Javascript is disabled. Please enable it for better working experience.

Essay on IT

Information Technology has been a progressive field ever since it has been introduced. It started with simple electronics and it has advanced to drones and artificial intelligence now. Information technology students therefore are increasing in number every year. These students are required to make a number of essays throughout their educational tenure in IT. Hence, information technology students can study these pre-written essays for inspiration and ideas.

Setting Up A Voip Using Asterix
Rating
SETTING UP A VOIP USING ASTERIX Setting Up a VoIP Using Asterix Setting Up a VoIP Using Asterix Introduction The purpose of this assignment was to set up a VoIP using Asterisk. Asterisk is an open source private branch exchange (PBX) — or private telephone network — that currently runs on Linux, OS X, ...
Linux Distribution
Rating
Linux Distribution Linux Distribution Introduction A Linux distribution is a software distribution based on Linux kernel that includes certain software packages to meet the needs of a specific group of users, giving rise to domestic issues, business and server.  The ability to mount an operating system has made ??as any entity that provides a solution to a specific problem to be ...
Impact Of A Data Classification Standard
Rating
Impact of a Data Classification Standard Impact of a Data Classification Standard Introduction Organizational leaders believe the change in IT is the first time that organizations have encountered a changing technology that took less time to transition into the world's global economy. The change surprised leadership as incongruous, but also proved that the ...
Impact Of Digitalisation On Smartphone
Rating
IMPACT OF DIGITALISATION ON SMARTPHONE Impact of Digitalisation on Smart phone Impact of Digitalisation on Smart phone Introduction The purpose of this study is to expand the boundaries of our knowledge by exploring some relevant facts and figures related to the impact of digitalization on Smartphone. In this paper, the author will evaluate ...
Viruses, Trojans And Backdoors
Rating
Viruses, Trojans and Backdoors Viruses, Trojans and Backdoors Computer Virus The term "computer virus", probably familiar even to those who have never had a computer. If in real life, we are frightened of SARS virus, or swine flu, in the computer world we are threatened with network viruses, worms, and all kinds of ...
Project Management
Rating
Project Management Project Management Introduction The topic about which this paper aims to talk about is project management life cycle. According to different project managers, practitioners, authors and scholars there are different stages of the project life cycle. They define different ways in which the life cycle of the project can be managed. ...
Encryption
Rating
Encryption ABSTRACT In this study we try to explore the concept of Encryption in a holistic context. The main focus of the research is on Encryption and its relation with Cryptographic Algorithms. The research also analyzes many aspects of security and tries to gauge its effect on Encryption. Finally, the research describes ...
EncryptioN
Rating
ENCRYPTIoN Encryption [Name of the writer] [Name of the institution] ABSTRACT The access control mechanisms of existing mainstream operating systems are inadequate to provide strong system security. Enhanced access control mechanisms have failed to win acceptance into mainstream operating systems due in part to a lack of consensus within the security community on the right ...
Expert Systems
Rating
EXPERT SYSTEMS Expert Systems Expert Systems Introduction Expert systems are essentially the computer programs, which base on artificial intelligence technologies. These systems have got wide popularity during the last 10 years. Many business organizations rely on expert systems for decision making processes, as this system significantly emulates the decision making capability of ...
Attack On Information Systems
Rating
ATTACK ON INFORMATION SYSTEMS Methodologies of Attack on Information Systems Methodologies of Attack on Information Systems Introduction Information system can be attacked in several ways but in this paper we will be discussing with two cracking methodologies, which includes the exploitation of open standards of TCP/IP model and exploitation by the procedures and people ...
111 - 120 of 293 Go To Page 7  8  9  10  11  12  13  14  15  16