|
Essays are delivered
FREE excerpts are |
|
|||
|
Papers On Computers & The Internet
|
IT Ethics
[ send me this essay ]
A 7 page paper providing a literature review on this topic. Ethical
questions surrounding IT in former years focused on access. As access continues to be
less dependent on the possession and knowledge of computers, ethical questions appear to
be more concerned with use of information than with access to it. Bibliography lists 6
sources.
Filename: KS-ITethics.wps
IT Forensics: Digital Evidence
[ send me this essay ]
5 pages in length. The article entitled "Computer Forensics" by Peter Sommer delves deeply into the advantage law enforcement officials have in the ongoing pursuit of apprehending cyber criminals. Discussing each component of IT forensics in a comprehensive yet understandable manner, the author provides a beginning-to-end overview of why computer forensics has become a necessity in today's high-tech world, how police carry out the often-tedious task of finding virtual evidence and when said evidence is considered permissible in a court of law. In short, Sommer offers an encapsulated yet thorough glance at the inner workings of an entirely unprecedented element of technological law enforcement. Bibliography lists 4 sources.
Filename: TLCITForens.rtf
IT In Business
[ send me this essay ]
This 4 page paper answers three questions; 1. What does the terminology “legacy problem” mean and how does it relate to ERP (Enterprise Resource Planning)? 2. How ill considered ICT (Information Communication Technology) outsourcing can be risky and dangerous for a company and 3. How the architecture of ICT relates to business strategy?. The bibliography cites 1 source.
Filename: TEITlega.rtf
IT in Business
[ send me this essay ]
This 17 page paper considers IT in two companies; Microsoft and Siemens Business Services. The paper examines the companies separately, identifying at the central operational concerns of these organizations, how IT currently being used in these organizations to support those concerns and if it could be used more effectively and how the limitation are likely to be influenced by future developments. The bibliography cites 10 sources.
Filename: TEmicrosiemen.rtf
IT INFRASTRUCTURE: AN OVERVIEW
[ send me this essay ]
This 3-page paper discusses what an IT infrastructure is, its uses and some components. Bibliography lists 2 sources.
Filename: MTitinfras.rtf
IT Integration in the DEC-Compaq Merger
[ send me this essay ]
A 10 page paper discussing Cases IV-6 and IV-7, each of which reviews integrating the information management (IM) systems at Digital Equipment Company (DEC) and Compaq Computer in 1998, at the time that Compaq acquired DEC. The cultures of the two companies were very different going into the merger, and that difference was reflected both in the configuration of their information systems and in their respective organizational cultures. The purpose here is to assess the companies’ experience in merging their information systems in response to Compaq’s acquisition of DEC in 1998, in terms of the two companies’ use of IT management theory. Bibliography lists 2 sources.
Filename: KSitDECcompaq.rtf
IT Opportunities in Mergers
[ send me this essay ]
A 10 page paper discussing a case of merger of two
large British brewers, both multinational companies with extensive IT systems. The paper
discusses issues of handling the merger of IT systems in conjunction with the merger of
organizations, providing a glimpse of the infrastructure in a "before" and "after" context. The
paper stresses the need to learn from the mistakes of others, one of which is the tendency to
standardize the new business entity on the older architecture. This new brewing entity will not
make that mistake. Bibliography lists 11 sources.
Filename: KS-ITmerge.wps
IT Portfolio Management
[ send me this essay ]
A 5 page paper defining and discussing the use of the IT portfolio as a means of gaining control over IT projects and IT costs. ITPM is an approach to managing IT and IT projects as components of a larger portfolio of IT-related assets. This implies, of course, that the one managing that portfolio is able to identify and assess applicable risks and quantify potential returns. The portfolio management approach is being used in a wide range of industries and appears to be gaining attention of additional ones. Bibliography lists 6 sources.
Filename: KSitPortfoMgmt.rtf
IT Project Analysis
[ send me this essay ]
This 3 page paper focuses on the case study entitled Intel Technology gets Clean Bill of Health. Bibliography lists 3 sources.
Filename: SA905it.rtf
IT Questions for a Business
[ send me this essay ]
This 19 page paper answers four questions asked by the student. The first outlines the use and advantages of a distributed network, the second looks at controlling and monitoring the system using an embedded TCP/IP and how IPsec can be used for security. The third looks at the use of remoting, what it is and how it can be used. The last part of the paper examines web services, what they are, examples of their use and some examples of vendors. The bibliography cites 36 sources.
Filename: TEwebserv.rtf
Can't find it here? Use the CUSTOMIZE button to have us create something NEW!
Menu Options:
Home Page
|
Subject
List |
Customized
Help |
F.A.Q.
Order
|
Links | E-Mail Us
Be sure to also check out these
other essay sites:
1WayEssays.Com |
AnalyticalEssay.Com |
1to1Essays.Com
|
Select-an-Essay.Com |
1stDegreePapers.Com
If you can't find any
essays pertinent to your unique topic,
just click "customize"
to have our contracted researchers create something NEW designed
specifically to help YOU!
There are no membership fees and no registration sign-up is required. At FastestEssays.Com, you pay ONLY for those essays YOU choose to order! BE WEARY of other sites that charge "admission" for "unlimited" access to recycled student essays submitted by struggling people no better off than you are right now! Get QUALITY help from FastestEssays.Com or our affiliates. CLICK HERE for a complete list!

. Essays downloaded from FastestEssays.Com remain the intellectual property of the company and its contracted research writers. Students purchasing essays from this site are required to go on to write their own unique papers. In the course of writing their own unique papers, our student customers are also required to cite our company and our author as a source in their own bibliography or works cited page.