"Frontend and backend" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 40 of 50 - About 500 Essays
  • Powerful Essays

    ABSTRACT Since the education system are increasing day by day and many students who are schooling in universities are looking for accommodation in universities hostel and hence there is a lot of strain on the person who are managing the hostel and the system they are currently using are not helpful to him/her. This particular project deals with the problems on managing a hostel and avoids those problems which arise when carried manually. The drawbacks of the existing system will be identified and

    Premium Design Data flow diagram Software testing

    • 2859 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Chapter 1 INTRODUCTION Rationale Shipping services played a vital role in the development of modern economies. Nowadays‚ the shipping industry has grown tremendously with the introduction of highly sophisticated sea vessels. In the field of the shipping industry‚ computers are used by companies in order for them to have a quicker way in the issuance of tickets. A ticket gives the passenger the right to board a ship. It indicates that the passenger has paid for or is entitled to a specified service

    Premium Application software Computer software Software development

    • 2992 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    STUDENT COPY Graded Assignments The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format‚ which will be available for downloading at any time during the course. Graded Assignment Requirements The Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the assignments

    Premium Security Computer security Information security

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    LTE Broadcast white paper

    • 6183 Words
    • 25 Pages

    Content for All - The Potential for LTE Broadcast/eMBMS White Paper January 2013 Executive Summary As smartphones and tablets reach saturation levels in many markets‚ mobile operators are challenged with meeting the increased demand for mobile data while minimizing capital and operating expenditures. iGR’s own forecasts show massive growth in the world’s mobile data traffic in the next five years from about 432‚000 terabytes (TB) of mobile data per month in 2011‚ to approximately

    Premium Mobile phone Mobile network operator Telephone company

    • 6183 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    Bukidnon State University‚ Alubijid External Studies Center Alubijid‚ Misamis Oriental Online Supply Inventory System In Partial Fulfillment of the Requirements For the Degree of Bachelor of Science in Information Technology Proponents : Abriol‚ Ariel O. Maglangit‚ Erbie Valerie N. Abellanosa‚ Rolly B. . Presented to: Mr. Patrick D. Doldolea Instructor TABLE OF CONTENTS Title Page Acknowledgment Project Title Background of the Study Pages i ii iii Chapter I: Introduction 1.1 Statement of

    Premium Requirements analysis Data modeling User

    • 5991 Words
    • 52 Pages
    Powerful Essays
  • Powerful Essays

    Double Guard

    • 13836 Words
    • 56 Pages

    This article has been accepted for publication in a future issue of this journal‚ but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING DoubleGuard: Detecting Intrusions In Multi-tier Web Applications Meixing Le George Mason University Angelos Stavrou George Mason University Brent ByungHoon Kang George Mason University Abstract—Internet services and applications have become an inextricable part of daily life‚ enabling

    Premium Web server World Wide Web Website

    • 13836 Words
    • 56 Pages
    Powerful Essays
  • Powerful Essays

    Focus Theme Business Models for Electronic Markets by Paul Timmers‚ European Commission‚ Directorate-General III‚ April 1998* Abstract Electronic commerce over the Internet may be either complementary to traditional business or represent a whole new line of business. In either case‚ in view of the new features of the Internet‚ critical questions to be answered include: ♦ what are the emerging business models; and related to this‚ ♦ which strategic marketing approaches are applied‚ or emerging

    Premium Marketing

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    WEB GIS USING OPEN-SOURCE SOFTWARES- IMPLEMENTING A SHORTEST ROUTE FINDING WEB SERVICE FOR VISAKAHAPTNAM REGION A Project Report submitted in Partial Fulfillment of the Requirement for the Award of Degree of BACHELOR OF TECHNOLOGY IN GEOINFORMATICS ENGINEERING Submitted by B. Jeevan Patnaik (Regd. No:309106715004) CH. Satyanarayana (Regd. No: 309106715006) G. Jothirnadh Sai (Regd. No: 309106715010) DEPARTMENT OF GEO ENGINEERING ANDHRA UNIVERSITY COLLEGE OF ENGINEERING (A) VISAKHAPATNAM

    Premium Geographic information system Open source

    • 13547 Words
    • 55 Pages
    Powerful Essays
  • Better Essays

    Supply Chain Task 1

    • 2981 Words
    • 12 Pages

    B1: BUDGETS The Marketplace simulation helped me realize how complicated and difficult decision making can be when trying to build a company. Among the most important simulation results were utilizing the budgets and pro forma statements. Budgets are beneficial as a financial plan by listing all planned expenses and income. The purpose is to be able to forecast revenues and expenses and create a business model that operates effectively to make sure overhead can be paid. -------------------------------------------------

    Premium Revenue Income statement Inventory

    • 2981 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    CSEC 610‚ University of Maryland University College July 12‚ 2014 Cybersecurity Vulnerabilities Facing IT Managers Cybersecurity Vulnerabilities Facing IT Managers Table of Contents Introduction ………………………………………………………………………………………………………………… 3 Types of Vulnerabilities ………………………………………………………………………………………………. 5 Important Vulnerability‚ Impact & Solutions ……………………………………………………………….. 8 References …………………………………………………………………………………………………………………… 12 Cyber-security demands are ever

    Premium Computer security Security Information security

    • 3199 Words
    • 8 Pages
    Powerful Essays
Page 1 37 38 39 40 41 42 43 44 50