Sign In
Not register? Register Now!

All Pre Written Papers From The IT & Computer Science Category

  • Python Final UFO Reporting Database IT & Computer Science Essay
    Description: trows = dt.find("tbody").find_all("tr") for row in trows: #get the city name fonttag = row.find_all("td")[1].find("font") city = fonttag.text print("city tag: ",city) #look for the location tag in dict if location not in mydict: mydict[location] = {city:1} #assign a count of 1 else: mydict2 ...
    3 pages/≈825 words| 2 Sources | Other | IT & Computer Science | Essay |
  • The rise of artificial intelligence IT Science Research Paper
    Description: Over recent years, technology has changed dynamically giving rise to artificial intelligence. Artificial intelligence is a process in which machines try to simulate human intelligence or behave in a manner that imitates human behaviour. In this case, the machines can learn, reason and conduct...
    1 page/≈275 words| 15 Sources | Harvard | IT & Computer Science | Research Paper |
  • Career Reflection. IT & Computer Science Assignment
    Description: Data science and big data analytics are one of the most critical courses in the field of manufacturing. Data analytics is about quantitative and qualitative techniques applied to advance productivity in businesses and increase profits. ...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Removing Malware. IT & Computer Science Coursework
    Description: Malware is malicious software that disrupts computer functionality by engulfing the operating system. Malware is a collection of computer viruses; Trojan horses, spyware, and a whole host of malicious programs are commonly referred to as computer contaminants. ...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Coursework |
  • Governance and Accountability using COBIT. IT & Computer Science Essay
    Description: Enterprise Architecture Governance (EAG) as a process encompasses the essential aspects of business management. This means that leadership has to be firm and focused while at the same time possess a comprehensive understanding of the organizational structure....
    4 pages/≈1100 words| 2 Sources | APA | IT & Computer Science | Essay |
  • MICROSOFT CORPORATION. IT & Computer Science Research Proposal
    Description: The report advises Microsoft to develop hardware products and promises three key benefits. The first one is reducing the company’s overreliance on software products....
    8 pages/≈2200 words| 10 Sources | MLA | IT & Computer Science | Research Proposal |
  • Back-propagation. IT & Computer Science Assignment
    Description: This is a standard mathematical tool used to train neural networks. It was invented in the 1970s but was not appreciated until 1986 when Rumelhart and his co-authors published a paper on learning representations utilizing the method....
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • APPLE VS ANDROID PHONES. IT & Computer Science Case Study
    Description: The advent of the new technology has sparked off debates between Apple and what individuals would prefer. Unending debates and arguments have not critically outlined, which is the best technology between the two. ...
    3 pages/≈825 words| No Sources | APA | IT & Computer Science | Case Study |
  • FAIR Model Assignment. IT & Computer Science Coursework
    Description: In the modern world, information has a great value. Information theft of any organization might destroy or hamper the organization. So, information risk must be examined and evaluated while establishing or operating a company. ...
    1 page/≈550 words| 5 Sources | APA | IT & Computer Science | Coursework |
  • Applying the Learning Outcomes IT & Computer Science Essay
    Description: As a Data Engineer, integration is an essential business tool to ensure all systems and process in the corporate communications to each smoothly. Forward integration ensures that information from a given system is shared downwards to other systems and processes while backward integration assists...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Project Computer Science IT & Computer Science PowerPoint Presentation
    Description: Abstract - Student attendance system is the system of tacking the attendance of the student on basis of presence in class. Successful industries, schools, universities begin by engaging students and making sure that they will come regularly so the attendance rate become very important....
    1 page/≈275 words| No Sources | APA | IT & Computer Science | PowerPoint Presentation |
  • Artificial Intelligence as a Disruptive Technology
    Description: Artificial intelligence is a simulation process of programming series of human intelligence to industrially-developed machines to make the think, move, behave, learn, problem-solving, and mimic normal human activities. ...
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
  • Leadership strategies in cyber security. IT & Computer Science Essay
    Description: The 7-Eleven company became a victim of cyber-attacks when attackers gained access to the customers' mobile banking apps and made fake charges on hundreds of accounts crediting the money to their account instead....
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • The Internet and Digital Technology Control. Research Paper
    Description: The pervasive growth of the internet and its digital components has provoked government, corporations, and media houses to act on the amount of content released to the public and the consequent effects it has on the status quo of the economy, social and political environments....
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Research Paper |
  • LASA 2 Internal and External Security Planning IT Research Paper
    Description: Network security is a very important element for the success of any business, small or large. For this reason, business managers need to create network security plans so as to ensure that their information resources are used in an effective manner. In this paper, I profile a network security ...
    7 pages/≈1925 words| 3 Sources | APA | IT & Computer Science | Research Paper |
  • IT. IT & Computer Science Case Study Research Paper
    Description: The initiation of computer technology has released a new period in technological developments which makes computers become an essential part of everyday life. Computers make all lives stress-free so that all can live stress-free lives. Computers are everywhere in a society i.e.; at work, at school...
    6 pages/≈1650 words| 5 Sources | APA | IT & Computer Science | Case Study |
  • Potential Cybersecurity Threat in Using Third-Party Facebook Apps
    Description: The article delivers a brief summary of the different cybersecurity threats that exist in using third-party apps in the Facebook platform. It is very informative since there are a lot of people who uses the Facebook platform without any clue that there are people who use the site in order to get ...
    5 pages/≈1375 words| 9 Sources | APA | IT & Computer Science | Essay |
  • Virualization and the Cloud Computing World IT Science Essay
    Description: Cloud computing services have rapidly been adopted by large networks. Many companies are now migrating their infrastructures from an On-premise setting to a cloud service (Cusamano, 2010). The convenience a virtualized network can provide includes the storage of data, monitoring and maintenance...
    2 pages/≈550 words| 5 Sources | APA | IT & Computer Science | Essay |
  • Direct Event Simulation It & Computer Science Research Paper
    Description: Long before the invention of computers, we are tempted to think that our ancestors must have faced a pretty hard time carrying out their daily activities. In the current age we live in, coupled with the internet and almost everyone owning a technology gadget, it is highly unlikely...
    5 pages/≈1375 words| 4 Sources | APA | IT & Computer Science | Research Paper |
  • Information Technology It & Computer Science Essay
    Description: With major advancements in technology as well as increased internet connectivity, it is not enough to say that globalization is spreading quicker. Developing countries have equally noted this and are investing billions, if not trillions, into Information Technology (IT). With that in mind...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Current Affairs Report IT & Computer Science Paper
    Description: Technologies have continued to change over time to meet the emerging demands of users. In the same situation, technologies meant to support accomplishment of malicious tasks have also continued to emerge to keep abreast with such changes. The latter situation puts systems at risks of facing attacks...
    3 pages/≈825 words| 3 Sources | APA | IT & Computer Science | Other (Not Listed) |
  • Security Concerns In Home Automation And The Internet Of Things
    Description: The first device to be connected to the World Wide Web was the Coke Machine by technicians at the Carnegie Mellon University back in the early 1980s. Anyone who desired a drink could, therefore, check the product availability and status of the machine before actually walking towards it (Kennedy, 2014)....
    5 pages/≈1375 words| 16 Sources | APA | IT & Computer Science | Research Paper |
  • X.509 PKI and Open PGP’s PKI IT & Computer Science Essay
    Description: In cryptography, X.509 is an ITU-T standard for establishment of a Public Key Infrastructure (PKI) and Privilege Management Infrastructure (PMI). It includes many standard formats like public key certificates, attribute certificates, certificate path validation algorithms etc. Open PGP’s PKI...
    1 page/≈550 words| 4 Sources | Harvard | IT & Computer Science | Essay |
  • Benefits of Business Intelligence IT & Computer Science Essay
    Description: According to Trieu, Cockcroft, & Perdana (2018), the modern business environment demands that modern managers deploy modern technologies. In this account, modern organizations have pushed towards implementing technologies such as business intelligence and data mining. ...
    3 pages/≈825 words| 4 Sources | APA | IT & Computer Science | Essay |
  • Cloud Security Threats IT & Computer Science Essay
    Description: Cloud computing has emerged as one of the fundamental technologies in helping organizations attain the desired levels of business strategy. In this account, Amara, Zhiqui, & Ali (2017) state that cloud computing is vital in running modern-day organizations which are being driven by data...
    2 pages/≈550 words| 4 Sources | APA | IT & Computer Science | Essay |
  • CV for Network Security Engineer IT & Computer Science Resume Writing
    Description: Technically minded and resourceful professional with more than 15 years of experience in internet and security-related project management and implementation. Proven track record in managing and completing projects within the time which resulting in enhancing the operational efficiency...
    2 pages/≈550 words| No Sources | Other | IT & Computer Science | Resume Writing |
  • Network Design Report IT & Computer Science Essay Paper
    Description: A network connection is important for any business as it enables communication in the company. Networking encompasses wired and wireless networks that ensure that a company can communicate within and without. A network is used to send emails, access the internet, and even print and share...
    4 pages/≈1100 words| No Sources | APA | IT & Computer Science | Essay |
  • Understanding the Bootup Process and Partitioning in Linux System
    Description: Various steps take place during a Linux system bootup process. There are two types of processes that take place where one uses the BIOS while the other uses the more modern UEFI. BIOS stands for basic input/output system which manages and checks the integrity of the hard drives and runs...
    3 pages/≈825 words| 8 Sources | APA | IT & Computer Science | Essay |
  • Structured Query Language IT & Computer Science Coursework
    Description: Provide a listing of all suppliers who use a bank in San Francisco (hint: look at BankAccountBranch field). Display supplier ID, supplier name, bank account name and bank account branch. Show the companies in alphabetical order by name. Use Purchasing.Suppliers table. Record the number of rows in resulting...
    5 pages/≈1375 words| No Sources | APA | IT & Computer Science | Coursework |
  • Database IT & Computer Science Coursework Research
    Description: Requirement 5: (using a trigger and procedure): The system should use the trigger once delete procedure has been executed to insert a Log record to the Logs table. The logs table should be inserted the Doctor id, deleted message and date when the delete has been executed....
    1 page/≈275 words| 20 Sources | MLA | IT & Computer Science | Other (Not Listed) |
  • Web Analytics Methodologies & Tools IT & Computer Science Essay
    Description: Web analytics can be defined as the collection, measurement, reporting, and analysis of the web data with the aim of optimizing and comprehending the web usage. In addition, the web analytics are utilized to offer regarding the visitors who visited the website, and number of views per web page...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Survey Reseach on public opinions IT & Computer Science Research Paper
    Description: Survey research is known as a quantitative and qualitative technique with two appearances which are self-reports measurements done on variables of interest and sampling issues are considered (Schindler, 2020). Self-reports measurements are where survey researchers ask questions directly...
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
  • Generic Trademark IT & Computer Science Research Paper
    Description: The generic trademark is a term used as words or symbols that communicate the type of product being offered (Johnson, 2019). The terms ‘cellophane’, ‘aspirin’ and ‘thermos’ generic fell into common usage to represent the type of products that oppose certain company’s products...
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
  • Course Reflection IT & Computer Science Coursework
    Description: In this week's course, reflection is based on our central learning on information technology importance in strategic planning; a lot was learned and above all, the course was exciting and interactive. The course focuses majorly on the information technology leader’s collaborative roles...
    2 pages/≈550 words| 1 Source | APA | IT & Computer Science | Coursework |
  • Access controls models IT & Computer Science Research Paper
    Description: Access control topic is a wide chapter with useful information concerning information security and it and before looking at access control models, it has important concepts which are confidentiality, integrity, and availability of information (Conrad, Misenar & Feldman, 2016)....
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
  • Project Proposal IT & Computer Science Research Proposal
    Description: Due to advance in technology together joined with business environment changes, shows a great effect on general application security where they are becoming more predominant in public, government and corporate services in today environment (Othmane, Chehrazi, Bodden, Tsalovski & Brucker, 2017)...
    2 pages/≈550 words| 6 Sources | APA | IT & Computer Science | Research Proposal |
  • Linux Mail Server Security IT & Computer Science Research Paper
    Description: Operating systems have evolved over the years. Since of old, the Unix-based systems have proven difficult and cumbersome to use, especially with their user-unfriendliness interface. Most of them are command-line based, with operations limited to only root privileges. Windows Operating Systems have...
    8 pages/≈2200 words| 12 Sources | APA | IT & Computer Science | Research Paper |
  • The Internet It & Computer Science Essay Research Paper
    Description: The internet simply referred to as the ‘net’ means an interconnection of computer systems. The aim is to provide data, information, communication, and others. The information required is usually updated and stored online by computers known as servers. It is then retrieved by users when needed through...
    4 pages/≈1100 words| 3 Sources | APA | IT & Computer Science | Essay |
  • SQL IT & Computer Science Coursework Research Paper
    Description: SELECT instructor.dept_name,instructor.name,COUNT(instructor.ID) AS TOTAL FROM instructor INNER JOIN teaches ON instructor.ID=teaches.ID WHERE teaches.semester='Spring' AND teaches.year='2018' GROUP BY instructor.dept_name ORDER BY instructor.dept_name DESC;...
    9 pages/≈2475 words| No Sources | Other | IT & Computer Science | Coursework |
  • OPERATIONS MANAGEMENT AND SUPPLY CHAIN MANAGEMENT.
    Description: In the current century, there is an upsurge of industrial activity around the world. Companies and organizations dealing with different goods and services. ...
    7 pages/≈1925 words| 11 Sources | APA | IT & Computer Science | Research Paper |
  • Admission Essay. University of Illinois at Urbana-Champaign.
    Description: Whenever I used a computer application or played a video game, I wondered how these programs were coded. My desire to seek answers led me to join my school's computer science club, where I attended lectures and participated in programming contests. ...
    1 page/≈275 words| No Sources | Other | IT & Computer Science | Essay |
  • Social Implications of The Business of Piracy On Android Application
    Description: Piracy has always been the bane of any digital industry and in the age where people are engrossed on smartphones, it is inevitable that shadow of software piracy is there. According to Lending and Slaughter (1999), “Intellectual property is often the most valuable corporate asset in an increasingly...
    7 pages/≈1925 words| 20 Sources | APA | IT & Computer Science | Term Paper |
  • Excel Workbooks IT & Computer Science Article Paper
    Description: Workbook is a file in Microsoft Excel that consists of one or more spreadsheets which helps in solving easy and complex issues that need planning. For instance, one can create a workbook to analyze budgets. Spreadsheets consist of rows and columns which form a cell where one can input data...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Article |
  • Final Project Network Security Plan It & Computer Research Paper
    Description: Due to the recent security breaches in our Information Technology and Network Infrastructure, it has become necessary to examine and re-align our network in a manner that will harden it to intrusion and keep our information secure. Currently our network is designed in a flat manner ...
    7 pages/≈1925 words| 4 Sources | APA | IT & Computer Science | Research Paper |
  • Syse650 Exam Questions It & Computer Science Coursework
    Description: In systems engineering, Maintainability can be stated as the comparatively easiness and efficiency in time and energy that a system can withstand or reinstate to a particular circumstance by employing scheduled and unplanned maintenance. Maintenance is a task of architectural system design;...
    4 pages/≈1100 words| 2 Sources | APA | IT & Computer Science | Coursework |
  • Parents should limit teenagers’ use of Internet IT & Computer Essay
    Description: Widespread internet usage is a new phenomenon in modern societies across the world. Networked computers and handheld devices have dramatically transformed the way humans do business and exchange information. However, there are various emerging issues related to unlimited internet access ...
    4 pages/≈1100 words| 5 Sources | APA | IT & Computer Science | Essay |
  • IT System Recommendation It & Computer
    Description: Amazon Incorporation is a multinational technology company with its headquarters in Seattle. The company focuses on cloud computing, e-commerce, digital streaming, and artificial intelligence. Amazon is considered as one of the Big Five tech businesses in the United States alongside Facebook, Google, and ...
    1 page/≈275 words| 5 Sources | APA | IT & Computer Science | Term Paper |
  • IT Systems Recommendation: Amazon
    Description: Amazon Incorporation is a multinational technology company with its headquarters in Seattle. The company focuses on cloud computing, e-commerce, digital streaming, and artificial intelligence. Amazon is considered as one of the Big Five tech businesses in the United States alongside Facebook, Google, and ...
    1 page/≈275 words| 5 Sources | APA | IT & Computer Science | Term Paper |
  • Information Security IT & Computer Science Coursework
    Description: The Iconcepts Iof Iconfidentiality, Iintegrity Iand Iavailability Ioccur Ias Ikey Iprinciples Iof Idata Isecurity. IConfidentiality Iexamines Ithe Iprevention Iof Idata Idisclosure Ito Iunauthorized Isystems Ior Ipersons I(Gollmann, I2011). IFor Ian IATM, Ithe Itransaction Iwould Iinvolve Ithe Iphysical...
    6 pages/≈1650 words| 3 Sources | APA | IT & Computer Science | Coursework |
  • Cloud Computing IT & Computer Science Essay Research
    Description: My choice of sector is the Energy sector. This is because the energy sector is Singapore’s leading supplier of extensive variety of products, services and solutions for power generation, distribution as well as transmission. It is also involved in the production, conversion and transportation...
    6 pages/≈1650 words| 9 Sources | Harvard | IT & Computer Science | Essay |
  • Differences between Namespace and Folder IT & Computer Science Essay
    Description: Namespace root and folder in DFS are two interrelated concepts that usually allow the sharing of resources and files over a network. Despite the relationship between them, they play different roles in file sharing (Whitney et al., 1998). A namespace is a role that enables users to share folder...
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Challenges in Identifying and Documenting IT Acquisition
    Description: The challenging issues in identifying and documenting IT acquisition requirements continue to grow together with the increasingly important role software plays in supporting government and commercial enterprises, mission needs, and business. Software society has developed exclusive...
    2 pages/≈550 words| 4 Sources | APA | IT & Computer Science | Term Paper |
  • Cyber Infrastructure It & Computer Science Research
    Description: Organizations are always prone to common network vulnerabilities such as insecure ports, weak password encryption, poor firewall exploitation, and short of appropriate security policy. Due to this organizations and companies have developed cyber-security policy to manage the risk of security exposure...
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Other (Not Listed) |
  • XYZ case study IT & Computer Science Case Study Paper
    Description: XYZ is a small Internet Service Provider company that consists of twenty-five workstations and two multipurpose servers. All organization employees use e-mails and have internet access. About five employees work remotely from the field. In addition, the company comprises of 32 employees...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Case Study |
  • Business Reporting and Analytics IT & Computer Science Coursework
    Description: As indicated in the case study, DreamHome Company is a real-estate company with several branches. The company manages owner’s properties. The Company specializes in property management, by taking roles between clients and owners who wish to rent out their properties....
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Coursework |
  • Network configuration for Marlyland IT & Computer Science Coursework
    Description: As a network trainee, my supervisor has tasked me with ways of improving Mayberry satellite campus’ network. Hence this paper will include reviewing the existing network cabling and providing recommendations to improve the speed of the organization network....
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Coursework |
  • When Reliance on Computer Technology Stops IT & Computer Science Essay
    Description: When computers were first invented, their uses were basic and traditional. These included the simplistic input, storage, processing, and output of data for various purposes (Toyama, 2015). Recurrent innovations and reinventions led to the broadening of these functions to make computers indispensable...
    3 pages/≈825 words| 5 Sources | APA | IT & Computer Science | Essay |
  • Cyber Security Risk IT & Computer Science Essay Paper
    Description: Systems and underlying data are assets owned by the business. The information technology department comes in to support business in utilizing IT resources. Whenever a risk associated with systems or underlying data materializes, it is the business that suffers losses. The information technology department...
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Network Devices And The Osi Model It & Computer Science Essay
    Description: Communication between end user machines and servers is facilitated by a network that lies between them. There are various network devices that fall on different layers of the OSI model that are used to build the network. The devices play different roles on a network and it is the roles that tie them...
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
  • Digital Evidence Business Plan It & Computer Science Essay
    Description: Procurement of a system for purposes of running any business requires an elaborate business case. The documentation of the business case has to prove beyond reasonable doubt that the system to be purchased will make business better. Management only buys into the idea of investing when...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Mitigating Malware Risks It & Computer Science Essay
    Description: Malware attacks have becomes rampant in the recent past. There are various types of malware including Trojan horse, worms, viruses and ransomware. When an organization is attacked using malware, the controls put in place determine the impact of the attack. The organization in question had put in place ...
    1 page/≈275 words| No Sources | APA | IT & Computer Science | Essay |
  • Security Issue IT & Computer Science Research Paper
    Description: The prime objective of the research was to explore the cybersecurity concerns and potential risk factors that may have caused the public cloud-based storage data loss and leakage in Dropbox. In the research, we discussed the relevance/importance of conducting a study on the Dropbox data breach...
    5 pages/≈1375 words| 10 Sources | Harvard | IT & Computer Science | Research Paper |
  • SOFTWARE SECURITY. IT and Computer Science Essay.
    Description: Barely any other industry is experiencing changes as rapid as those observed in the software industry. For this reason, the rapid innovations raise some concerns on the trend of software security development....
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Essay |
  • IT Outsourcing. Problem Statement. IT & Computer Science Essay
    Description: Information Technology (IT) has, over the years, transformed from a relatively recognized cost-cutting tool to a critical strategic initiative for organizations that cut across industries and companies. ...
    1 page/≈275 words| 5 Sources | APA | IT & Computer Science | Essay |
  • The Digital Divide. IT and Computer Science Essay.
    Description: Application Security Outline Topic: Application Security Introduction Immergence of the internet and the possibilities that it has brought. Security concerns and vulnerabilities presented....
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Cloud computing. IT & Computer Science Research Paper
    Description: The study conducts an in-depth investigation on the importance of strategic implementation of cloud computing in business environments. Cloud computing is referred to as a type of service that grants users remote access to data and information from outside the work environment. ...
    7 pages/≈1925 words| 6 Sources | APA | IT & Computer Science | Research Paper |
  • HTML sample IT & Computer Science Research Paper Essay
    Description: Are you looking for research paper writing service or help with your PhD research? Get help from Academia Research on any topic from our experienced research paper writers.Our team of skilled writers delivers high quality, 100% original content within the shortest time in creative writing and writing...
    1 page/≈275 words| No Sources | APA | IT & Computer Science | Other (Not Listed) |
  • Network Security IT & Computer Science Research Paper
    Description: Network security refers activities or practices aimed at protecting the integrity and usability of the network and the data in it. This process of protection include the use of hardware and software devices technologies. An effectively managed network ensures a prompt access to information by the authorized...
    15 pages/≈4125 words| 3 Sources | APA | IT & Computer Science | Research Paper |
  • Introduction to Networking IT & Computer Science Term Paper
    Description: Computer networking refers to the connection of two or more computers aimed at enabling communication between them. Networks can be classified as either client-server network or peer-to-peer. In client-server topology, the computers send signals to the server asking for services such as an email ...
    3 pages/≈825 words| 4 Sources | APA | IT & Computer Science | Term Paper |
  • Seven National Cyber Security Strategies IT Research Paper
    Description: In any nation, the definition of cyberspace is not just the Internet and Information and communication technology (ICT). Cyberspace is a domain that any nation considers to be similar to other domains of land, air, sea and space but only that it has its own set of distinct characteristics and challenges...
    22 pages/≈6050 words| 5 Sources | APA | IT & Computer Science | Research Paper |
  • Benefits of Modern-day Software Analysis and Design to Businesses
    Description: The integration of information management systems has been leveraged as a source of competitive advantage for businesses in many industries. Companies initiate large-scale software development projects to improve efficiency in workflow among finance, production, marketing, human resource management...
    10 pages/≈2750 words| 7 Sources | MLA | IT & Computer Science | Term Paper |
  • Network Topology IT & Computer Science Term Paper
    Description: The star network topology would be the most appropriate network topology that should be implemented in this case. This topology is implemented on a Local Area Network that comprises of hubs, workstations and other networking devices, which are connected to single main computer...
    4 pages/≈1100 words| 3 Sources | APA | IT & Computer Science | Term Paper |
  • Technology Barriers and Education Instructions IT Research Paper
    Description: The article will examine and assess the influence that education technology has on the experience of all the stakeholders within the industry. In the process, discussing the perceived barriers to the adoption of information and communication technologies in the developed countries....
    4 pages/≈1100 words| 6 Sources | APA | IT & Computer Science | Research Paper |
  • J.P. Morgan Chase hacking case study IT & Computer Science Essay
    Description: The technological environment running the current business systems means that they are increasingly at risk of cyber attacks. Indeed, financial firms have suffered substantial losses because of hacking. Organizations, thus, have recognized the need to secure the systems to minimize...
    4 pages/≈1100 words| 4 Sources | APA | IT & Computer Science | Essay |
  • The Future of Cyber Warfare. IT & Computer Science Essay
    Description: Nowadays, military battles have changed due to the sophistication of weaponry. Earlier on, say during the First World War, the deadliest weapons included machine guns, tankers, and rifles. ...
    4 pages/≈1100 words| 4 Sources | APA | IT & Computer Science | Essay |
  • Social Media Impact in the Technological World IT Research Paper
    Description: The concept of social interaction in the world of technology has changed whereby news, materials and information travel from one part of the world to the other at a supersonic speed. The concept is propagated with the introduction of different platforms through social media and advancement...
    10 pages/≈2750 words| 10 Sources | MLA | IT & Computer Science | Research Paper |
  • Responding to Threats: Executive Summary IT & Computer Science Paper
    Description: Ransomware attacks occur of an organization lacks IAM control or the presence of system misconfigurations. The process of access control begins with identity management, which includes authorization, identification, and authentication (Toapanta et al. 639). Authorization represents the process...
    2 pages/≈550 words| 3 Sources | MLA | IT & Computer Science | Term Paper |
  • Cultural Probes IT & Computer Science Essay Research
    Description: Human-Computer Interaction (HCI) refers to a diverse field of study that focuses on computer technology design and particularly the interface between humans and machines. Cultural probes in human-computer interaction refer to a technique used to motivate the development of ideas ...
    2 pages/≈550 words| 3 Sources | MLA | IT & Computer Science | Essay |
  • Mysql data structure. IT & Computer Science Article
    Description: This paper defines creating a new SQL database and then creating the table in the database. We will study how to create a table in a database using MySQL command. The database will be based on the relational model....
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Article |
  • Database Management IT & Computer Science Research
    Description: Structured query language is used for communication in database as highlighted by Beaulieu (2009). It is the typical language for interactive database management structures. The system is made up of three constituents which include; data control language (DCL), data manipulation language...
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Other (Not Listed) |
  • The role that NAT plays in a network IT & Computer Science Essay
    Description: The role of NAT in networks is to restrict the number of IP addresses that organizations use since it is involved in the assigning of public addresses within a particular network. It also acts as a link between computers within the private network and the internet. When users within the network want...
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Virtual Reality IT & Computer Science Essay Research
    Description: Virtual Reality is regarded as a new technology that is highly influencing human life across the globe in different ways. The concept depicts the real world an artificial manner for the purposes of imparting skills that will be applied in the actual world of doing things. The concept review is based on...
    12 pages/≈3300 words| 11 Sources | APA | IT & Computer Science | Essay |
  • Email vs. texting /pros vs. cons IT & Computer Science Research Paper
    Description: Society has a way of shaping people. Individuals in a common environment or age tend to express similar feelings; they display similar characteristics. Individuals within a common culture tend to share equal values and characteristics. Communication plays a vital role in the way people relate with...
    5 pages/≈1375 words| 2 Sources | APA | IT & Computer Science | Research Paper |
  • Enterprise Network Security It & Computer Science Research Paper
    Description: Mergers and acquisitions are typically an extremely hectic procedure and they forestall different vulnerabilities that aggressors can exploit so as to access personal information illicitly. By undertaking a policy gap analysis, the organization can decide the policies offered by the obtaining organization...
    12 pages/≈3300 words| 8 Sources | APA | IT & Computer Science | Research Paper |
  • Internet and Social Media IT & Computer Science Essay
    Description: Social Media is associated with being a form related to electronic communication via which individuals create various online related communities with a chief aim of sharing information, personal release message, and ideas. (Strasburger 961) There are a variety of types of social media that exist...
    4 pages/≈1100 words| 5 Sources | MLA | IT & Computer Science | Essay |
  • Cryptocurrencies IT & Computer Science Research Paper
    Description: Block chains are shared and free to use ledger on which the Bitcoin cryptocurrency depends on. The block chain allows Bitcoin wallet to calculate their balance and allow for verification of new transactions. Many people have opted to investing in bitcoins since it considered secure, easy and fast....
    7 pages/≈1925 words| 7 Sources | APA | IT & Computer Science | Research Paper |
  • Computer Support and Maintenance IT & Computer Science Essay
    Description: Following your interest in the purchase of digital working material, I have researched and zeroed down to the most performing, cost-effective, and flexible machines suitable for presenting your duties. I have given proposals and specifications for each device you require and provided...
    2 pages/≈550 words| 7 Sources | Harvard | IT & Computer Science | Essay |
  • First Experience with a computer IT & Computer Science Essay
    Description: At first before I used a computer, I never had a guess or expectation of the experience. I was certain that I had Techno-phobia. Everyone was excited and was ready to indulge into the use. On the other hand I was interested though a bit scared to start using a computer. I had no clue or hint of operating...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • IT/WEB Class Exercise IT & Computer Science Research
    Description: Rainbow tables are a group of tables where hashes and their corresponding password values are already pre-computed. Simply put, they are used by hackers to crack passwords. It is becoming a common practice in the computing platform to store passwords as hashed values, which makes it relatively harder...
    2 pages/≈550 words| No Sources | APA | IT & Computer Science | Other (Not Listed) |
  • Technology IT & Computer Science Research Proposal
    Description: In the 21st century, one of the things that has made strides to keep up with the rapidly evolving technology is security and privacy. People have embraced modern technology with a large percentile of people having access to the internet. Even so, many people have no education on all the breeches...
    8 pages/≈2200 words| 4 Sources | APA | IT & Computer Science | Research Proposal |
  • Information security IT & Computer Science Essay Paper
    Description: Most of the traditional cultures often raised their teens with morals which described to children whatever was right or wrong in the society. Nonetheless, modern Christian parenting is encountering hard moments of inducing morals in their children. The inception of current technology...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Vulnerability Report IT & Computer Science Essay Paper
    Description: ABC manufacturing has hired me to identify security vulnerabilities, provie recommendations and implement approved changes. I have been provided with access to the company’s server networking environment. Nonetheless, after opening the server, the technician was not familiar with the firewall appliance...
    3 pages/≈825 words| No Sources | APA | IT & Computer Science | Essay |
  • Cyber-crime IT & Computer Science Essay Coursework
    Description: A significant number of terrorist attacks over the past two decades have led to increased research, action, and concern against rebellion within the country’s cyberspace (Coats 4). As society engages in a paradigm shift to more dependency on technology, the risk posed to nations by terrorists is not only...
    2 pages/≈550 words| 2 Sources | MLA | IT & Computer Science | Essay |
  • IT. What is a database join and why is it important? Coursework
    Description: In order to understand what a database join is, there is a need to understand what a database and database table means first. A database is a collection of accessible data....
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Coursework |
  • Law Firm Case Management and Allocation System IT Research Proposal
    Description: The main aim of the project is to create a system where by a head of a law firm (that has numerous advocates) can add, edit information suspend and delete advocates. The system will also have capabilities to add edit and delete law cases they are being handled by that particular firm. The system...
    4 pages/≈1100 words| No Sources | APA | IT & Computer Science | Research Proposal |
  • Web Page Replication It & Computer Science Paper Essay
    Description: Assigned the Display:grid property to the records class and set the grid-column-template property to repeat three times hence showing the reports 2 on each column with each record occupying 1 fractional unit of the total size,with grid-spaced 30px apart....
    1 page/≈275 words| No Sources | Other | IT & Computer Science | Other (Not Listed) |
  • Research Proposal: Gender Gap in Computer Science Research Proposal
    Description: The ACM (Association for Computing Machinery) has identified computer science as the field with the most evident problem of gender gap, specifically the under representation of women. Computer Science is affected by a long history of male dominance. Computer Science and technologies...
    4 pages/≈1100 words| 5 Sources | APA | IT & Computer Science | Research Proposal |
  • Securing Computer of a Dismissed Person IT & Computer Science Essay
    Description: Employee separations or dismissal create critical conditions for IT departments. Although most of the IT experts concentrate on external threats, insiders usually pose the most serious threat to computer security. Dismissal may even sour a model employee’s opinion about the organization...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Information System Infrastructure IT & Computer Science Research Paper
    Description: The purpose of this paper is to research about evolution and trends of information system infrastructure. The information system infrastructure has advanced from the mainframe era to the client-server era and distributed component era. Its rapid growth can be credited to the development of IS architecture...
    10 pages/≈2750 words| 10 Sources | APA | IT & Computer Science | Research Paper |
  • Privacy and Information Security IT & Computer Science Research Paper
    Description: Both the privacy and information security have positive impact on cyber safety. However, the two have differences. Privacy refers to any rights a person have to control personal information and how it is used. On the other hand, security refers to how personal information is protected. ...
    2 pages/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
first ... 3 | 4 | 5 | ... last
Need a Custom Essay Written?
First time 15% Discount!