It Research Essays

Search to find a specific it research essay:

Back to Essays Index

Vision 2020 in Malaysia - An Analysis

Abstraction To achieve a vision during a long time is very difficult because it needs a lot of means and also people's consent in order to...

Computer-aided learning within education

CAL stand for Computer Aided Learning and in many cases referred to as Computer Aided Instruction as well [Bachman, 1998]. An in depth review of the...

Project failure in the software industry

Introduction: Project failure is a common thing heard in the Software Industry in recent years. It has been observed that almost 50% of the projects in...

Round-trip time (rtt)

RTT: Round-Trip Time (RTT) can also be called as round-trip delay. It is to calculate how much time required for sending a packet or signal...

Rapid growth of technology

EXECUTIVE SUMMARY In the current season, the rapid growth of technology, communication and especially the large volume of information have led many companies...

Software piracy: An overview

SOFTWARE PIRACY IN AFRICA Software piracy is a combination of two different words which are software and piracy. Software can be defined as generic term for computer...

HP computer systems organization

1. Is this the time for HP-CSO to institute more changes? Based on the customer and sales audit it was identified that considerable opportunities...

TCP/IP network protocol

1. SYNOPSIS This report examines TCP/IP being used all over the world as a robust transmission protocol for networks. Robust transmission protocol is a protocol or...

Assembling personal computer’s hardware and software

Assembling the Personal Computer Firstly, you will assemble the case. You will need to install the power supply, the motherboard, Graphic card, Microprocessor, Main Memory, Hard...

Samsung semiconductors

Introduction Samsung Semiconductors is a leader in semiconductor electronics worldwide. Samsung Semiconductors is a leader in electronic components like DRAM and SRAM memory chips, flash memory...

Hacking; dangerous effects on the society

Abstract Hacking is just like a cancer that has very dangerous effects on the society. Today in this modern world, where measures have been taken to...

IT Essay: Man and Machine, I wonder if we can coexist

In John Durkin (2003)'s article Man & Machine: I wonder if we can coexist, Durkin speculates on the ability of a possible coexistence between human...

Modelling and simulation using opnet modeller 14.5

4.1 Overview The aim of this chapter is to illustrate the modelling and simulation, using OPNET Modeller 14.5-Education version for the autonomic wireless network management....

Measure the reusability of object oriented interfaces in uml diagrams

I. INTRODUCTION In recent years, computer software is the single most important technology in the world. Software developers have continually attempted to develop new technologies...

IT Essay: National ID cards Ethical issues

National ID cards have long been advocated as a means to enhance national security, unmask potential terrorists, and guard against illegal immigrants. They are in...

Decision support systems

Abstract Nowadays, Decision Support Systems has a significant role in almost all areas of life. These systems go further and use new technologies like data mining...

E-voting system

CHAPTER 1: INTRODUCTION Introduction Motivation Objectives The aim of this project is to design an e-voting system that makes use of Java and Bluetooth technologies. The specific objectives of...

Software testing

1.0 Software Testing Activities We start testing activities from the first phase of the software development life cycle. We may generate test cases from the SRS...

Exploratory research

Exploratory Exploratory research is usually carried out when problem is not well identified or it has not been visibly defined as yet, or its real scale...

System analysis

4.1 Introduction System analysis is a major activity which takes place when we are structure a latest system or changing one. Analysis will help us to...

Risk management in project development

Risk Management In Software development Abstract: Risks are always associated with any kind of project development. It is important to identify and control...

The importance of enterprise computing to enhance business performance

Introduction Nowadays Information technology has a rapid growth. Almost every day there are new ideas to improve the performance of technology. It cannot be...

New century health clinic

Background Five years ago, cardiologists Timothy Jones and Dolores Garcia decided to combine their individual practices in Fullerton, California, to form the New Century Health Clinic....

E-commerce website

Introduction This document consists of a project designed to construct an E-Commerce website for a mobile phone store. Using different methodologies this report will explain in...

IT Essay: Information Technology Outsourcing

Introduction Information Technology Outsourcing (ITO) will continue to have a major impact on all organizations and will over time increasingly becomes an integral part of the...

Software engineering principles

Chapter 1 "Software is a great combination between artistry and engineering. When you finally get done and get to appreciate what you have done it is...

Perceived risk

Abstract The purpose of this research is to investigate whether a consumer's perception of risk in transacting on the internet (Perceived Risk) would have an influence...

Intrusion detection system for internet

ABSTRACT The visibility to detect the rapid growth of Internet attacks becomes an important issue in network security. Intrusion detection system (IDS) acts as necessary complement...

Data flow diagram

Data Flow Diagram DFD is a system modeling tool, the most popular and important representations in data flow modeling. DFD allows us to picture a...

Tisco (tata iron and steel company limited)

1. Introduction TISCO (Tata Iron and Steel Company Limited) is the world's sixth largest steel company which was established by Indian businessman Jamshetji Nusserwanji Tata in...

Visual cryptography

Introduction One of the popular solutions for image encryption is visual cryptography. Secret sharing concepts are used to encrypt a secret image into the...

Research proposal

Introduction The research proposal you are about to read is constructed in order to describe the research project I will execute. I will execute this research...

Importance of information systems

Abstract: The following paper explains the importance of information systems in E-business and the limitations of information systems on the E-business. The report explicates different information...

Sustainable information security policy in an organization

Introduction The purpose of this research paper is to investigate how organizations design sustainable information security policies. Designing a sustainable information security policy is one of...

Skype; communication tool

Introduction of Skype (voice unified communication) Skype is the most popular communication tool service in the world. The skype service comes with application software and...