Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
6 pages
1 file
The production of this report would not have been possible without the help, assistance and advice of a great many people at Jameson High School. I wish to express my greatest appreciation to the following people for assisting me during my work related period at Jameson High School; Mr R. Dube (Head of Departmet), Mr K. Paridzira (Sernior
Checking switch status Relocating and reforming a computer system Replacement of UPS machines Installation of windows OS Internet troubleshooting/Network configuration Networking Installation of printers in machines Arranging IT stores. Ethernet cable design ii.
2004
On behalf of the Organizing Committee and the International Program Committee, we welcome you to the 2 nd International Conference on Information and Communication Technologies (ICT 2004). Every effort has been made to make this a fruitful research forum and an enjoyable event.
The paper presents some of the results obtained within the ongoing project related with functional requirements and design models of secure workstation for special applications (SWSA). SWSA project is directed toward the combination of the existing hardware and software virtualization with cryptography and identification technologies to ensure the security of multilevel classified data by means of some formal methods. In the paper the requirements for SWSA, its hardware and software architecture, selected security solution for data processing and utilized approach to designing secure software are presented. The novel method for secure software design employs dedicated tools to verify the confidentiality and the integrity of data using Unified Modeling Language (UML) models. In general, the UML security models are embedded in and simulated with the system architecture models, thus the security problems in SWSA can be detected early during the software design. The application of UML topology models enables also to verify the fundamental requirement for MLS systems, namely the hardware isolation of subjects from different security domains.
Microelectronics Reliability
During the last twenty five years the fields of computer networks and data communications advanced rapidly in diverse parts of communications and computer industry, covering a wide spectrum that encompass local area networks, wireless networks, satellite communications, high-speed data transfer networks, etc. Two decades ago, few people had access to a network. Nowadays, computer communication has become an essential part of our infrastructure. Almost, every business enterprise, large or small, schools, at all grade levels from elementary to postgraduate , federal, state, and local-government offices, and even the entire industry, is using computer networks in order to provide the users with instantaneous access to information located in all places around the world. Today, the Internet has grown into a production communication system that reaches millions of people in all countries of the world. Doubtlessly, data communications and networking represent the fastest growing technologies nowadays. This book gives a broad view of the basic principles in data communications and networking. The authorÕs intention was to present the fundamentals of computer networks organization and data transfer principles rather than enter into more superficial discussions of modern networks design. The material is divided into seven parts, with a total of 31 chapters, 11 appendices, a list of frequently used acronyms, glossary of technical terms, and an extensive index. The book covers the following subjects: Part I-Overview of Data Communications and Networking (chapters 1 and 2) is just an introduction. Chapter 1 (Introduction, pp. 3-25) addresses four issues: data communications, networks, the Internet, and protocols and standards. Chapter 2 (Network Models, pp. 27-44) concentrates on a general idea of the layers of network and discusses the function of each. Part II-Physical Layer (chapters 3 to 9) deals with the physical layer of the Internet model. Chapter 3 (Signals, pp. 49-84) discusses the advantages and disadvantages of digital transmission over analog transmission.
ITdesk.infoproject of computer e-education with open access digital literacy movement building modern society e -learning e -inclusion open access human rights to education and information PREFACE Today's society is shaped by sudden growth and development of the information technology (IT) resulting with its great dependency on the knowledge and competence of individuals from the IT area. Although this dependency is growing day by day, the human right to education and information is not extended to the IT area. Problems that are affecting society as a whole are emerging, creating gaps and distancing people from the main reason and motivation for advancement-opportunity. Being a computer illiterate person today means being a person who is unable to participate in modern society, and a person without opportunity; and despite the acknowledged necessity and benefits of inclusive computer literacy from institutions like the European Commission, UNESCO, OECD, there are still groups of people having difficulties accessing basic computer education viz. persons with disabilities, persons with learning difficulties, migrant workers, unemployed persons, persons that live in remote (rural) areas where IT education is not accessible.
Advances in Intelligent and Soft Computing, 2012
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
Journal of Information Technology and Its Utilization (JITU), 2019
Journal of Information Technology and Its Utilization is a journal published by the BBPSDMP Kominfo Makassar with the aim of disseminating information on scientific developments in information technology area and its utilization. The manuscript published in this journal is derived from research, scientific study conducted by researchers, academics and information technology expert. Publish with frequency of 2 times a year, namely in June and December. PERSON IN CHARGE Chief of Balai Besar Pengembangan SDM dan Penelitian Komunikasi dan Informatika Makassar.
Guía latinoamericana de diagnóstico psiquiátrico. Versión revisada, 2012
The Mega-project at Motza (Moza): The Neolithic and Later Occupations up to the 20th Century. New Studies in the Archaeology of Jerusalem and its Region. Supplementary volume. Israel Antiquities Authority: Jerusalem. Pp. 163-199, 2020
Jurnal Pendidikan Dan Pembelajaran, 2014
Possession and Dispossession
Journal of The American Oil Chemists Society, 2009
Biochemistry, 2004
The 3rd International Electronic Conference on Environmental Research and Public Health—Public Health Issues in the Context of the COVID-19 Pandemic, 2021
Μετεκπαιδευτικά Μαθήματα Ένωσης Ουρολόγων Πειραιά, 2009
International Journal of Cancer, 2007