"Siwes report at cyberspace network" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 11 of 50 - About 500 Essays
  • Powerful Essays

    p2p networks

    • 11971 Words
    • 48 Pages

    Peer-to-Peer Networks for Content Sharing Choon Hoong Ding‚ Sarana Nutanong‚ and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory‚ Department of Computer Science and Software Engineering‚ The University of Melbourne‚ Australia (chd‚ sarana‚ raj)@cs.mu.oz.au ABSTRACT Peer-to-peer (P2P) systems are popularly used as “file-swapping” networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Napster‚ Gnutella

    Premium Peer-to-peer File sharing

    • 11971 Words
    • 48 Pages
    Powerful Essays
  • Powerful Essays

    Social Networks

    • 1543 Words
    • 7 Pages

    Social Networking Rewind back 10 years‚ before the idea of Facebook‚ Twitter‚ and YouTube became a reality. The thought that people might someday spend more than half their day on a website such as Facebook was unthinkable. These social networks sites‚ along with hundreds more‚ were just a spark in designers’ mind. Social networking has made many effects upon society. With almost anyone having access to a computer‚ it has become easier to connect virtually with one another. The constant use of

    Premium Social network service Facebook Social network aggregation

    • 1543 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Social Networks

    • 1515 Words
    • 7 Pages

    rely on their phones to talk to someone unfortunately we live in a world where communication all takes place through a piece of technology. Whether it is through a simple text message or social networking site we’ve come to revolve around social networks like Facebook‚ Twitter‚ and now Instagram. This essay is about Social Networking sites in general and arguing that they are negative to our communication experience in detrimental ways. While Face-to-Face communication is fading away it’s being replaced

    Premium Social network service Facebook Twitter

    • 1515 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    network cryptography

    • 4974 Words
    • 20 Pages

    Cryptographic Authentication for Real-Time Network Protocols1‚2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed‚ real-time network protocols used in time synchronization and event scheduling applications. It outlines the design requirements of these protocols and why these requirements cannot be met using conventional cryptography and algorithms. It proposes a new design called autokey‚ which uses a combination of public-key cryptography

    Premium Cryptography RSA

    • 4974 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Network Typologies

    • 9609 Words
    • 39 Pages

    CHAPTER TWO NETWORKING SYSTEMS AND LOCAL AREA NETWORKS (LAN) A network is a system of two or more computers that are connected in some manner. Each computer on the network has access to the files and peripheral equipment (such as printers or modems) on all the other computers on the network. The origin of local area networks can be traced‚ in part‚ to IBM terminal equipment introduced in 1974. At that time‚ IBM introduced a series of terminal devices designed for use in transaction-processing

    Premium Ethernet Computer network

    • 9609 Words
    • 39 Pages
    Good Essays
  • Satisfactory Essays

    It Report

    • 2951 Words
    • 12 Pages

    UNIVERSITY OF ILORIN REPORT ON SIWES WITH OAK COMPUTERS LIMITED‚ OGBA‚ LAGOS Prepared by: FALANA SUNDAY ‘DIMEJI 06/55EC092 29th‚ September‚ 2008 DEPARTMENT OF COMPUTER SCIENCE 2 Overview This report is organized in the following order: Chapter One: Introduction This chapter explains the purpose‚ scope and limitation of the Student Industrial Work Experience Scheme. It also gives an introduction to the company‚ Oak Computers Limited‚ including its background. Chapter Two:

    Premium Adobe Systems Adobe Creative Suite Microsoft

    • 2951 Words
    • 12 Pages
    Satisfactory Essays
  • Best Essays

    Social Network

    • 1531 Words
    • 5 Pages

    Social Network ’s a Social Problem? Social Networking: A Problem for Adolescents Dillon Hackworth Sociology 1010 P06 November 15‚ 2011 Abstract The impact of internet communication on adolescent social development is of considerable importance to health professionals‚ parents‚ and teachers. Online social networking and instant message applications‚ such as those found on Facebook‚ are very popular amongst an era of high-tech youth (Campbell 2011). These utilities facilitate communication for teenagers

    Free Internet Social network service Instant messaging

    • 1531 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Network Security

    • 6254 Words
    • 26 Pages

    All-in-1 / CISSP All-in-One / Harris / 5712-1 CHAPTER Becoming a CISSP 1 This chapter presents the following: • The reasons to become a CISSP • What the CISSP exam entails • What the Common Body of Knowledge contains • The history of (ISC)2 and the CISSP exam • Recertification requirements • An assessment test to gauge your current security knowledge This book is intended to welcome you to the exciting world of security and start you on a new path toward obtaining your CISSP

    Premium Security Information security Computer security

    • 6254 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    Network Management

    • 21134 Words
    • 85 Pages

    INFORMATION TECHNOLOGY BBIT 3102:NETWORK MANAGEMENT MBUGUA PHILIP mbugua_mwenja@yahoo.com i BBIT 3102 NETWORK MANAGEMENT Contact Hours 42 Pre-requisite BBIT 2203: Introduction to Business Data communication and computer networks Purpose To introduce basic techniques of managing a business information network operating systems. Objectives By the end of the course unit a learner shall be able to:    Designing a physical computer network Selecting network devices and hardware for

    Premium Network topology OSI model

    • 21134 Words
    • 85 Pages
    Satisfactory Essays
  • Satisfactory Essays

    “Gender Gap in Cyberspace” is written by Deborah Tannen‚ in 1994. She has written many books and articles on the differences in male and female communication styles. In the article “Gender Gap in Cyberspace” Tannen compares differences the way men and women approach new technologies. She contrasts her experiences with one of her colleagues named Ralph. Tannen and Ralph were both computer pioneers‚ buying their first machines in 1980. While Ralph became a computer expert‚ Tannen remained a self-described

    Premium Gender Sociology Female

    • 325 Words
    • 2 Pages
    Satisfactory Essays
Page 1 8 9 10 11 12 13 14 15 50