Addressing the needs
-
This study aims to investigate how to maximize the opportunities that allow Bitcoin in contributing for Indonesia tax revenue and also, the respond to the growing issues of virtual money transactions in the world. This study uses Literature study method based on some previous research and scientific journals that discuss about Bitcoin as a means of payment in sale and purchase transactions. The results of this study Bitcoin transaction tax still needs to be addressed is the absence of Legal Basis and legislation on legality of Bitcoin as a recognized payment instrument in Indonesia.
5p longtimenosee09 08-04-2024 6 2 Download
-
This thesis explores the problem of wasteful fashion consumption in light of the current need for individuals to develop a sustainable way of living. The Agenda 21 report from the Rio Earth Summit (1992) determined that sustainable consumption is an issue to be addressed in terms of resource conservation, waste reduction and a reduction of production pollutants. To date, in Australia, there are no policies or strategies in place to reduce wasteful consumption from the consumer’s perspective and it is this research and policy deficit that this thesis research addresses.
127p runthenight07 01-03-2023 14 3 Download
-
This thesis addresses important issues about how to make game characters and virtual agents more realistic or believable by using cognitive-social personality theories. We begin motivation by discussing two examples. The first is from a television series and the second is a more concrete example that will be used throughout the thesis to explain concepts and the model. These examples represent the ideal goal of our work.
261p runthenight07 01-03-2023 7 3 Download
-
Fashion design education does not have a very long history in Sri Lanka. But the institutes have completed considerable number of years to review their curriculum approaches to revise for future trends and demands. At present, so far locally qualified fashion designers are applying fashion design in many unique ways according to each individual’s need. This research will identify their experience and practices. In doing so, the research will assist to understand the current position of the fashion designer within Sri Lanka’s fashion industry system to address the key research questions.
136p runthenight07 01-03-2023 10 4 Download
-
This dissertation addresses calls from both tourism and marketing researchers for a holistic framework and comprehensive examination of the role that the country cue plays in consumer behavior (Josiassen and Harzing 2008; Maheswaran et al. 2013). It provides much needed advancement to both the tourism and marketing research discipline by conceptualizing and empirically examining various pathways through which the country cue manifests in tourists’ and consumers’ behavior.
179p runthenight04 02-02-2023 9 3 Download
-
The purpose of this thesis is to examine the relationship between cultural values and the factors of service quality expectations, perceptions and behavioural intentions among Middle Eastern tourists in relation to Gold Coast accommodation. The literature is relatively silent in terms of examining these issues. Therefore, to address this gap, the present thesis examines the relationship between cultural values and each factor of expectations, perceptions and behavioural intentions of the Middle Eastern tourist in relation to the quality of Gold Coast accommodation services.
355p runthenight04 02-02-2023 7 2 Download
-
This thesis contributes to a better understanding of the relationship between residential energy efficiency and health. The thesis argues that residential energy efficiency improvements are complex interventions in complex socio‐technical systems.
765p runthenight04 02-02-2023 15 5 Download
-
The dissertation is composed of five chapters as follows: The importance of the topic, the definitions and the existing approaches are clearly addressed; Then, a comprehensive survey of the previous algorithms, existing work relating to interference detector are presented; Intermediated GNSS Spoofing detector based on angle of arrive; Sophisticated GNSS spoofing detector based on angle of arrive; Some limitations of the work are presented, along with possible solutions, which may need additional study.
135p viabigailjohnson 10-06-2022 11 3 Download
-
In the existing market, companies confront a fierce competition, so the need for new and efficient process for supply chain has become necessarily important. To this end, supply chain management among multi agent system is proposed for addressing the selection and evaluation process related to the inbound logistics.
10p tohitohi 22-05-2020 38 1 Download
-
The thesis examines and assesses the positive and negative impacts of foreign investment on economic security, points out the causes and contradictions that need to be addressed from the status of the impact of foreign investment. to economic security in Vietnam. Proposing views and solutions to promote positive impacts, limit negative impacts of foreign investment on economic security in Vietnam in the near future.
26p dungmaithuy 17-09-2019 54 5 Download
-
The purpose of this course is to address the implementation and desktop support needs of customers that are planning to deploy and support Microsoft Windows XP Professional in a variety of stand-alone and network operating system environments. It provides in-depth, hands-on training for Information Technology (IT) professionals responsible for the planning, implementation, management, and support of Windows XP Professional.
10p nomoney2 10-02-2017 40 2 Download
-
Research objectives: Clarifying the issues of basic argument for the preparation of human resources for Vietnam’s Defense industry; assessing the status preparing human resources for Vietnam’s defense industry of our country over the past time (both in terms of legislation and implementation); only the causes, the issues raised need to be addressed in preparing human resources for Vietnam Defense industry; proposing some perspectives and solutions primarily to perform tasks for preparing human resources for Vietnam’s Defense Industry in the coming time.
26p change03 06-05-2016 35 2 Download
-
Configuration requirements: (65 marks) 1. Calculating the subnet addressing for the lab using the VLSM technique and note all information needed on the topology.(10) 2. Perform Basic Router Configurations all Routers.(5) 3. In each LAN, configure the second usable host address for PC1 and the last usable host address for PC2.(5) 4. Enable routing on HQ, BRANCH1, and BRANCH2 by using the dynamic routing protocol as EIGRP.(Using wildcard mask, AS number = 1).(30) 5. Configure the static route for the Internet connection (10) 6.
2p anhchangxuixeo1002 14-03-2013 78 6 Download
-
This dissertation consists of three essays that address the issue of the business value of Information Technology (IT) in the context of the Internet economy. The first essay studies the productivity of IT in the context of pure Internet based companies or dot coms. Various dot coms are divided into two groups: “digital” dot coms whose product and service can be distributed in digital form, and “physical” dot coms whose product needs to be physically shipped to customers.
163p mualan_mualan 25-02-2013 59 7 Download
-
Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a standards-approved technology for speeding up network traffic flow and making it easier to manage. MPLS involves setting up a specific path for a given sequence of packets, identified by a label put in each packet, thus saving the time needed for a router to look up the address to the next node to forward the packet to. MPLS is called multiprotocol because it works with the Internet Protocol (IP), Asynchronous Transport Mode (ATM), and frame relay network protocols....
78p greenwind007 13-09-2012 154 44 Download
-
Choose the word whose underlined part is pronounced differently from the rest in each group A. English B. African C. Chinese D. American A. private B. Asian C. States D. Australia A. fromB. for C. problem D. contrary A. approached B. addressed C. needed D. washed A. property B. access C. possession D. prospect. Choose the word whose syllable is stressed differently from the rest in each group 6. A. continent B. belong C. master D. access
3p toiyeuvietnam0106 17-08-2012 126 22 Download
-
Calculating the subnet addressing for the lab using the VLSM technique and note all information needed on the topology.(10) 2. Perform Basic Router Configurations all Routers.(5) 3. In each LAN, configure the second usable host address for PC1 and the last usable host address for PC2.(5) 4. Enable routing on HQ, BRANCH1, and BRANCH2 by using the dynamic routing protocol as EIGRP.(Using wildcard mask, AS number = 1).(30)
2p phutran76 16-07-2012 96 16 Download
-
Calculating the subnet addressing for the lab using the VLSM technique and note all information needed on the topology. 2. Perform Basic Router Configurations all Routers. 3. In each LAN, configure the second usable host address for PC1 and the last usable host address for PC2. 4. Enable routing on HQ, BRANCH1, and BRANCH2 by using the dynamic routing protocol as EIGRP.(Using wildcard mask, AS number = 1).
2p phutran76 16-07-2012 147 59 Download
-
Calculating the subnet addressing for the lab using the VLSM technique and note all information needed on the topology. 2. Perform Basic Router Configurations all Routers. 3. In each LAN, configure the second usable host address for PC1 and the last usable host address for PC2. 4. Enable routing on R1,R2, R3, R4, R5 and R6 by using the dynamic routing protocol as EIGRP.
2p phutran76 16-07-2012 79 14 Download
-
Calculating the subnet addressing for the lab using the VLSM technique and note all information needed on the topology.(60 marks) In each LAN, configure the second usable host address for PC1 and the last usable host address for PC2.(5 marks) Perform Basic Router Configurations all Routers.(10 marks) Enable routing on R1, R2, R3 and R4 by using the static routing protocol.(5 marks)
2p phutran76 16-07-2012 72 6 Download