Redundant Arrays of Inexpensive Disks (RAID) Analysis

07 Aug 2017 20 Sep 2017

4 (1,415 )

Piriharan Karthigesan Question Describe the various versions of RAID, and which type you would use to obtain the maximum redundancy and security, without sacrificing speed of access to data. What is a RAID? Redundant Arrays of Inexpensive Disks. In single word "RAIDS" can be known as a disk which provides data's storage in many different disks. RAID 0 In RAID 0 the data ...

Click here to read more arrow

Critical Elements of User Experience Design

07 Aug 2017 20 Sep 2017

19 (7,376 )

Prof. Michael Weyrich, Tobias Jung, Zeller Christian Zange Hossain Mohammad Faysal Ebna Hossain Critical Elements of User Experience Design as a Success Factor for Virtual Working Spaces in the Digital Enterprise Basis   Thesis No: Type: Class of Process Model: Student: Supervisor: Begin: ...

Click here to read more arrow

Zerto Technology Company Analysis

07 Aug 2017 20 Sep 2017

4 (1,265 )

Bishal Shrestha Project management Risk and Reliability Zerto is the company which provides disaster recovery software for virtualized infrastructure and the cloud. In 2011 at VMworld Awards The main product of Zerto Zerto Virtual Replication won "Best in Show". Zerto company was founded in 2009, which was held privately funded by the Battery Ventures, U.S. Venture Partners and Greylock. Oded Kedem and Ziv who ...

Click here to read more arrow

Ethics in Data and Web Mining

07 Aug 2017 20 Sep 2017

6 (2,314 )

Liliam Faraon What is the importance of ethics in Data Mining? We live in a time when the pursuit of knowledge is indispensable. From the transformations we have witnessed in the past years, we can acknowledge that information assumes a growing importance and a requirement for any sector of human activity. Some authors say that 90% of all data in the world has been generated ...

Click here to read more arrow

Data Security Policy Analysis

07 Aug 2017 20 Sep 2017

5 (1,609 )

Dylan Mc Grath  The reason for having a policy: The reason for having the policy is so that the workers at ACME LEARNING Ltd know what to do when they are assessing the personal data of the customers and how they will use the data. A Brief explanation of the company's obligations under the law: There is one main legislation which the company has to ...

Click here to read more arrow

Creating an Efficient IT Infrastructure

07 Aug 2017 20 Sep 2017

4 (1,255 )

Richard Lecator 1 Business Requirements 1.1 Project Overview Since the firm works on web analytics and effective qualitative reportage. The project assist of software used by the firm that enables it to have high quality, data collection that is very effective that starts in minutes without any necessity of additional programming. 1.2Background including current process The company is known for its dominant role in the ...

Click here to read more arrow

Protection Against Cyber Attacks

07 Aug 2017 20 Sep 2017

3 (1,057 )

Joshua Smeal "Here's something to think about. It is reported that roughly 80 million to 90 million cyber-attacks occur each year, which breaks down to about 400 new attacks every single minute. The sad part of that statistic? Over 70% of these recurring attacks go unnoticed!" People don't quite understand the risks that come along with using a computer in their daily lives. There are ...

Click here to read more arrow

File Systems and Permissions Summary

07 Aug 2017 20 Sep 2017

4 (1,274 )

John David Woody chmod -rwxr-xr-1 instruct staff 270311 Aug 11 2009 install.sh I will attempt explain the best I can. Chmod, on linux or unix like operating systems, there are a set of rules for each file which defines who can access that file and how they can access it. The ' - ' at position 0 denotes the type of file, it ...

Click here to read more arrow

Using Data Wrangling and Gemms for Metadata Management

07 Aug 2017 20 Sep 2017

5 (1,708 )

Sharan Narke , Dr. Simon Caton Abstract-Data lakes are gestated as to be a unified data repository for an enterprise to store data without subjecting that data to any of the constraints while it is being dumped in to the repository. The main idea of this paper is to explain about the different processes involving curating of data in the data lake which facilitates and ...

Click here to read more arrow

Information Systems Capstone

07 Aug 2017 20 Sep 2017

4 (1,388 )

Richard Lecator The organization is proud to be able to review and enter into a partnership with its customers in the goal of overhauling the company visibility. This visibility will be done in hopes to increase brand awareness while increasing the residential customer base and the industrial IT services. Through the improved visual appearance of the company assets the brand will become known for its ...

Click here to read more arrow

Technology and Social Issues in Africa

07 Aug 2017 20 Sep 2017

14 (5,343 )

Nigel McKelvey  For many in the western world, the perception of Africa is one of starving children and war torn countries. But 21st century Africa is a continent that is attempting to dispel the old imagery and is ready to compete with the rest of the world when it comes to embracing technology. The major success of the mobile phone industry has revolutionised how the ...

Click here to read more arrow

Influence of IT on Organisational Behaviour

07 Aug 2017 20 Sep 2017

2 (695 )

The Influence of IT on organisational behaviour Carr (2003) concludes that Information Technology (IT) has become the backbone of commerce and that IT empower companies to serve their customers better. IT can alter the basic nature of an industry (Luftman et al., 1993), and rightly so; IT has forever changed the world that we inhabit. With the use of computers and software, IT has altered ...

Click here to read more arrow

Preventing Cyber Breaches

07 Aug 2017 20 Sep 2017

5 (1,664 )

Jacob Malone The digital universe is growing at an astonishing 40% every year. With this kind of growth cyber security is more import today than any time in history. "Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access" (Rouse, 2016). In 2015 the global cybersecurity market hit $75B and is expected ...

Click here to read more arrow

Techniques and Types of Jailbreak

07 Aug 2017 20 Sep 2017

7 (2,561 )

Mohammad Alfaifi Apple is a global company that produces devices such as iPhone, iPad, and iMac. Actually, it is specializing in Software and they have a system called IOS. With the technology evolution, hackers have advanced and find vulnerability in Apple software that allowed breaking the system. This way called jailbreak. This project includes a general review about jailbreak and the way it ...

Click here to read more arrow

Implementing an Attendance System in 3AAA

07 Aug 2017 20 Sep 2017

13 (5,147 )

Henry Brown Carry out a systems investigation on implementing an attendance system in 3AAA: Brief: Pyus Pyxidis have taken on a project to investigate the possible attendance systems to be used by 3AAA academy staff. The investigation should allow myself as an employee of PP, to research possible service providers, programs and ways of implementing a new attendance system for 3AAA. What is currently ...

Click here to read more arrow

Strategies for Password Cracking

02 Aug 2017 20 Sep 2017

8 (3,149 )

Abdulmalik Nasser   The aim of my project is to give ICT students an idea of the mechanism of cracking password using an using John the ripper. I will also explain the process that the application does to crack a password. Moreover,I will talk about password complexity. how does the complexity increase the cracking time? are there intractable passwords? why? encryptions . Finally , I will ...

Click here to read more arrow

Roles of Windows Server 2012

02 Aug 2017 20 Sep 2017

4 (1,342 )

Margaret Webb Edition Idea for High level feature-comparison Licensing Model Memory Limits Foundation Costs-efficient all around server Essential server functionality without virtualization rights Server (Limited to 15 users) 32 GB Ram Essentials Environments in small ...

Click here to read more arrow

IT Professional: Legal, Ethical and Professional Principles

02 Aug 2017 20 Sep 2017

6 (2,246 )

VISHALDEEP Assessment Task Scenario    Aroha Memorial Headstones Inc. is a local manufacturer of personalized memorials and headstones Auckland and Nation-wide. This is a family owned and operated business offering dependable quality, value and service. Their clients mostly come from Northland, Waikato, the Bay of Plenty areas and the pacific islands. Aroha's office at Manure WA has five computers, a server and two printers. They ...

Click here to read more arrow

Programming for BIG Data Project

02 Aug 2017 20 Sep 2017

11 (4,133 )

Liliam Faraon Nowadays, the amount of data generated and stored without an operation has exceeded a data analysis capability without the use of automated analysis techniques. The exponential growth of data is greater than it has ever been seen, extracting useful information from all the data generated and transform it into understandable and usable information is the challenge. There is where data mining assumes an ...

Click here to read more arrow

Creation of a Theatre Booking System

02 Aug 2017 20 Sep 2017

14 (5,480 )

Emmett Harkin Cathal Murray Conor McCallion Bebito Jacob The problem brief which we have decided as a group is the Theatre booking system. The problem is that the theatre wants to develop a new ticketing system for the customers. This system can be a terminal located in the theatre, mobile application, or interactive device. The system needs to consider how information relating to events, ...

Click here to read more arrow

Technology Disaster Recovery Plan

02 Aug 2017 20 Sep 2017

5 (1,768 )

 Jacob Malone Disaster Recovery-As-A-Service Companies are starting to rely more on technology for their critical operations, data protection, and the availability of their systems. As a result companies or providers are offering new solutions and services in order to make IT disaster recovery cheaper and stress-free. With so many options available for Disaster-Recovery-as-a-Service it can be difficult to determine what your business actually needs. The ...

Click here to read more arrow

Online Course for Phishing

02 Aug 2017 20 Sep 2017

8 (2,901 )

Ahmed Hassan Al-Asmari Applied Phishing PROJECT in TI-ANS-ANS-TTC The report aims to provide an online course for Social engineering (phishing) for TTC students. The proposed course is designed based on the approach of research based learning. Proposed design of the circuit is supported by the theory. The report aims to provide an online course for "ICT" department. The expected result is to provide a ...

Click here to read more arrow

Definition of SETS, Union, Intersection and Complement

02 Aug 2017 20 Sep 2017

4 (1,271 )

Benjamin Quarshie Section A - Assignment Information Set Theory Explain the following terms:     SETS The word "set" is generally associated with the idea of grouping objects, such as a set of records, books, crop plants and other words such as herd, herd, herd, plots, peasantry, family, etc. Saying the word set denotes a collection of elements clearly between them, which ...

Click here to read more arrow

Improving Patient Engagement and Satisfaction in Health IT

02 Aug 2017 20 Sep 2017

2 (635 )

Sion Davoudi  According to Buntin et al, Health information technology (HIT) has the potential to improve the health of individuals and the performance of providers, yielding improved quality, cost savings, and greater engagement by patients in their own health care (Buntin et al, 2011). In addition to the countless business benefits, HIT really shines when it comes to patient outcome, satisfaction, and engagement. A relatively ...

Click here to read more arrow

Communication Skills and Ethical Practice in IT Service

02 Aug 2017 20 Sep 2017

10 (3,865 )

Harpreet Singh TASK 1 Definition of Intra and Interpersonal Communication. INTRAPERSONAL COMMUNICATION It has taken place within a single person who observes the situation and creates ideas. For example, there is the ongoing case in a court two lawyer protect their clients by arguing with each other and the judge is the person who is observing the situation and take the ...

Click here to read more arrow

Medical Card System Data Warehouse

02 Aug 2017 20 Sep 2017

12 (4,471 )

Muhammad Nadeem  S.No Title P.No 1 Introduction (What project is about) 3-4 2 System Overview, Data architecture and storage, 5-6 3 ER-Diagram, OLTP-Architecture,Master / Slave Medical Card System 6-10 ...

Click here to read more arrow

Social Media and Network Security

02 Aug 2017 20 Sep 2017

7 (2,637 )

Mohammad I. Khan GMU Honor Code statement: "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code-2/ and as stated, I as a student member of the George Mason University community pledge not to cheat, plagiarize, steal, or lie in matters related to academic work. In addition, I have received permission from the copyright ...

Click here to read more arrow

Role of Disk Formatting in IT Security

02 Aug 2017 20 Sep 2017

4 (1,447 )

Jay Kybert Security is becoming increasingly more important as the internet allows for data to be shared and received instantly, this is why lots of operating systems have pre-installed security software. A utility program, like Windows Defender, provides a good level of security against potential threats from the network. Windows Defender acts as a barrier between the computer and the network it's connected to. These ...

Click here to read more arrow

Development of a Free Source for Internet

02 Aug 2017 20 Sep 2017

3 (1,167 )

Ebrahim Ali Otaif Suggestion for a free source for Internet for TTC The project aims to provide a new way to give the internet for Technical Trainers College for free and design it and build it for them. The data will be collected from the research websites and finished the survey in these websites. The target group of my project is the poor students in ...

Click here to read more arrow

Anti-Spam and Anti-Malware Protection in Exchange 2013

02 Aug 2017 20 Sep 2017

2 (673 )

Siddiq Mohammed Siddiq Aburuzayzah Abstract : This article show what are anti spam and anti malware not been changed sins version  2007 ,  2010 and 2013 Introduction : The Exchange 2003 built in Open Relay Filter or Real time Black hole List capabilities and DNS Blacklist And supplemented later Microsoft Exchange smart Message Filter ( IMF ) And to provide Protection of the highest and ...

Click here to read more arrow

Case Study: Application Architecture

02 Aug 2017 20 Sep 2017

4 (1,383 )

Brian Jerozal  For any given organization, it is vitally important to always ensure that the payroll system is designed in such a way that overall effectiveness in enhanced. Traditionally, payroll systems were not quite complicated since employees were more or less few in number. However, the modern-day payroll systems have to take into consideration numerous aspects such as insurance cover, house allowances, bonuses, advance payments ...

Click here to read more arrow

Application Survey on Data Mining and Data Warehousing

02 Aug 2017 20 Sep 2017

7 (2,532 )

 Aishwarya.R Survey Report on Bank-Loan Risk Prediction Introduction Data Mining has been the most explored topic for the past decade and has given rise to several new enhancements and techniques in several industries. One such mind provoking arena of high interest is Credit Risk analysis or simply the Bank-loan risk prediction. It has been a pressing need for several banks these days ...

Click here to read more arrow

American Public University System Characteristics

02 Aug 2017 20 Sep 2017

5 (1,840 )

Delainah E. Borgonia StarTeam StarTeam is a change management system that was developed by a company named Micro Focus. The system's main intent is to support an enterprise that can service anyone, no matter where they are located. This system is mainly used in my organization as a software development tracking tool that allows you to track the software development lifecycle through the ...

Click here to read more arrow

Human Resources Culture Makes for Top Employer

02 Aug 2017 20 Sep 2017

5 (1,638 )

Vincent M. Mendez In 1966 at the North Carolina State University (NCSU), individuals from eight other universities where brought together by the National Institute of Health (NIH). The purpose of this group of individuals was to develop software to analyze data being developed by the United States Department of Agriculture (USDA). The original product was identified as Statistical Analysis System (SAS). This gave way to ...

Click here to read more arrow

Constructing Social Knowledge Graph from Twitter Data

02 Aug 2017 20 Sep 2017

17 (6,784 )

 Yue Han Loke 1.1 Introduction The current era of technology allows its users to post and share their thoughts, images, and content via networks through different forms of applications and websites such as Twitter, Facebook and Instagram. With the emerging of social media in our daily lives and it is becoming a norm for the current generation to share data, researchers are starting to perform ...

Click here to read more arrow

Creating a WAN Diagram

02 Aug 2017 20 Sep 2017

5 (1,860 )

BY: JAN AVIT MICOLH MATUGAS "Creating WAN Diagram" a) Create a WAN diagram detailing and labeling all components of a WAN network according to the scenario (network devices, computers and server's configurations). Every branch must have their own IP range. Figure 1 Actual Diagram of Wellington being connected to its all branches Figure 2. Actual Diagram of Wellington Main Office Figure ...

Click here to read more arrow

Statistics and Overview of Phishing Attacks

02 Aug 2017 20 Sep 2017

9 (3,510 )

Mansour Aljedani Is a form of criminal conduct which constitutes a growing threat to user's financial institutions, and businesses, internet users and social media. Because it does not appear that the risks and damage to phishing in decline in but on the contrary it is becoming increasingly complex, the implementation of the law and government agencies and the private sector at the global level - ...

Click here to read more arrow

Creation of a Versatile Computer System: CPU and RAM

02 Aug 2017 20 Sep 2017

6 (2,337 )

Jay Kybert I have tried to create a versatile computer system that everyone can use, with a few exceptions. The CPU, RAM, Motherboard, etc. remains the same throughout each system, however certain people require different inputs, outputs etc. In these cases, I have changed the computer system slightly and recorded the price. Link to website used: https://uk.pcpartpicker.com/list/dG7cBP All prices were accurate at the time this ...

Click here to read more arrow

Modern Day Technology Overview

27 Jul 2017 20 Sep 2017

4 (1,567 )

Misty F. Brown   Consumerization of IT Progresses in cell phone technology, operating frameworks, security, and applications can to a great extent be credited with beginning the movement known as consumerization of IT, or (CoIT). Despite the fact that consumerization is regularly connected with the capacity to use one's by and by possessed cell phone for business utilize, it goes past that to incorporate the utilization ...

Click here to read more arrow

Review of Data Duplication Methods

27 Jul 2017 20 Sep 2017

13 (5,081 )

Mandeep Singh Abstract: -The cloud storage services are used to store intermediate and persistent data generated from various resources including servers and IoT based networks. The outcome of such developments is that the data gets duplicated and gets replicated rapidly especially when large numbers of cloud users are working in a collaborative environment to solve large scale problems in geo-distributed networks. The data gets prone ...

Click here to read more arrow

Summary and Perspective on Why Privacy Matters

27 Jul 2017 20 Sep 2017

5 (1,650 )

Adam L. Haller Abstract This paper will summarize and give opinion based reactions to the TED Talks video by Glenn Greenwald titled Why privacy matters. The talk is based around why privacy is important, and examines revelations by whistle blower Edward Snowden and comments by CEO's of large internet based companies and the impact surveillance can have on privacy and people's actions in general. Keywords: ...

Click here to read more arrow

Comparison of AWS and Rackspace SLA's

27 Jul 2017 20 Sep 2017

2 (739 )

Name: Amulya Gajanan Dudhal Introduction: Amazon Web Services (AWS) and Rackspace are the two-leading public cloud service providers of the 21st century. The service level agreement laid down by these companies describes the level of service that can be expected by the user from the cloud service provider. The intention of a service level agreement is to let know the user what he/she will receive ...

Click here to read more arrow

Wireless Sensor Chip to Protect Wildlife

27 Jul 2017 20 Sep 2017

2 (783 )

Name : Boyu Yao Summary The basic motivation of implanting the wireless sensor on different animals is that they are illegally being poached killed and smuggled or traded for the medicinal purposes while the authorities have not been completely able to stop this issues. The wireless sensor networks would be developed to cater this issue in which sensors would be implanted in animal that would ...

Click here to read more arrow

Object Oriented Technology in Software Design

27 Jul 2017 20 Sep 2017

6 (2,138 )

Jose E. Laguardia Abstract This research paper explains the concepts of Object-oriented technologies. Explores the evolution of Object-oriented programming languages, from their introduction in the 1960s to languages that are still relevant today. It compares Object-oriented programming languages with Procedural programming languages and their structures. Explaining the advantages and disadvantages of using an Object-oriented programming approach over a Procedural programming approach. Supports why Object-oriented programming ...

Click here to read more arrow

Cybercare Work Placement Review

27 Jul 2017 20 Sep 2017

13 (4,947 )

Ignacio Fernández De Arroyabe The work placement for this module, Work Related Module II, was at Cybercare UK. From October 2016, I have been developing this activity. Cybercare UK is an organisation in London, which offers "one-stop-shop" to support victims of cyber crimes. The goal of the organisation is to assist victims of cyber crimes in detecting and protecting themselves. In fact, the aims of ...

Click here to read more arrow

Computer Network Fundamentals

27 Jul 2017 20 Sep 2017

7 (2,654 )

Harpreet Singh  Elements of computer communication. Computer Communication plays vital role to connecting two different devices and share the common information with each other and this information can be anything like text or video. To communicate from one computer to other it required some essential elements i.e. sender, receiver, medium, message and protocol. The Main parts or components of Data communication system are ...

Click here to read more arrow

Data storage in Big Data Context: A Survey

27 Jul 2017 20 Sep 2017

10 (3,607 )

Data storage in Big Data Context: A Survey A.ELomari, A.MAIZATE*, L.Hassouni# RITM-ESTC / CED-ENSEM, University Hassan II Abstract- As data volumes to be processed in all domains; scientific, professional, social …etc., are increasing at a high speed, their management and storage raises more and more challenges. The emergence of highly scalable infrastructures has contributed to the evolution of storage management technologies. However, numerous ...

Click here to read more arrow

Principles Of Software Development

27 Jul 2017 20 Sep 2017

3 (1,072 )

Gagandeep Singh  (a) Different types of number system:- 1 binary - The binary number system can be represented by 2 digits (0 and 1) . all the data of our computer is in the form of binary numbers. Binary number is mostly used in  electronic circuit to check there voltages (i.e., on/off switch)  where 0 consider when switch is off and 1 when switch is ...

Click here to read more arrow

Forensic Analysis of Personal Data Leakage on Android Phone

27 Jul 2017 20 Sep 2017

12 (4,639 )

Sheriff Drammeh   RESEARCH STATEMENT The proposed research will explore personal data leakage on the android mobile application platform through forensic analysis of volatile and non-volatile memory. PROPOSAL SUMMARY The proposed research will employ both volatile memory forensic techniques and traditional disk forensic techniques to the android platform in order to identify privacy breaches primarily in android mobile applications [1]. The proposed research also ...

Click here to read more arrow

Ethics of Data Breaches

27 Jul 2017 20 Sep 2017

5 (1,852 )

  Mohammed Shahed Ali 1. The Analysis Alex Holden, originator of the Wisconsin-based security firm, understood for getting hordes of stolen data from the hacking black market pronounced that it had actuated a fraudster to give them a database of 272m remarkable email addresses with the passwords buyers use to sign into destinations. It is one of the greatest supplies of stolen qualifications to be ...

Click here to read more arrow

Information Systems Capstone

27 Jul 2017 20 Sep 2017

4 (1,253 )

Richard Lecator  Background information of the Company The company is known for its dominant role in the collection and analysis of data. The firm has been operational for a duration almost equaling two years and has a total of approximate 20 employees, where four have been delegated to the IT department. Due to the rampant growth that has been exhibited by the firm, pundits predict ...

Click here to read more arrow

Soft System Methodology

27 Jul 2017 20 Sep 2017

12 (4,436 )

Andrzej Werner  Soft System Methodology can be described as a 7-step process aimed to help provide a solution to real life problematic situation caused by two different perceptions by implementing defensible and sensible models for comparison with the situation in real life in order to assist in making decisions or recommendations as to the solution or response for the problem. Those models are referred to ...

Click here to read more arrow

Procedure Oriented Programming

27 Jul 2017 20 Sep 2017

14 (5,376 )

 Submitted by: Gagandeep Singh Brar  Procedure oriented programming is a set of functions. In this program Clanguage is used. To perform any particular task, set of function are compulsory. For example , a program may involve collecting data from user, performing some kind of calculation on that data and printing the data on screen when is requested. Calculating, reading or printing can be written in ...

Click here to read more arrow

Requirements Engineering and the Agile Approach

27 Jul 2017 20 Sep 2017

6 (2,120 )

Yangqing Lu    With the evolution of Project Management (PM) methodology, Requirements Engineering (PE) has experienced huge change, especially when Agile is adopted by projects increasingly. However, no matter how the PM approach develops, the importance of PE is unshakable. Based on the Qualitative Research Approach, three articles has been viewed to introduce requirements issues regarding requirement elicitation,  consensus, prioritization, user story. In the first ...

Click here to read more arrow

Customer Service and Organisational Effectiveness

27 Jul 2017 20 Sep 2017

5 (1,651 )

Treacys West County Hotel 1. The West County Hotel was originally built in Ennis by the Lynch family in the late 1960s. It was taken over by Waterford based Treacys Hotel Group in 2013. It remains one of the most popular, well established iconic hotels in Ennis.  It fights off all competition from a number of hotels in the town by offering an ...

Click here to read more arrow

Analytics, Interfaces, and Cloud Technology

27 Jul 2017 20 Sep 2017

4 (1,515 )

Richard Lecator The organization is like any other business that greatly benefit from an infusion of efficiency and cost savings into its operations. Having a much easier business environment from which to operate on is a significant advantage that will lead to improved output and better service to its clients. Embracing the latest technology will not only propel the business to the modern way of ...

Click here to read more arrow

Object Oriented and Modelling Concepts - Car Parking

27 Jul 2017 20 Sep 2017

5 (1,693 )

Akila Kanishka Gangodage  At the present time parking is the major requirement of the people. And also there are limited spaces to park vehicles in the city area. Therefore car park systems should have proper management system to control the day to day activities. People's time is very valuable their time can't be wasted. People can't spend lot of time in the car park to ...

Click here to read more arrow

Applications of CAPTCHA

27 Jul 2017 20 Sep 2017

4 (1,539 )

Ramteen Talib CAPTCHA is a powerful tool Qingkun Ramteen Talib A CAPTCHA or Captcha is a type of challenge-response test used in to computing o ensure that the response is not generated by a computer. CAPTCHA  requires that the user type letters or digits from a distorted image that appears on the screen. Any user entering a correct solution is presumed to ...

Click here to read more arrow

Impact of E-Commerce

27 Jul 2017 20 Sep 2017

3 (871 )

Jay Kybert  As the retail industry develops, more services are introduced to entice customers to use their shops. There are varieties of services that are being used by companies to attract attention and make it easier for customers to use their websites, in the hope of increased revenue. Services like 'Next-Day Delivery' tempt customers to purchase their item sooner, since it will arrive the following ...

Click here to read more arrow

Low Cost PBX for Communication

25 Jul 2017 20 Sep 2017

6 (2,394 )

[Turki Muteb Turki Alharbi 202524020] [Hamadi Mahdi Salem Alyami 202524033] Table of Figures Figure 1: Example of two branches connected together.................... Figure 2: PSTN....................................................... Figure 3: how to download from website................................. Figure 4: installation prompt............................................ Figure 5: installing packages........................................... Figure 6: configure the network......................................... Figure 7: Time zone................................................... Figure 8: Root password............................................... Figure 9: PBX login page.............................................. Figure 10: the page after you login...................................... Figure ...

Click here to read more arrow

Criteria to Evaluate a Website of a Holiday Booking Site

18 Sep 2017

12 (4,611 )

Develop a Set of Criteria to Evaluate a Website of a Holiday Booking Site 4.1 Research Methodology Need for a good methodology A good research methodology is a general plan of how the researcher will go about answering the research questions considering the sources to collect data and the constraints that one might have (access to data, time, location and money, ethical issues etc). It should ...

Click here to read more arrow

Vigenère Cipher C Program

27 Jul 2017 15 Sep 2017

4 (1,538 )

Write a C program to implement a Vigenère cipher. You may use whatever IDE you wish but the program must be compile with the standard gcc compiler. Your program should give the user the option to either encrypt or decrypt a message. The user should be prompted to enter the passphrase to be entered and the keyword to be used in the cipher. The output ...

Click here to read more arrow

Network Upgrade for Walgreens Boots Alliance's Business

07 Aug 2017 06 Sep 2017

14 (5,453 )

Question 1 (20 marks) a) i) I have drawn a Systems map for the 'Network Upgrade for Walgreens Boots Alliance's European Business'. I have picked key subjects as sub systems such as Customers, Contracts, Network (subbed into Improvements, access technologies and Traffic) and the Transformation Programme itself. I grouped them in this way; as the network upgrade formed the main part of the IT ...

Click here to read more arrow

Learning Management Systems (LMS) in Universities

07 Aug 2017 06 Sep 2017

7 (2,625 )

Abstract Learning Management Systems (LMSs) are the typically adopted technology and they provide a significant tool in supporting blended learning in universities. Therefore, these systems are being explored from various aspects. Educational technologists conclude that every university or even departments within the same university differ in its experience in adopting these systems. Department of Industrial Management, University of Kelania is adopting the LMS portal for ...

Click here to read more arrow

Types of Threats and Prevention in Networking

07 Aug 2017 06 Sep 2017

5 (1,935 )

TASK 4 TASK4 (1) - Major types of threats There are heap of threat in the networking or which can be the internal and external. Here I will explain both these threats below; - Internal Threat: USB devices: The biggest reason of internal threat is USB devices; according to one of the survey over 35% organizations believe that these devices were actually used for stealing ...

Click here to read more arrow

Impact of E-Commerce on Amazon

07 Aug 2017 06 Sep 2017

6 (2,021 )

Existing E-Commerce sites For around 2 decades or so e-commerce has proved to be a success for businesses. It has changed the way that business and consumers work and operate. Companies such as eBay and Amazon have become a success because of the high demand that high-street market places can't provide. eBay and Amazon are some of the more popular e-commerce sites as they only ...

Click here to read more arrow

Software Quality Requirement Analysis on Educational Game

07 Aug 2017 06 Sep 2017

12 (4,721 )

Software Quality Requirement Analysis on Educational Mobile Game with Tourism Theme Anggy Trisnadoli1*, Istianah Muslim2, Wenda Novayani3 Abstract: Mobile game is one type of game that runs on mobile devices such as smartphones and tablet PCs. In previous research, we have proposed quality model for mobile game which is a quality model that was built to measure quality from mobile games. This model was built ...

Click here to read more arrow

Technical Report on Internet of Things

07 Aug 2017 06 Sep 2017

5 (1,669 )

Abstract: Internet of things is changing our world. It is a massive global network that allows people to communicate with each other. Nowadays, Internet of things are using in every field whether it is communication or transportation. Key words: Transportation, Internet of things, Technology, Transmission. TECHNICAL REPORT ON INTERNET OF THINGS    The Internet of Things is a computing concept that describes a ...

Click here to read more arrow

Cisco Prime and Wireshark Advantages and Disadvantages

07 Aug 2017 06 Sep 2017

7 (2,493 )

Introduction to Networking Tools Cisco Prime     Cisco Prime (formerly known as Cisco Works) is a network management tool that is Cisco proprietary. Prime is used for management such as monitoring, troubleshooting, configuration and administration of a network. This software allows for simpler control of the network. The monitoring and troubleshooting feature allows the network admin to immediately find and repair issues that arise throughout ...

Click here to read more arrow

The iPremier Co.: Denial of Service Attack

07 Aug 2017 06 Sep 2017

3 (1,004 )

Wk3AssgnCannadyE "The iPremier Co.: Denial of Service Attack." On January 12, 2007, iPremier Web servers were brought to a halt after a denial-of-service (DoS) attack had occurred. (https://services.hbsp.harvard.edu/services/proxy/content/55482727/55482733/bc0bf879de2a3b14574a611f54ec52c6). (ADOS attack) is where a multiple of compromised systems, which maybe infected with a Trojan virus, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of ...

Click here to read more arrow

Automotive Industry IT Requirements

07 Aug 2017 06 Sep 2017

7 (2,557 )

Total Cost of Ownership Objective: The objective of this analysis report is to study and analyse the present IT needs of the company and compare the economic benefits obtained when the company shifts to cloud solution as compared to the traditional On Premise IT configuration setup. The company chosen for this analysis is XYZ from the automotive industry. Company Description: XYZ is a global ...

Click here to read more arrow

Developing IT Funding Models

07 Aug 2017 06 Sep 2017

6 (2,044 )

Developing it funding models With increasing competition, costs and debates on the return of investments. Organizations need to be smarter with better practices on the way they fund their IT departments. Information Technology has grown way beyond its original role and now it is unusual for any company to not have any IT incorporated. Each organization must develop its own funding strategy for its IT. ...

Click here to read more arrow

ISP Network Potential Threats

07 Aug 2017 06 Sep 2017

12 (4,492 )

Threat Identification A danger is an event which could take benefit of the vulnerability and make a terrible effect at the ISP network. potential threats to the ISP network need to be diagnosed, and the associated vulnerabilities need to be addressed to reduce the danger of the threat. Trends Driving Network Security As in any rapid-growing enterprise, modifications are to be predicted. The varieties of ...

Click here to read more arrow

Impact of ICT on Accounting

07 Aug 2017 06 Sep 2017

7 (2,748 )

Effect of ICT in the Accounting Records Keeping and how ICT features in today's organization in Sierra Leone 1. Introduction Information and communication technology (ICT) connectivity (PCs and Internet) is very widespread in businesses of all sizes in Sierra Leone. As is the case with all technologies, small businesses are slower than large ones to adopt new ICTs. Potential small business benefits and firm and sector-specific strategies drive ...

Click here to read more arrow

Promotional Flash Game: New Approach into Marketing

07 Aug 2017 06 Sep 2017

4 (1,329 )

6 I have been approached by MARS® who are one of the largest manufactures of chocolate related products. They are looking for a new alternative approach to advertise towards consumers and have requested myself to develop a flash game that will market and publicise their product in a fun, engaging, family friendly way that will advertise to consumers in a positive way. Over the ...

Click here to read more arrow

Functions of Network Management

07 Aug 2017 06 Sep 2017

7 (2,586 )

In this report, I will be explaining the functions of network management. There are many stages to creating a network, these are: Planning - planning is crucial, as you will need to map out what kind of network you want to create and what its purpose will be Research - researching what network devices and cabling will be required, also researching topologies to create a ...

Click here to read more arrow

System Analysis and Design

07 Aug 2017 06 Sep 2017

9 (3,500 )

A life cycle model is a term which describes the process of the planning through to the deployment of a new software on a system, covering items such as specification analysis and implementation/testing, to enable the developers to create the software, and to ensure that the end user gets what they want. Waterfall Model The waterfall model is a common method used when designing and ...

Click here to read more arrow

Analysis of Docker Technology

07 Aug 2017 06 Sep 2017

15 (5,954 )

What is the technology? Docker is a software containerization platform. What does it do and how does it improve upon previous technologies? Docker allows users to run multiple different software packages, including multiple instances of the same piece of software within an isolated virtual container. The behaviour and features are similar to that of running a virtualized operating system, such as ...

Click here to read more arrow

Risks when Installing Hardware Components

07 Aug 2017 06 Sep 2017

3 (1,152 )

Explain the potential risks when installing hardware components Equipment damage "If you are trying to get a piece of equipment out of the computer system you need to make sure you take it out gently and safely as if you do it roughly then you could be at risk of damaging the equipment you are trying to get out. Some of the ways ...

Click here to read more arrow

Uses of a Virtual Private Network (VPN)

07 Aug 2017 06 Sep 2017

5 (1,888 )

A virtual private network (VPN) is a point to point connection that connects a user to a private network in a different location. Basically, VPNs are used to set up a secure connection to the internet. A VPN works by creating a point to point connection from a public wifi connection to a private wifi connection in a business or company building as if you ...

Click here to read more arrow

Olympus Dictation Management System Analysis

07 Aug 2017 06 Sep 2017

3 (1,179 )

Introduction Olympus Dictation Management System is a software which allows the user to transcribe mp3, mp4 or wav files dictated by doctors, lawyers, solicitors etc. The main window looks as follows once the software is running. The developer made the software quite easy and straight forward to use. Title Bar: Displays Windows title bar with the file path. Menu bar Menu used ...

Click here to read more arrow

Pep My Trip Organization Analysis - PESTEL and SWOT

07 Aug 2017 06 Sep 2017

10 (3,814 )

In current days there are many webpages for air ticketing and hotels bookings but in Sri Lanka there are only few websites which provides these services in that Pep my trip is one of the famous online site which provides services like air ticketing, hotel booking, holiday packages, and many more to various countries. Pep my trip interacts directly with the customers helping them to ...

Click here to read more arrow

Scripting Types and Uses

02 Aug 2017 06 Sep 2017

6 (2,155 )

A different type of scripting and their uses are; Maintaining cookies - Website uses cookies to allow the user to use the website easily for example cookies will give your preference when visiting that website and gives you recommendations when buying things for example when buying things from the internet it will give you preferences to allow shopping much easier. Checking and validating input. - ...

Click here to read more arrow

Packet Scheduling Algorithms Literature

02 Aug 2017 06 Sep 2017

18 (6,839 )

Abstract- This paper discusses two selected research papers that proposes two different packet scheduling algorithms that focuses on promoting higher throughput and fairness. The two algorithms are Modified Packet Prediction Mechanism algorithm which is a revised version of the current packet prediction mechanism algorithm and the second is prioritized fairness packet Scheduling algorithm. Chapter 1 Introduction Mobile communication has come a long way and has ...

Click here to read more arrow

An Overview of Network Topologies

02 Aug 2017 06 Sep 2017

5 (1,728 )

A network topology refers to the way in which nodes in a network are connected to one another. The network structure defines how they communicate. It is the arrangement with which computer systems or network devices are connected to each other. Topologies may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same ...

Click here to read more arrow

Application of Virtual Reality Technology

02 Aug 2017 06 Sep 2017

8 (3,084 )

Week 2 1. Attach a video of a technology https://www.youtube.com/watch?v=49vZHEIhp_8 Examples: https://www.youtube.com/watch?v=zmeR-u-DioE (Virtual reality used at Ford) https://www.youtube.com/watch?v=qYfNzhLXYGc (Introducing HTC Vive- a virtual reality headset with 3D controllers) 2. Key business benefits. It is evident that the main function of virtual reality is to create a virtual environment that resembles the real world. From business perspective, enterpries can take advantage of this outstanding ability to ...

Click here to read more arrow

Terminologies in the ICN architecture

02 Aug 2017 06 Sep 2017

2 (730 )

The research on the Information-centric Networking initiated with the need to replace the current inefficient architecture to a promising model that could satisfy future network necessities [1]. The several projects on this research are differentiated in the operations of the key building blocks common to most projects [4]. Named Data Objects (NDOs)    Every content on the internet ranging from a web page, ...

Click here to read more arrow

How Spreadsheets can Solve Complex Problems

02 Aug 2017 06 Sep 2017

6 (2,040 )

Explain how spreadsheets can be used to solve complex problems (P1) Task 1: Generate a report explaining how spreadsheets can be used to solve the following complex problems giving examples to support your explanation Cash flow forecasting Cash flow forecasting is used to see what comes into a business and what goes out. This estimates amounts of cash that comes in and goes out during ...

Click here to read more arrow

Object Oriented Development Technology

02 Aug 2017 06 Sep 2017

10 (3,789 )

In view of Johnson (2014) information as the word suggests is a collection of data which has different meaning in different contexts. When information is said to be good is when it adheres to certain qualities and it is relevant. There are certain characteristics associated to information which makes it good. Some of the important ones being that the information has to be complete, relevant, ...

Click here to read more arrow

Environmental Sustainability Practices with ICT

02 Aug 2017 06 Sep 2017

14 (5,438 )

MGDI60701 Implementing Environmental Sustainability Practices in Developing Countries through ICT Wordcount: 4370 (excluding references) Introduction An outstanding attributes of ICT (information and communications technology) is its crosscutting aspect and its speed, with regards to quick adaptation (Pohjola, 2003). For instance, about four decades ago television broadcasting, landline telephone and postal deliveries were the key mediators in the flow of information, but this flow ...

Click here to read more arrow

Website Design Report

02 Aug 2017 06 Sep 2017

9 (3,571 )

Ace Fancy Dress Website Design Report My website is called Ace fancy Dress. The specific purpose of ace fancy dress website is about selling products all over the UK and also to provide rental costumes. Also, the purpose of the website is to be eye-catching, colourful, recognisable, and simple and to display the high quality products. It will show the customers the new exclusive products. ...

Click here to read more arrow

Customer Service and Organisational Effectiveness

02 Aug 2017 06 Sep 2017

6 (2,102 )

Customer Service and Organisational Effectiveness BROWN THOMAS GROUP Brief background and how competitive the market place is: Brown Thomas is a luxury lifestyle store which has stores located in Dublin, Cork, Galway & Limerick. It is home to an unparalled range of Irish & International Designer Brands for women, men, children & homewares, accessories & beauty products all sourced worldwide. Established in 1849 ...

Click here to read more arrow

Violence in Video Games

02 Aug 2017 06 Sep 2017

8 (2,996 )

RQ: Should any restrictions be applied to violence in future video games to prevent any negative changes in children's behavior? Abstract: Introduction: People, nowadays, are always arguing about the problem of violence in video games; and violence, in this case, includes use of drugs, blood, gore, offensive language, and many other things, that exist in modern video games. According to the statistics, over a billion ...

Click here to read more arrow

Network Physical Topology of ISP "TechnMaster"

02 Aug 2017 06 Sep 2017

16 (6,254 )

Network Physical Topology of ISP "TechnMaster"   ISP Infrastructure Physical Topology ThechMaster is the Uk leading virtual ISP (Interner and Services Provider), with it HQ in London where all main services and infrastuture and resource are located, the main secondary branche are locate in Scotland and have similar inftrasture as in london with some others branches around the country, in Wales ...

Click here to read more arrow

Comparing Photoshop, Illustrator and Gamemaker

02 Aug 2017 06 Sep 2017

4 (1,216 )

Software Tools Techniques Cost Strengths Weaknesses Photoshop Allows for full editing of the photograph with basic tools such as brushes pencils and advanced tools such as warp and auto fill. There are many other features such as the effects that allow users to make their ...

Click here to read more arrow

Computer Crime in Sri Lanka

02 Aug 2017 06 Sep 2017

9 (3,313 )

"A research study of the Computer Crimes in Sri Lanka and the protective acts taken by the Sri Lankan government." Background Computer systems are everywhere and control a great deal of our day to day life. Computer systems make our life so much easier. All the people around the world are forced to use the computer systems even if they do not like. These computer ...

Click here to read more arrow

Business Disaster Recovery Plan

02 Aug 2017 06 Sep 2017

3 (1,188 )

DISASTER RECOVERY Business continuity programs are designed to keep a business up and running in the face of a disaster, but unfortunately, they don't always work. Sometimes, continuity controls fail or the sheer magnitude of a disaster overwhelms the organization's capacity to continue operations. That's where disaster recovery begins. Disaster recovery is a subset of business continuity activities designed to restore a business to normal ...

Click here to read more arrow

Factors for Wide Area Computer Network

02 Aug 2017 06 Sep 2017

4 (1,451 )

AWI International Education Group Task 1/A Wellington   Napier and Christchurch: 3) Auckland Tauranga Task 1/B    Wellington Christchurch Napier Auckland Tauranga Local IP range 192.168.10.0 /24 192.168.8.0 /24 192.169.19.0 /24 192.168.11.0 /24 ...

Click here to read more arrow

Access Control and Different Types of Access Control

02 Aug 2017 06 Sep 2017

4 (1,411 )

2.3 what is an access document of a local area network (LAN)? Lets have a look on record  which are equivalent to a client control in the archive it will tell us who has the confirmation and approval to enter into any server , or we can explain in as simple as smple wording to the one approved individual know the client name and secret ...

Click here to read more arrow

Characteristics Required for IT Industry Job

02 Aug 2017 06 Sep 2017

4 (1,493 )

Web Developer General skills: e.g. Interpersonal skills Talking to and dealing with customers and clients is important for a web developer in order for them to find out what sort of work they will be doing. Along with what software they will need to use in order to complete the work that has been given to them as well as this the ...

Click here to read more arrow
ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now