Information technology

36 documents
Benefits of Speech Recognition Software
Benefits of Speech Recognition Software. Žygimantas Jarusevičius PI15_c. Tips to be covered. Speech Recognition Definition Speech. Speech Recognition Definition. In computer science and electrical engineering. Speech Recognition Systems. SR ...
Information technology, 8 pages
2015 11 05
Information Technology skills
A young person today to use and is very important because many of the work to be carried out is drawn up in the computer, various slide presentations, even the student's diary is electronic. In addition, all of these things, not only helps in the ...
Information technology, 1 page
2016 02 28
Benefits of speech recognition
Disabled people can use input by voice as their main input method, and because of that with a proper training they are able to fully use computer, doing things they never thought could be possible. It allows them to communicate thru computer, ...
Information technology, 11 pages
2015 10 21
How Google works
The book consists of several separate chapters and each of them discusses a different topic. There are topics such as strategy, talent, decision-making, communication and innovation. For example, in the chapter about talent the authors talk about ...
Information technology, 2 pages
2017 06 14
3 historical buildings in the world presentation slides
Historical buildings in the world. There are many historical buildings like towers. Leaning Tower of Pisa. The Leaning Tower of. The tower was built in 1372. In 2001 The Tower of Pisa was restored. Roman Forum. The Roman Forum is. It was for ...
Information technology, 8 pages
2020 06 29
Armoured train
Introduction. Armoured train. Design and equipment. Origins. American Civil War. World War Interwar years. World war World War II in United Kingdom. Royal train. Battle of Malaya. Conclusion. References.
Information technology, 10 pages
2018 12 10
Attacks in Paris presentation
Attacks in Paris. How Many People Died In Paris Shooting? 129 people died 352 injured 99 are in critical condition. Eiffel Tower has turned off lights. Question to audience. What to do that such attacks would not in this world? My answer is. ...
Information technology, 10 pages
2018 10 04
Cloud Computing the text
Introduction to Cloud Computing. On premise computing. What Is Cloud Computing. Cloud Computing Characteristics. Cloud Computing Provides On Demand Self Service. Cloud Computing Encompasses the Characteristics of Grid Computing. Grid computing. ...
Information technology, 13 pages
2019 06 04
Engima machine
Enigma machine. What I will talk about? What does it do? ! ? Who is mad enough to make this invention? Why it was impossible to crack the cypher? Quick video to how it works. What was machine‘s main purpose? Who cracked the cipher machine? ...
Information technology, 12 pages
2020 10 15
IT development essay
Nowadays, information technology plays an important role in peoples’ life. I will discuss in this essay what negative or positive effects information technology will have in (the) future.To start with, information technology helps to ...
Information technology, 1 page
2019 10 13
Midle ages slides
Content. Middle Ages. Why historians call this time the Dark Ages? Feudal System. Hierarchy of Rulers. Life in the Country. Life in the City. What did they wear? What did they eat? Interesting Facts. Fairs, Festivals, and Feasts. Hunting. Music. ...
Information technology, 22 pages
2019 11 26
Programming Engineering Summary
Security engineering. Security dimensions ( CIA triangle ). Terminology. Threat types. Security assurance. Misuse/Abuse cases. Design compromises. Layered software protection architecture. Design guidelines for security engineering. System ...
Information technology, 11 pages
2019 06 06
Programming Paradigm: Object-oriented programming
Programming paradigm OOP. Content table. Programming paradigms. Introduction to OOP. Object-oriented programming – As the name suggests uses objects in programming. Characteristics. OOP concept Class. Class The building block of C++ that ...
Information technology, 21 page
2020 06 09
Queen Elizabeth presentation
The Queen. What is the queen’s name? How old is the queen? How long has she been the Queen? Wedding Day. Did you know? Queen Elizabeth and. Her Corgis A Love Story. Films.
Information technology, 14 pages
2018 10 04
The Code of Hammurabi Mesopotamia
Faculty of Management and Economics. The Code of Hammurabi Mesopotamia. Content. Hammurabi king of. Hammurabi was a. Hammurabi's Code prescribed specific punishments for citizens who broke the law. Hammurabi’s code included what we today call ...
Information technology, 11 pages
2018 10 04
3Ds Max task
Do the same with the edges on the other side.Now switch to Border mode (keyboard shortcut "3") and select all four borders of our shape (two on top + two on the bottom). Borders define holes in polygonal geometry.Hit the Cap button ...
Information technology, 9 pages
2015 11 04
Advantages and disadvantages of online shopping
Advantages and disadvantages of online shopping.
Information technology, 1 page
2015 11 10
Chart analysis
Number of factors could have effect on business profit contribution. For example some branches could exceed they planned targets because of increased pollution in that area maybe have good marketing method which increased sales. Branches which ...
Information technology, 3 pages
2016 10 27
Comparing the running times of two sorting algorithms
Introduction. Counting sort. Insertion sort. Design. Counting Sort Pseudocode. Insertion Sort Pseudocode. Implementation. Counting Sort Implementation. Insertion Sort Implementation. Testing. Counting Sort Test. Insertion Sort Test. Experimental ...
Information technology, 16 pages
2016 05 04
How to use mail merging
A to Z instructions how to make your office print the names, surnames and adress of the recepeients automatically in the letter. A fast and cumfortable way to send information to people only typing in the information you want all of the ...
Information technology, 6 pages
2016 01 03
Illusion of Anonymity in the internet. Do tools like Thor really work?
Illusion of Anonymity in the internet. Do tools like Thor really work?.
Information technology, 5 pages
2016 04 13
Information security
Information security. Author. What is information security? Information security, sometimes shortened to InfoSec. Computer system threats. Theft of intellectual. Antivirus program. Antivirus - a computer program designed to detect and ...
Information technology, 10 pages
2016 05 03
Information technology is popular nowdays
I would like to develop my information technology skills, because if you have great skills for it you may get a better, well-paid job, which would make life easier.As I said before, teachers require students to use information ...
Information technology, 1 page
2015 05 19
Investition in e - book
I am writting to inform you about the investment decision. While you could not attend in the presentations, we chose and decided to invest in Evan’s Griffith’s company.Evan Griffiths said: “I’m not worried by the competition from ...
Information technology, 1 page
2017 05 18
Speaking about my IT skills, I want to say what I want to develop my IT skills, because my understanding of information technology is average. I realize general things like the need to deal with a simple program. as well as many people know how ...
Information technology, 1 page
2017 04 04
It's high time most of us went on a digital media diet
It's high time most of us went on a digital media diet.
Information technology, 1 page
2016 05 29
Netwok security
Network security. Content. What Is Network Security? Network Security Threats. Network security components often include. What Is Network Security Firewall? However. What are the Business Benefits of Network Security? Simple Rules. Conclusion. ...
Information technology, 11 pages
2017 03 08
P2P Networks
P2P is technology, which allows to ,,communicate‘‘ without main server. Every computer is collecting data in P2P – every user allows to use his data when he is connected to the network. There is no concepts like ,,main server“ and client ...
Information technology, 13 pages
2017 05 18
Personal information on a website
Communication on the Internet is highly popular in the circle of young people. Lithuania is not an exception. More and more people making friends online. A good excample is my cousin who find her boyfriend online and they still are together. My ...
Information technology, 1 page
2016 04 13
Practical task: Computer Networks Basics
Practical task. computer networks basics. Practical task report. Netstat – a –. Netstat – a – b. Internet protocol configuration. Tracert Route print. Tracert Route print The tracert. Netstat – a Displays all connections and listening ...
Information technology, 9 pages
2017 05 03