intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Understanding the internet

Xem 1-20 trên 68 kết quả Understanding the internet
  • The rapid and widespread use of the Internet has created a foundation for the increase in cyberbullying behaviors among school-age children. Hence, comprehensive understanding factors influencing cyberbullying will contribute towards future health policy to improve adolescent health. Objectives: To describe the prevalence of being cyberbullying and its related factors among junior high school in Hue city.

    pdf7p viengfa 29-09-2024 2 2   Download

  • The overall purpose of this study is to develop a set of criteria with which policy makers can evaluate their domain name policies, in order to improve the usability of domain names for end users. Specifically the study aims to: develop an understanding of the Australian domain name industry; identify the role of standards and policies; analyse and compare domain name policies; investigate the domain name system from the perspective of end users; and develop criteria to evaluate domain name policy, in order to improve end user usability.

    pdf128p runthenight04 02-02-2023 3 3   Download

  • Lecture Electronic commerce - Chapter 4: Consumer behavior, market research, and advertisement learning objectives: Describe the factors that influence consumer behavior online. Understand the decision-making process of consumer purchasing online. Describe how companies are building one-to-one relationships with customers. Explain how personalization is accomplished online. Discuss the issues of e-loyalty and e-trust in EC. Describe consumer market research in EC.

    ppt55p caphesuadathemtac 09-11-2021 28 4   Download

  • Lecture Electronic commerce - Chapter 17: Legal, Ethical, and Compliance Issues in EC learning objectives: Understand the foundations for legal and ethical issues in EC. Describe civil, intellectual property, and common law. Understand legal and ethical challenges and how to contain them. Explain privacy, free speech, and defamation and their challenges. Discuss the challenges caused by spam, splogs, and pop-ups. Describe types of fraud on the Internet and how to protect against it.

    ppt42p caphesuadathemtac 09-11-2021 16 4   Download

  • The object (for students) in this course is: To learn how to interpret statistical summaries appearing in journals, newspaper reports, internet, television, etc; to learn about the concepts of probability and probabilistic reasoning; to understand variability and analyze sampling distribution; to learn how to interpret and analyze data arising in your own work (course work or research).

    pdf6p koxih_kothogmih1 03-08-2020 25 2   Download

  • The main purpose of this study is to better understand how the post merger integration contributes to a successful merger or acquisition transaction. This study attempts to find out why the numbers of failures in M&A are so high. This study used data from two sources, primary and secondary data. The primary data was collected by in depth interviews. In fact, two interviews were done to achieve valuable information. Secondary data was collected from different sources such as libraries, journal articles, books, catalogues, textbooks and Internet.

    pdf98p nguyenyenyn117 18-06-2019 49 11   Download

  • The main purpose of this study is to better understand the U.S economy recovery in order to know if the recent crisis will be followed by another one much bigger or if the United States will be fully recovered. Through this study, it will examine the current strengths and weaknesses of the U.S economy. This work is based on two sources, primary data and secondary data. The primary data has been collected by three deep interviews and one questionnaire whereas the secondary data have been selected from several sources such as articles, books, libraries, Internet.

    pdf99p nguyenyenyn117 18-06-2019 29 5   Download

  • The researcher intended to address this fact within this dissertation and to understand whether the traditional retail banks are competitive towards the Internet banking and if the CRM have a positive impact on the customer loyalty in traditional banking? The study could contribute to the bank managers in France in order to help them in their actual strategy and the orientation of their future strategy. However the study could also be useful for bank managers in other countries.

    pdf112p nguyenyenyn117 18-06-2019 49 6   Download

  • The purpose of this research is to find out the three main reasons about the low adoptability of internet banking in the villages of Haryana state in India. Here researcher consider the seven basic reason of low adoptability of internet banking such as 1) high rate of illiteracy, 2) fear of fraud, 3) unable to afford cost of internet, 4) lack of awareness about internet banking, 5) languages barriers, 6) unavailability of internet network connection and 7) unbanked villages.

    pdf79p nguyenyenyn117 17-06-2019 57 5   Download

  • In this chapter, you will learn to: Differentiate between two categories of cryptography schemes; understand four aspects of security; understand the concept of digital signature; understand the role of key management in entity authentication; know how and where IPSec, TLS, and PPG provide security.

    ppt41p tangtuy09 26-04-2016 57 3   Download

  • Upon completion you will be able to: Understand the difference between an internet and an extranet, understand private, hybrid, and virtual private networks, understand how VPN can guarantee privacy, understand the mechanism of NAT.

    ppt14p tangtuy09 26-04-2016 74 7   Download

  • In this chapter you will learn: Understand the shortcomings of IPv4; know the IPv6 address format, address types, and abbreviations; be familiar with the IPv6 header format; know the extension header types; know the differences between ICMPv4 and ICMPv6; know the strategies for transitioning from IPv4 to IPv6.

    ppt63p tangtuy09 26-04-2016 59 3   Download

  • After studying this chapter you will be able to: Understand how the DNS is organized, know the domains in the DNS, know how a name or address is resolved, be familiar with the query and response formats, understand the need for DDNS.

    ppt41p tangtuy09 26-04-2016 66 4   Download

  • Upon completion you will be able to: Understand the connections needed for FTP file transfer be familiar with FTP commands and responses know the differences between FTP and TFTP be familiar with TFTP message types understand TFTP flow and error control.

    ppt26p tangtuy09 26-04-2016 57 3   Download

  • Upon completion you will be able to: Review the features of an ATM WAN, understand how an a datagram can pass through an ATM WAN, understand how an IP packet is encapsulated in cells, understand how cells are routed in an ATM network, understand the function of ATMARP.

    ppt28p tangtuy09 26-04-2016 36 2   Download

  • After studying this chapter you will be able to: Be familiar with the ICMP message format, know the types of error reporting messages, know the types of query messages, be able to calculate the ICMP checksum, know how to use the ping and traceroute commands, understand the modules and interactions of an ICMP package.

    ppt51p tangtuy09 26-04-2016 52 4   Download

  • In this chapter students will be able to: Understand the format and fields of a datagram, understand the need for fragmentation and the fields involved, understand the options available in an IP datagram, be able to perform a checksum calculation, understand the components and interactions of an IP package.

    ppt61p tangtuy09 26-04-2016 50 3   Download

  • Upon completion of this lesson, the successful participant will be able to: Understand the need for ARP, understand the cases in which ARP is used, understand the components and interactions in an ARP package, understand the need for RARP.

    ppt34p tangtuy09 26-04-2016 50 3   Download

  • Upon completion you will be able to: Know the purpose of IGMP, know the types of IGMP messages, understand how a member joins a group and leaves a group, understand membership monitoring, understand how an IGMP message is encapsulated, understand the interactions of the modules of an IGMP package.

    ppt28p tangtuy09 26-04-2016 44 3   Download

  • When you finish this chapter, you should: Be able to explain process-to-process communication, know the format of a UDP user datagram, be able to calculate a UDP checksum, understand the operation of UDP, know when it is appropriate to use UDP, understand the modules in a UDP package.

    ppt30p tangtuy09 26-04-2016 46 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1248 lượt tải
207 tài liệu
1470 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2