AllFreePapers.com - All Free Papers and Essays for All Students
Search

Technology

2,296 Technology Free Papers: 441 - 450

  • Computer Crimes

    Computer Crimes

    COMPUTER CRIMES Computer Crimes Instructor: Institution: Course: Date: Viruses, worms and Trojans are forms of software referred to as malware. “Malware”, also known as malicious code, is shorthand for malicious software. A malware or malicious code is a software, or code, that is designed specifically to steal, disrupt, damage or

    Rating:
    Essay Length: 776 Words / 4 Pages
    Submitted: December 12, 2015 Autor: Vincent Otieno
  • Computer Hacking

    Computer Hacking

    Computer Hacking Technology is a wonderful thing. However, some aspects of it can be dangerous; such as computer hacking. Computer hacking is the practice of altering computer hardware and software, in order to cause damage to important data on a computer or to simply steal secret information. Hacking was started

    Rating:
    Essay Length: 487 Words / 2 Pages
    Submitted: August 5, 2014 Autor: aisroc
  • Computer Information Specialist

    Computer Information Specialist

    Facts of the case The case involved three parties, that is; CIS which was protesting against the agency decision towards rewarding the contract to another firm OTC through mischievous evaluation criteria that failed to meet the set standards. The protest was sustained based on the fact that the agency made

    Rating:
    Essay Length: 934 Words / 4 Pages
    Submitted: June 2, 2014 Autor: dixon48
  • Computer Information Systems

    Computer Information Systems

    Individual Assignment Week 2 Your Name Here University Name Here Teacher Name Here Computers & Information Processing January 29, 2008 The Manager Since the manager is always on the move it is best that the manager have a tablet PC. The tablet PC comes equipped with Microsoft XP Professional Tablet

    Rating:
    Essay Length: 609 Words / 3 Pages
    Submitted: September 4, 2014 Autor: crono13
  • Computer Malicious Software

    Computer Malicious Software

    Computer Malware Types Name Affiliation Date Computer Malware Types Computer Malware is used to identify computer malicious software that harms the computer in different ways. Programmers and developers designs malware software for different purposes either they want to steal the information or to gain access illegally. Malware is a type

    Rating:
    Essay Length: 641 Words / 3 Pages
    Submitted: March 2, 2017 Autor: irum shahzadi
  • Computer Mediated Communication - Communications, New Media and Society

    Computer Mediated Communication - Communications, New Media and Society

    NM1101E Communications, New Media and Society Week 4 CMC: Conceptual Application & Experiential Exercise Name: Diana Himawan (Tutorial Group W16 / Day & Time: Fri, 3-4pm) : Christine Chia (Tutorial Group W2 / Day & Time: Mon, 3-4pm) For this experiential assignment, use your laptop, tablet or phone to experience

    Rating:
    Essay Length: 285 Words / 2 Pages
    Submitted: February 3, 2016 Autor: Christine Chia
  • Computer Memory and Ram Hacking

    Computer Memory and Ram Hacking

    Assignment #6: Computer Memory and Ram Hacking Amanda R. Coates CIS-106 Introduction to Information Technology Professor Levonia Parker February 11, 2016 ________________ Computer Memory and Ram Hacking 1. Describe what hacking of memory or hacking of RAM means. Hacking is any technical effort used to manipulate the normal behavior of

    Rating:
    Essay Length: 983 Words / 4 Pages
    Submitted: April 24, 2016 Autor: Amanda Coates
  • Computer Networking Management

    Computer Networking Management

    Task -1 a) For each segment, making any necessary assumptions, calculate the following and plot the data on a graph: • An appropriate timeout interval for use when transmitting the next TCP segment. Estimated RTT = (1-a)3*Sample RTT(4)+a*(1-a)2*Sample RTT(3)+a8(1-a)*Sample RTT(2)+a*Sample RTT(1) We can calculate Estimated RTT by using the above

    Rating:
    Essay Length: 8,083 Words / 33 Pages
    Submitted: March 8, 2011 Autor: Antonio
  • Computer Networking Quiz 1

    Computer Networking Quiz 1

    1. Give two examples of an end system. Computer, PDA 2. Which standardization body is responsible for Internet standards? IETF 3. Consider two access networks, digital subscriber line (DSL) and cable Internet access. Which one uses a shared upstream channel? Which one uses point-to-point connection between the home and the

    Rating:
    Essay Length: 267 Words / 2 Pages
    Submitted: January 28, 2016 Autor: David Yue
  • Computer Networks / Data Communications Basics

    Computer Networks / Data Communications Basics

    Running Head: DATA COMMUNICATIONS BASICS Computer Networks Kaplan University Abstract This paper will discuss the basics of data communication. Computer Networks Service providers, signal levels, compressions and wiring are all fundamental basics of data communications. These fundamentals are discussed below along with other topics. Three Disciplines of Data Communications Physics,

    Rating:
    Essay Length: 2,344 Words / 10 Pages
    Submitted: December 20, 2011 Autor: stephfa
Search
Advanced Search