"Business data networks and telecommunications" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 21 of 50 - About 500 Essays
  • Powerful Essays

    Network Security

    • 6254 Words
    • 26 Pages

    All-in-1 / CISSP All-in-One / Harris / 5712-1 CHAPTER Becoming a CISSP 1 This chapter presents the following: • The reasons to become a CISSP • What the CISSP exam entails • What the Common Body of Knowledge contains • The history of (ISC)2 and the CISSP exam • Recertification requirements • An assessment test to gauge your current security knowledge This book is intended to welcome you to the exciting world of security and start you on a new path toward obtaining your CISSP

    Premium Security Information security Computer security

    • 6254 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    Graduate Programme – Term IV – AY 20012-13 Business Intelligence And Data Mining Group Assignment on NGO Donations Maximization Abstract The problem is associated to devising a strategy to maximize the profits from a Direct Marketing Campaign to a selected group of customers while minimizing costs . The exercise requires the use of Business Intelligence tools and techniques to build a model ‚ trained and tested on the historical data for the last year’s donation raising campaign

    Premium Prediction Correlation and dependence Pearson product-moment correlation coefficient

    • 906 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network Threats

    • 924 Words
    • 4 Pages

    common network threats and provide solution to protect users from threats‚ hackers and ensures that the data travelling across the networks is safe. Introduction: Computer and network security is a new and fast moving Technology and as such‚ is still being defined and most probably will always be “still defined”. Security incidents are rising at an alarming rate every year [Figure - 1]. As the complexity of the threats increases‚ so do the security measures required to protect networks. Data center

    Premium Computer security Attack Computer network

    • 924 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Data Mining

    • 1453 Words
    • 6 Pages

    CUSAT Reading Material on Data Mining Anas AP & Alex Titty John • What is Data? Data is a collection of facts and information or unprocessed information. Example: Student names‚ Addresses‚ Phone Numbers etc. • What is a Database? A structured set of data held in a computer which is accessible in various ways. Example: Electronic Address Book‚ Phone Book. • What is a Data Warehouse? The electronic storage of large amount of data by business. Concept originated in 1988

    Premium Data mining Decision support system

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Computer Networks

    • 1302 Words
    • 5 Pages

    COMPUTER NETWORKS NETWORK TELEPHONY –VOICE OVER INTERNET PROTOCOL(VoIP) VoIP is a set of technologies that enable voice calls to be carried over the internet (or other networks designed for data)‚ rather than the traditional telephone landline system-the Public Switched Telephone Networks(PSTN). VoIP uses IP protocols‚ originally designed for the internet‚ to break voice calls up into digital ‘packets’. In order for a call to take place the separate packets travel over an IP network and are reassembled

    Premium Telephone Internet Internet Protocol

    • 1302 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    data

    • 261 Words
    • 2 Pages

    Data Display Q no.1 Do you have a personal bank account? Bar chart Pie chart Q no.2 Your personal banking account… Bar chart Pie chart Q no.3 If you have a conventional banking account‚ the reason for this is that… Bar chart Pie chart Q no.4 Do you think Islamic banks are really Islamic (what is your perception)? Bar chart Pie chart Q no.5 Nowadays

    Premium Bank Islamic banking Bar chart

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Network Externalities

    • 1759 Words
    • 8 Pages

    1. Introduction With the rapid development of new communications technology and network technology‚ some industries such as information industry show significant network externality characteristics. Network externality has been defined as "a change in the benefit‚ or surplus‚ that an agent derives from a good when the number of other agent consuming the same kind of good changes" (Liebowitz & Margolis‚ 1996). In other words‚ the product will be more valuable if more people use it. For example

    Premium Externality Monopoly Competition

    • 1759 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Smart Clothing Your underwear won’t be able to help you with your taxes‚ but your briefs may soon know when you need air. Smart fashions are the next wave in textiles and they promise to dazzle consumers with their style and innovation. Here are some of the hot products to look for on the runways of the future. Researchers in the UK have developed an adaptive fabric that controls air flow by opening invisible micro shutters when the humidity goes up. A separate layer keeps the rain out even when

    Premium Clothing Textile Fashion

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Network Management

    • 923 Words
    • 4 Pages

    answering your question on performance. Ethernet is based on CSMA/CD (carrier sense multiple access with collision detection)‚ meaning multiple stations sense the carrier at the same time and send data when the carrier is free. However‚ there might be multiple stations sending a free carrier and send the data at the same time‚ causing "collision." Collision is the main factor affecting ethernet’s performance. The more stations on the same LAN‚ the higher the collision rate‚ the lower the performance

    Premium Ethernet Internet Protocol

    • 923 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cause Network

    • 571 Words
    • 3 Pages

    protection of assets. No computer system or network achieves perfect security; even a system switched off with its hard drive removed sunken in a lead case in the bottom of a deep pool in an underground facility lacks security‚ as it guarantees integrity and confidentiality but completely sacrifices availability. As a security professional‚ you must understand the risks a network faces; you must‚ in essence‚ know how to bring the network down‚ to steal the data you want‚ and to falsify important information

    Premium .hack Identity theft Computer security

    • 571 Words
    • 3 Pages
    Good Essays
Page 1 18 19 20 21 22 23 24 25 50