TCP/IP network protocol

1. SYNOPSIS This report examines TCP/IP being used all over the world as a robust transmission protocol for networks. Robust transmission protocol is a protocol or system that has an ability to withstand changes in a procedure or recover from a range of exceptional inputs and situations in a given environment. The scenario here elaborates […]

Read More »

Tisco (tata iron and steel company limited)

1. Introduction TISCO (Tata Iron and Steel Company Limited) is the world’s sixth largest steel company which was established by Indian businessman Jamshetji Nusserwanji Tata in 1907. It is also the largest private sector steel company in India in terms of domestic production. The company is the fifth largest steel producer in the world as […]

Read More »

Visual cryptography

Introduction One of the popular solutions for image encryption is visual cryptography. Secret sharing concepts are used to encrypt a secret image into the shares (customized versions of the original image) which can be transmitted over an undeveloped communication channel and by overlapping shares, the secret message is obtained Visual cryptographic solutions are based on […]

Read More »

Vision 2020 in Malaysia – An Analysis

Keywords: wawasan malaysia analysis, vision malasia analysis Abstraction To achieve a vision during a long time is very difficult because it needs a lot of means and also people’s consent in order to be realized. Malaysia is the best example to learn how can achieve a strategic plan by studying its vision that called (wawasan […]

Read More »

Software engineering principles

Chapter 1 “Software is a great combination between artistry and engineering. When you finally get done and get to appreciate what you have done it is like a part of yourself that you’ve put together. I think a lot of the people here feel that way.” Introduction This report discusses Software Engineering principles in context […]

Read More »

Software piracy: An overview

SOFTWARE PIRACY IN AFRICA Software piracy is a combination of two different words which are software and piracy. Software can be defined as generic term for computer programs which operate the computer itself; Also Microsoft Encarta dictionary defined the word software as programs and applications that can be run on a computer system. Piracy can […]

Read More »

Software testing

1.0 Software Testing Activities We start testing activities from the first phase of the software development life cycle. We may generate test cases from the SRS and SDD documents and use them during system and acceptance testing. Hence, development and testing activities are carried out simultaneously in order to produce good quality maintainable software in […]

Read More »

Sustainable information security policy in an organization

Introduction The purpose of this research paper is to investigate how organizations design sustainable information security policies. Designing a sustainable information security policy is one of the most important issues facing organizations today. It should not only be the first step in an organization’s information security policy program but a continuing process to ensure the […]

Read More »

System analysis

4.1 Introduction System analysis is a major activity which takes place when we are structure a latest system or changing one. Analysis will help us to understand about the existing system and also will know the requirements necessary for the latest system. And if there is no accessible system then system analysis will defines only […]

Read More »

Assembling personal computer’s hardware and software

Assembling the Personal Computer Firstly, you will assemble the case. You will need to install the power supply, the motherboard, Graphic card, Microprocessor, Main Memory, Hard disk drive, Network Interface Card and so on are stand offs to hold in the motherboard. You will also need to connect some wires to the motherboard You will […]

Read More »