Information technology

25 documents
Benefits of Speech Recognition Software
Benefits of Speech Recognition Software. Žygimantas Jarusevičius PI15_c. Tips to be covered. Speech Recognition Definition Speech. Speech Recognition Definition. In computer science and electrical engineering. Speech Recognition Systems. SR ...
Information technology, 8 pages
2015 11 05
Information Technology skills
A young person today to use and is very important because many of the work to be carried out is drawn up in the computer, various slide presentations, even the student's diary is electronic. In addition, all of these things, not only helps in the ...
Information technology, 1 page
2016 02 28
Benefits of speech recognition
Disabled people can use input by voice as their main input method, and because of that with a proper training they are able to fully use computer, doing things they never thought could be possible. It allows them to communicate thru computer, ...
Information technology, 11 pages
2015 10 21
How Google works
The book consists of several separate chapters and each of them discusses a different topic. There are topics such as strategy, talent, decision-making, communication and innovation. For example, in the chapter about talent the authors talk about ...
Information technology, 2 pages
2017 06 14
3Ds Max task
Do the same with the edges on the other side.Now switch to Border mode (keyboard shortcut "3") and select all four borders of our shape (two on top + two on the bottom). Borders define holes in polygonal geometry.Hit the Cap button ...
Information technology, 9 pages
2015 11 04
Advantages and disadvantages of online shopping
Advantages and disadvantages of online shopping.
Information technology, 1 page
2015 11 10
Chart analysis
Number of factors could have effect on business profit contribution. For example some branches could exceed they planned targets because of increased pollution in that area maybe have good marketing method which increased sales. Branches which ...
Information technology, 3 pages
2016 10 27
Comparing the running times of two sorting algorithms
Introduction. Counting sort. Insertion sort. Design. Counting Sort Pseudocode. Insertion Sort Pseudocode. Implementation. Counting Sort Implementation. Insertion Sort Implementation. Testing. Counting Sort Test. Insertion Sort Test. Experimental ...
Information technology, 16 pages
2016 05 04
How to use mail merging
A to Z instructions how to make your office print the names, surnames and adress of the recepeients automatically in the letter. A fast and cumfortable way to send information to people only typing in the information you want all of the ...
Information technology, 6 pages
2016 01 03
Illusion of Anonymity in the internet. Do tools like Thor really work?
Illusion of Anonymity in the internet. Do tools like Thor really work?.
Information technology, 5 pages
2016 04 13
Information security
Information security. Author. What is information security? Information security, sometimes shortened to InfoSec. Computer system threats. Theft of intellectual. Antivirus program. Antivirus - a computer program designed to detect and ...
Information technology, 10 pages
2016 05 03
Information technology is popular nowdays
I would like to develop my information technology skills, because if you have great skills for it you may get a better, well-paid job, which would make life easier.As I said before, teachers require students to use information ...
Information technology, 1 page
2015 05 19
Investition in e - book
I am writting to inform you about the investment decision. While you could not attend in the presentations, we chose and decided to invest in Evan’s Griffith’s company.Evan Griffiths said: “I’m not worried by the competition from ...
Information technology, 1 page
2017 05 18
Speaking about my IT skills, I want to say what I want to develop my IT skills, because my understanding of information technology is average. I realize general things like the need to deal with a simple program. as well as many people know how ...
Information technology, 1 page
2017 04 04
It's high time most of us went on a digital media diet
It's high time most of us went on a digital media diet.
Information technology, 1 page
2016 05 29
Netwok security
Network security. Content. What Is Network Security? Network Security Threats. Network security components often include. What Is Network Security Firewall? However. What are the Business Benefits of Network Security? Simple Rules. Conclusion. ...
Information technology, 11 pages
2017 03 08
P2P Networks
P2P is technology, which allows to ,,communicate‘‘ without main server. Every computer is collecting data in P2P – every user allows to use his data when he is connected to the network. There is no concepts like ,,main server“ and client ...
Information technology, 13 pages
2017 05 18
Personal information on a website
Communication on the Internet is highly popular in the circle of young people. Lithuania is not an exception. More and more people making friends online. A good excample is my cousin who find her boyfriend online and they still are together. My ...
Information technology, 1 page
2016 04 13
Practical task: Computer Networks Basics
Practical task. computer networks basics. Practical task report. Netstat – a –. Netstat – a – b. Internet protocol configuration. Tracert Route print. Tracert Route print The tracert. Netstat – a Displays all connections and listening ...
Information technology, 9 pages
2017 05 03
Practical task: IPv4 Addressing Basics
3.2.9. Determine, if packet destination is in local or remote network:3.2.10. Does the default gateway IP address for your PC set correctly?3.2.12. Which subnet does your PC belongs to (please write your subnet IP address in ...
Information technology, 8 pages
2017 05 03
Programing languages
Programing languages. Content. Programming language Why people need a programing language. What is a Programming language? Why we need it? Operate the machine To. History of languages. Plankalkül Konrad Zuse. Short Code John William Mauchly. ...
Information technology, 15 pages
2017 01 13
Summary of Information Systems Security
Physical theft (fizinė vagystė) – involves the theft of hardware and software.Hacker (hakeris) – a person who attempts to gain unauthorised access to a computer-based information systems.Parasitic virus – a virus that ...
Information technology, 5 pages
2015 12 05
Telecommunication Verizon company
Verizon company. Introduction. Verizon is an American telecommunications company as well as broadband company. Company formation. Bell Atlantic merged. Verizon and Vodafone deal. After the official approval for the formation of the company. ...
Information technology, 12 pages
2017 03 15
Urderstanding clound computing
Understanding cloud computing. Introduction. Aim describe. What is cloud computing? A type of. Characteristics. On-demand self-service, broad network access. Deployment models. Service models. IaaS (infrastructure as a service). Advantages. ...
Information technology, 11 pages
2017 05 23
What is a programing language
What is a programing language. History of Programing languages. Uses of programing languages. Advantages and Disadvantages.
Information technology, 1 page
2017 01 13