SEARCH RESULTS

YOU WERE LOOKING FOR :Basics of Computer Networking

Essays 391 - 420

Twitter Examined as a Medium in the Context of McLuchan

view of messages has focused on their content, looking at what there were saying, with little attention paid to the media itself. ...

Australia's Event Industry - An Analysis

with more than 52,000 tourists, traveling to business events within the country (Time 2009, p. 94). It is said that many qualities...

Can Friendships Reduce Employee Turnover

and communication networks. This section is followed by a literature review that discusses prior research related to organizatio...

A Cost Benefit Analysis of Cloud Computing in Developing Nations

that utilized information technology heavily grew at a rate three times faster than others (Atkinson & McKay, 2007). Therefore, ju...

The Defunct Project to Build a Rail Link to Edinburgh Airport

the final project was determined a feasibility study took place to identify the various options that were available for the buildi...

Decisions at Disney

The writer looks at two major strategic decisions made by Disney; the decision to locate EuroDisney near Paris and the decision to...

Social Networking/Associated Problems

Facebook accounts and 81 percent did not and, furthermore, only thirteen CEOs had profiles on the "professional networking site Li...

Network Administration and Age Discrimination

believe that social ills such as discrimination are a thing of the past. The fact is that injustices such as age discrimination ar...

Evolution of Technology and Communication

the last several decades. Some of the major communication tools were invented in the 1400s, such as the newspaper which first appe...

Social Networking and Transformational Leadership in Learning Organizations

of information among employees at all levels of the organization, to develop organizational knowledge in the most broadly effectiv...

Public Health, Social Networks

This research paper pertains to social networking from a public health practice perspective. Three pages in length, five sources a...

Discussion Questions on Network Security

In a paper of five pages, the writer looks at network security. A variety of topics are addressed via discussion questions. Paper ...

Social Networking Pros and Cons

In a paper of three pages, the writer looks at the pros and cons of social networking. A negative view is ultimately established. ...

Developing the Academic Persona

The author emphasizes the importance of networking and taking every opportunity to associate your name with your chosen profession...

Effective Communication in a Dynamic Commercial Environment

Ccommunication is very important within any commercial environment, the writer looks at how and why it is so important, with the a...

Identity Formation and the Impact of Online Social Interactions

This research paper pertains to the relationship between social networking sites and identity formation in adolescence and young a...

WIRELESS NETWORK AND HOSPITAL

Aside from security risks, there are other problems with going wireless - one of which is, believe it or not, interference from te...

Example of Statistical Hypothesis Testing

The writer demonstrates the use of a hypothesis test with date that was collected by a student. The test is to determine if Faceb...

A Comparison Between Google and Bing

any computer related business, it would take a lot to surpass Google. However, it should be noted that Bing has some things that G...

A Wireless Network for a Healthcare Organization

analysts may obtain much of the data in advance they may not be able to foresee of data required by management. The ability to acc...

Corporate Network Optimization

In a paper of three pages, the writer looks at the optimization of corporate networks. Examples are given in a 9-slide Power Point...

NETWORK TERMINOLOGY AND QUESTIONS

are typically connected to that main hub (which could be an actual hub, switch or router) with UTP Ethernet (Mitchell, 2010). The ...

Strategies for Network Security

employees; and a plastic container plant in Georgia, with 45 employees. Each of these locations is required to maintain records pe...

NBN and its’ Influence on Australia

Network is a white elephant waiting to happen" (quoted Tucker, 2010). Therefore, there are some significantly differing views on t...

Overview of NOS

computer, printer and modem (1996). The ability to utilize variables simultaneously is important. One can see that the different...

Recruitment and Ethics

be seen as the framework from which the principle of our conduct is governed or judged and the way in which we see our duty and th...

Types of Information Systems

it had to do something about its customers (Levinson, 2002). They simply werent being serviced well (Levinson, 2002). When America...

An Analysis of the American Broadcasting Co.

(Hoovers, 2003). Today, ABC broadcasts through 225 primary affiliate stations across the United States, it owns 10 television st...

Bruce D. Nordwall's Article 'The Use of IP and PKI in Avionics'

for avionics networks (Nordwall, 2003). IP security appears to allow a high degree of control, but this alone is not sufficient. T...

Holy War, Inc. by Peter Bergen

to 1989. Chapter 3 : "Were bin Laden and his Afghan Arabs a creation of the US government" (Bergen 63). Various books and news r...