Home » technology » Archive for the ‘computer science’ Category (Page 4)
Sort by:

Wireless Local Area Networks (WLAN): is it really safe?

March 20, 2016 | Author: | Posted in computer science, technology

Wireless Local Area Networks (WLAN : is it really safe 2006 Introduction Providing an adequate security for any local area networks (LANs ) has always been a necessity for LANs to be a viable idea . From the very origin of LANS , the process of maintaining data integrity and prohibiting unauthorized access has proven …

Comments Off on Wireless Local Area Networks (WLAN): is it really safe?

Four Diseases

March 20, 2016 | Author: | Posted in computer science, technology

Four Diseases A disease is a bodily dis or a dised state of an organ or organism . It can be defined as the malfunctioning of the body organs due to any reason . Four major diseases are described in this -1 African sleeping sickness , 2 ) Epidemic Typhus , 3 ) West Nile …

Comments Off on Four Diseases

Measurement of Internal Consistency Software (MICS)

March 19, 2016 | Author: | Posted in computer science, technology

Measurement of Internal Consistency Software (MICS Introduction Document analysis and fingerprint comparison are two of the most important tasks done by forensic experts in investigating a case Documents and fingerprints related in a case make substantial evidences that can give progress to the investigation . With our ever advancing technology , new tools and equipments …

Comments Off on Measurement of Internal Consistency Software (MICS)

1936 Olympics in Berlin Germany and Black Germans

March 19, 2016 | Author: | Posted in computer science, technology

Running head : 1936 SUMMER OLYMPIC GAMES The 1936 Summer Olympic Games in Berlin Hitler , Black Germans , and Aryans Author Institution Instructor ‘s Name Date Prelude to the XI Olympiad It is always an honor to be chosen as the host city for a Summer Olympics . It is an opportunity to showcase …

Comments Off on 1936 Olympics in Berlin Germany and Black Germans

400 Word Analysis of the book ‘The Curious Incident of the Dog in the Night –Time’ by Mark Haddon

March 19, 2016 | Author: | Posted in computer science, technology

Mark Haddon ‘s The Curious Incident of the Dog in the Night-Time (2003 is remarkable in its ability to get inside the outsider teenager Fifteen-year-old Christopher has Asperger ‘s Syndrome . He is a brilliant mathematician but has little comprehension of ordinary emotions . He sees through the stereotypical view of his teacher that his …

Comments Off on 400 Word Analysis of the book ‘The Curious Incident of the Dog in the Night –Time’ by Mark Haddon

Wireless Network Security

March 19, 2016 | Author: | Posted in computer science, technology

Wireless Network Security 2006 Providing an adequate security for any local area networks (LANs ) has always been a necessity for LANs to be a viable idea . From the very origin of LANS , the process of maintaining data integrity and prohibiting unauthorized access has proven to be problematic at best Overtime , many …

Comments Off on Wireless Network Security

Explain about Microsoft Frontpage program

March 19, 2016 | Author: | Posted in computer science, technology

MICROSOFT FRONTPAGE PROGRAM EXPLANATION From all existing FrontPage programs FrontPage 2003 was chosen for this research work . Microsoft FrontPage 2003 program is mainly a Microsoft Office package program with power , tools and features for Web site creation and later on its management though is also available as a stand-alone program . According to …

Comments Off on Explain about Microsoft Frontpage program

What can managers do to improve the effectiveness of external recruitment?

March 19, 2016 | Author: | Posted in computer science, technology

Running head : TITLE SHORTENED TO FEWER THAN 50 CHARACTERS Your Title Goes HereWhat can managers do to improve the effectiveness of external recruitment There are inherent uncertainties in external recruitment (the process of finding possible candidates for a job or function (Wikipedia , 2005 and it can be difficult to determine if efforts made …

Comments Off on What can managers do to improve the effectiveness of external recruitment?

Multi protocol Label Switching (MPLS)

March 19, 2016 | Author: | Posted in computer science, technology

p Multi Protocol Label Switching (MPLS 2006 Table of Contents Abstract .2 Introduction .2 Multi-Protocol Label Switching (MPLS .3 MPLS /Tag-Switching Architecture .4 Hierarchical Routing .5 MPLS-Based Virtual Private Networks .6 MPLS Quality of Service .6 MPLS Disadvantages .7 Conclusion .7 References .8 Abstract Currently the segmentation between routers and switches is very narrow Switches …

Comments Off on Multi protocol Label Switching (MPLS)

Describe the impact of E-Commerce on global marketplace. Using case studies, discuss the application of E-Commerce in retail, manufacturing and logistic sectors.

March 19, 2016 | Author: | Posted in computer science, technology

Describe the impact of E-Commerce on global marketplace . Using case studies , discuss the application of E-Commerce in retail , manufacturing and logistic sectors 2006 Contents TOC \o “1-3 ” \h \z \u HYPERLINK \l “_Toc7 ” Introduction PAGEREF _Toc7 \h 3 HYPERLINK \l “_Toc8 ” 1 . Impact of E-Commerce on Global Marketplace …

Comments Off on Describe the impact of E-Commerce on global marketplace. Using case studies, discuss the application of E-Commerce in retail, manufacturing and logistic sectors.