Different lan technologies
1. AIM To learn about different lan technologies and to design a network based on these lan technologies and to simulate these networks by a simulation tool know as opnet…
Read more >Types Of Peripheral Devices
What is Information Technology (IT)? Information Technology can be known as being the study, design, development, implementation support and management of any computer based information systems. This relates particularly to…
Read more >Different Types Of Software Attacks Computer Science Essay
The progress in IT industry increased the security issues in a system or an organistion. Corporate organisations have lot of informations which are very sensitive so they spent a large…
Read more >Different uses for spreadsheets
Spreadsheets Coursework There are many different uses for spreadsheets; the main use for spreadsheets is using basic formulas to work out various sums. They can also used to represent data…
Read more >Digital Communication Simulation Using Matlab Computer Science Essay
Objective - Aim - Scope of the assignment "The objective of this assessment is to model and analyse modulation and coding in Communication Systems using Matlab."[1] This lab exercise aims…
Read more >Digital Encoding Technique Of Scrambling Computer Science Essay
Scrambling is a digital encoding technique that is used in modern data communication schemes and can principally provide aid in retrieving information from received data enhancing synchronization between the transmitter…
Read more >Digital Forensic Methodology and Strategy
Introduction Digital forensic can be described as the cyber security mostly used to secure to identify, preserve, analyze and present digital data evidence in the manner it will be…
Read more >Digital Voltmeter Using An 8051 Microcontroller Computer Science Essay
A voltmeter finds its importance wherever voltage is to be measured. A voltmeter is an instrument used for measuring the electrical potential difference between two points in an electric circuit. Analog voltmeters move a…
Read more >DIRECT MANIPULATION PRINCIPLES
Keywords: The major principles of direct manipulation. Process based on selection, interrupted and visible performance of an object PART - 1 DIRECT MANIPULATION PRINCIPLES Three Major Principles of Direct Manipulation…
Read more >Distributed Denial Of Service DDOS Attack Computer Science Essay
Information technology is an exciting and emerging day by day technology which requires communication systems for data and services exchange. As nowadays every services and products uses computer and internet…
Read more >