information theft of any organization might destroy or hamper the organization. So, information risk must be examined and evaluated while establishing or operating a company. ...
    1 page/≈550 words| 5 Sources | APA | IT & Computer Science | Coursework |
  • Applying the Learning Outcomes IT & Computer Science Essay
    Description: As a Data Engineer, integration is an essential business tool to ensure all systems and process in the corporate communications to each smoothly. Forward integration ensures that information from a given system is shared downwards to other systems and processes while backward integration assists...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Project Computer Science IT & Computer Science PowerPoint Presentation
    Description: Abstract - Student attendance system is the system of tacking the attendance of the student on basis of presence in class. Successful industries, schools, universities begin by engaging students and making sure that they will come regularly so the attendance rate become very important....
    1 page/≈275 words| No Sources | APA | IT & Computer Science | PowerPoint Presentation |
  • Artificial Intelligence as a Disruptive Technology
    Description: Artificial intelligence is a simulation process of programming series of human intelligence to industrially-developed machines to make the think, move, behave, learn, problem-solving, and mimic normal human activities. ...
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
  • Leadership strategies in cyber security. IT & Computer Science Essay
    Description: The 7-Eleven company became a victim of cyber-attacks when attackers gained access to the customers' mobile banking apps and made fake charges on hundreds of accounts crediting the money to their account instead....
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • The Internet and Digital Technology Control. Research Paper
    Description: The pervasive growth of the internet and its digital components has provoked government, corporations, and media houses to act on the amount of content released to the public and the consequent effects it has on the status quo of the economy, social and political environments....
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Research Paper |
  • LASA 2 Internal and External Security Planning IT Research Paper
    Description: Network security is a very important element for the success of any business, small or large. For this reason, business managers need to create network security plans so as to ensure that their information resources are used in an effective manner. In this paper, I profile a network security ...
    7 pages/≈1925 words| 3 Sources | APA | IT & Computer Science | Research Paper |
  • IT. IT & Computer Science Case Study Research Paper
    Description: The initiation of computer technology has released a new period in technological developments which makes computers become an essential part of everyday life. Computers make all lives stress-free so that all can live stress-free lives. Computers are everywhere in a society i.e.; at work, at school...
    6 pages/≈1650 words| 5 Sources | APA | IT & Computer Science | Case Study |
  • Virualization and the Cloud Computing World IT Science Essay
    Description: Cloud computing services have rapidly been adopted by large networks. Many companies are now migrating their infrastructures from an On-premise setting to a cloud service (Cusamano, 2010). The convenience a virtualized network can provide includes the storage of data, monitoring and maintenance...
    2 pages/≈550 words| 5 Sources | APA | IT & Computer Science | Essay |
  • Direct Event Simulation It & Computer Science Research Paper
    Description: Long before the invention of computers, we are tempted to think that our ancestors must have faced a pretty hard time carrying out their daily activities. In the current age we live in, coupled with the internet and almost everyone owning a technology gadget, it is highly unlikely...
    5 pages/≈1375 words| 4 Sources | APA | IT & Computer Science | Research Paper |
  • Information Technology It & Computer Science Essay
    Description: With major advancements in technology as well as increased internet connectivity, it is not enough to say that globalization is spreading quicker. Developing countries have equally noted this and are investing billions, if not trillions, into Information Technology (IT). With that in mind...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Current Affairs Report IT & Computer Science Paper
    Description: Technologies have continued to change over time to meet the emerging demands of users. In the same situation, technologies meant to support accomplishment of malicious tasks have also continued to emerge to keep abreast with such changes. The latter situation puts systems at risks of facing attacks...
    3 pages/≈825 words| 3 Sources | APA | IT & Computer Science | Other (Not Listed) |
  • Security Concerns In Home Automation And The Internet Of Things
    Description: The first device to be connected to the World Wide Web was the Coke Machine by technicians at the Carnegie Mellon University back in the early 1980s. Anyone who desired a drink could, therefore, check the product availability and status of the machine before actually walking towards it (Kennedy, 2014)....
    5 pages/≈1375 words| 16 Sources | APA | IT & Computer Science | Research Paper |
  • X.509 PKI and Open PGP’s PKI IT & Computer Science Essay
    Description: In cryptography, X.509 is an ITU-T standard for establishment of a Public Key Infrastructure (PKI) and Privilege Management Infrastructure (PMI). It includes many standard formats like public key certificates, attribute certificates, certificate path validation algorithms etc. Open PGP’s PKI...
    1 page/≈550 words| 4 Sources | Harvard | IT & Computer Science | Essay |
  • Benefits of Business Intelligence IT & Computer Science Essay
    Description: According to Trieu, Cockcroft, & Perdana (2018), the modern business environment demands that modern managers deploy modern technologies. In this account, modern organizations have pushed towards implementing technologies such as business intelligence and data mining. ...
    3 pages/≈825 words| 4 Sources | APA | IT & Computer Science | Essay |
  • Cloud Security Threats IT & Computer Science Essay
    Description: Cloud computing has emerged as one of the fundamental technologies in helping organizations attain the desired levels of business strategy. In this account, Amara, Zhiqui, & Ali (2017) state that cloud computing is vital in running modern-day organizations which are being driven by data...
    2 pages/≈550 words| 4 Sources | APA | IT & Computer Science | Essay |
  • CV for Network Security Engineer IT & Computer Science Resume Writing
    Description: Technically minded and resourceful professional with more than 15 years of experience in internet and security-related project management and implementation. Proven track record in managing and completing projects within the time which resulting in enhancing the operational efficiency...
    2 pages/≈550 words| No Sources | Other | IT & Computer Science | Resume Writing |
  • Network Design Report IT & Computer Science Essay Paper
    Description: A network connection is important for any business as it enables communication in the company. Networking encompasses wired and wireless networks that ensure that a company can communicate within and without. A network is used to send emails, access the internet, and even print and share...
    4 pages/≈1100 words| No Sources | APA | IT & Computer Science | Essay |
  • Understanding the Bootup Process and Partitioning in Linux System
    Description: Various steps take place during a Linux system bootup process. There are two types of processes that take place where one uses the BIOS while the other uses the more modern UEFI. BIOS stands for basic input/output system which manages and checks the integrity of the hard drives and runs...
    3 pages/≈825 words| 8 Sources | APA | IT & Computer Science | Essay |
  • Structured Query Language IT & Computer Science Coursework
    Description: Provide a listing of all suppliers who use a bank in San Francisco (hint: look at BankAccountBranch field). Display supplier ID, supplier name, bank account name and bank account branch. Show the companies in alphabetical order by name. Use Purchasing.Suppliers table. Record the number of rows in resulting...
    5 pages/≈1375 words| No Sources | APA | IT & Computer Science | Coursework |
  • Database IT & Computer Science Coursework Research
    Description: Requirement 5: (using a trigger and procedure): The system should use the trigger once delete procedure has been executed to insert a Log record to the Logs table. The logs table should be inserted the Doctor id, deleted message and date when the delete has been executed....
    1 page/≈275 words| 20 Sources | MLA | IT & Computer Science | Other (Not Listed) |
  • Web Analytics Methodologies & Tools IT & Computer Science Essay
    Description: Web analytics can be defined as the collection, measurement, reporting, and analysis of the web data with the aim of optimizing and comprehending the web usage. In addition, the web analytics are utilized to offer regarding the visitors who visited the website, and number of views per web page...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Survey Reseach on public opinions IT & Computer Science Research Paper
    Description: Survey research is known as a quantitative and qualitative technique with two appearances which are self-reports measurements done on variables of interest and sampling issues are considered (Schindler, 2020). Self-reports measurements are where survey researchers ask questions directly...
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
  • Generic Trademark IT & Computer Science Research Paper
    Description: The generic trademark is a term used as words or symbols that communicate the type of product being offered (Johnson, 2019). The terms ‘cellophane’, ‘aspirin’ and ‘thermos’ generic fell into common usage to represent the type of products that oppose certain company’s products...
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
  • Course Reflection IT & Computer Science Coursework
    Description: In this week's course, reflection is based on our central learning on information technology importance in strategic planning; a lot was learned and above all, the course was exciting and interactive. The course focuses majorly on the information technology leader’s collaborative roles...
    2 pages/≈550 words| 1 Source | APA | IT & Computer Science | Coursework |
  • Access controls models IT & Computer Science Research Paper
    Description: Access control topic is a wide chapter with useful information concerning information security and it and before looking at access control models, it has important concepts which are confidentiality, integrity, and availability of information (Conrad, Misenar & Feldman, 2016)....
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
  • Project Proposal IT & Computer Science Research Proposal
    Description: Due to advance in technology together joined with business environment changes, shows a great effect on general application security where they are becoming more predominant in public, government and corporate services in today environment (Othmane, Chehrazi, Bodden, Tsalovski & Brucker, 2017)...
    2 pages/≈550 words| 6 Sources | APA | IT & Computer Science | Research Proposal |
  • Linux Mail Server Security IT & Computer Science Research Paper
    Description: Operating systems have evolved over the years. Since of old, the Unix-based systems have proven difficult and cumbersome to use, especially with their user-unfriendliness interface. Most of them are command-line based, with operations limited to only root privileges. Windows Operating Systems have...
    8 pages/≈2200 words| 12 Sources | APA | IT & Computer Science | Research Paper |
  • The Internet It & Computer Science Essay Research Paper
    Description: The internet simply referred to as the ‘net’ means an interconnection of computer systems. The aim is to provide data, information, communication, and others. The information required is usually updated and stored online by computers known as servers. It is then retrieved by users when needed through...
    4 pages/≈1100 words| 3 Sources | APA | IT & Computer Science | Essay |
  • SQL IT & Computer Science Coursework Research Paper
    Description: SELECT instructor.dept_name,instructor.name,COUNT(instructor.ID) AS TOTAL FROM instructor INNER JOIN teaches ON instructor.ID=teaches.ID WHERE teaches.semester='Spring' AND teaches.year='2018' GROUP BY instructor.dept_name ORDER BY instructor.dept_name DESC;...
    9 pages/≈2475 words| No Sources | Other | IT & Computer Science | Coursework |
  • OPERATIONS MANAGEMENT AND SUPPLY CHAIN MANAGEMENT.
    Description: In the current century, there is an upsurge of industrial activity around the world. Companies and organizations dealing with different goods and services. ...
    7 pages/≈1925 words| 11 Sources | APA | IT & Computer Science | Research Paper |
  • Admission Essay. University of Illinois at Urbana-Champaign.
    Description: Whenever I used a computer application or played a video game, I wondered how these programs were coded. My desire to seek answers led me to join my school's computer science club, where I attended lectures and participated in programming contests. ...
    1 page/≈275 words| No Sources | Other | IT & Computer Science | Essay |
  • Social Implications of The Business of Piracy On Android Application
    Description: Piracy has always been the bane of any digital industry and in the age where people are engrossed on smartphones, it is inevitable that shadow of software piracy is there. According to Lending and Slaughter (1999), “Intellectual property is often the most valuable corporate asset in an increasingly...
    7 pages/≈1925 words| 20 Sources | APA | IT & Computer Science | Term Paper |
  • Excel Workbooks IT & Computer Science Article Paper
    Description: Workbook is a file in Microsoft Excel that consists of one or more spreadsheets which helps in solving easy and complex issues that need planning. For instance, one can create a workbook to analyze budgets. Spreadsheets consist of rows and columns which form a cell where one can input data...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Article |
  • Final Project Network Security Plan It & Computer Research Paper
    Description: Due to the recent security breaches in our Information Technology and Network Infrastructure, it has become necessary to examine and re-align our network in a manner that will harden it to intrusion and keep our information secure. Currently our network is designed in a flat manner ...
    7 pages/≈1925 words| 4 Sources | APA | IT & Computer Science | Research Paper |
  • Syse650 Exam Questions It & Computer Science Coursework
    Description: In systems engineering, Maintainability can be stated as the comparatively easiness and efficiency in time and energy that a system can withstand or reinstate to a particular circumstance by employing scheduled and unplanned maintenance. Maintenance is a task of architectural system design;...
    4 pages/≈1100 words| 2 Sources | APA | IT & Computer Science | Coursework |
  • Parents should limit teenagers’ use of Internet IT & Computer Essay
    Description: Widespread internet usage is a new phenomenon in modern societies across the world. Networked computers and handheld devices have dramatically transformed the way humans do business and exchange information. However, there are various emerging issues related to unlimited internet access ...
    4 pages/≈1100 words| 5 Sources | APA | IT & Computer Science | Essay |
  • Information Security IT & Computer Science Coursework
    Description: The Iconcepts Iof Iconfidentiality, Iintegrity Iand Iavailability Ioccur Ias Ikey Iprinciples Iof Idata Isecurity. IConfidentiality Iexamines Ithe Iprevention Iof Idata Idisclosure Ito Iunauthorized Isystems Ior Ipersons I(Gollmann, I2011). IFor Ian IATM, Ithe Itransaction Iwould Iinvolve Ithe Iphysical...
    6 pages/≈1650 words| 3 Sources | APA | IT & Computer Science | Coursework |
  • Cloud Computing IT & Computer Science Essay Research
    Description: My choice of sector is the Energy sector. This is because the energy sector is Singapore’s leading supplier of extensive variety of products, services and solutions for power generation, distribution as well as transmission. It is also involved in the production, conversion and transportation...
    6 pages/≈1650 words| 9 Sources | Harvard | IT & Computer Science | Essay |
  • Differences between Namespace and Folder IT & Computer Science Essay
    Description: Namespace root and folder in DFS are two interrelated concepts that usually allow the sharing of resources and files over a network. Despite the relationship between them, they play different roles in file sharing (Whitney et al., 1998). A namespace is a role that enables users to share folder...
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Challenges in Identifying and Documenting IT Acquisition
    Description: The challenging issues in identifying and documenting IT acquisition requirements continue to grow together with the increasingly important role software plays in supporting government and commercial enterprises, mission needs, and business. Software society has developed exclusive...
    2 pages/≈550 words| 4 Sources | APA | IT & Computer Science | Term Paper |
  • Cyber Infrastructure It & Computer Science Research
    Description: Organizations are always prone to common network vulnerabilities such as insecure ports, weak password encryption, poor firewall exploitation, and short of appropriate security policy. Due to this organizations and companies have developed cyber-security policy to manage the risk of security exposure...
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Other (Not Listed) |
  • XYZ case study IT & Computer Science Case Study Paper
    Description: XYZ is a small Internet Service Provider company that consists of twenty-five workstations and two multipurpose servers. All organization employees use e-mails and have internet access. About five employees work remotely from the field. In addition, the company comprises of 32 employees...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Case Study |
  • Business Reporting and Analytics IT & Computer Science Coursework
    Description: As indicated in the case study, DreamHome Company is a real-estate company with several branches. The company manages owner’s properties. The Company specializes in property management, by taking roles between clients and owners who wish to rent out their properties....
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Coursework |
  • Network configuration for Marlyland IT & Computer Science Coursework
    Description: As a network trainee, my supervisor has tasked me with ways of improving Mayberry satellite campus’ network. Hence this paper will include reviewing the existing network cabling and providing recommendations to improve the speed of the organization network....
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Coursework |
  • When Reliance on Computer Technology Stops IT & Computer Science Essay
    Description: When computers were first invented, their uses were basic and traditional. These included the simplistic input, storage, processing, and output of data for various purposes (Toyama, 2015). Recurrent innovations and reinventions led to the broadening of these functions to make computers indispensable...
    3 pages/≈825 words| 5 Sources | APA | IT & Computer Science | Essay |
  • Cyber Security Risk IT & Computer Science Essay Paper
    Description: Systems and underlying data are assets owned by the business. The information technology department comes in to support business in utilizing IT resources. Whenever a risk associated with systems or underlying data materializes, it is the business that suffers losses. The information technology department...
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Network Devices And The Osi Model It & Computer Science Essay
    Description: Communication between end user machines and servers is facilitated by a network that lies between them. There are various network devices that fall on different layers of the OSI model that are used to build the network. The devices play different roles on a network and it is the roles that tie them...
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
  • Digital Evidence Business Plan It & Computer Science Essay
    Description: Procurement of a system for purposes of running any business requires an elaborate business case. The documentation of the business case has to prove beyond reasonable doubt that the system to be purchased will make business better. Management only buys into the idea of investing when...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Mitigating Malware Risks It & Computer Science Essay
    Description: Malware attacks have becomes rampant in the recent past. There are various types of malware including Trojan horse, worms, viruses and ransomware. When an organization is attacked using malware, the controls put in place determine the impact of the attack. The organization in question had put in place ...
    1 page/≈275 words| No Sources | APA | IT & Computer Science | Essay |
  • Security Issue IT & Computer Science Research Paper
    Description: The prime objective of the research was to explore the cybersecurity concerns and potential risk factors that may have caused the public cloud-based storage data loss and leakage in Dropbox. In the research, we discussed the relevance/importance of conducting a study on the Dropbox data breach...
    5 pages/≈1375 words| 10 Sources | Harvard | IT & Computer Science | Research Paper |
1 | 2 | ... last
Need a Custom Essay Written?
First time 15% Discount!