Use of internet
-
The rapid and widespread use of the Internet has created a foundation for the increase in cyberbullying behaviors among school-age children. Hence, comprehensive understanding factors influencing cyberbullying will contribute towards future health policy to improve adolescent health. Objectives: To describe the prevalence of being cyberbullying and its related factors among junior high school in Hue city.
7p viharuno 03-01-2025 2 2 Download
-
Windows 8 introduced innovation for a new era of devices designed for mobility and touch. It’s designed for how you work and play, create, connect with people, and discover, while using the widest range of hardware, modern apps, and other cloud-connected services. Connected to the cloud, Windows 8 set out to push boundaries. It expanded the possibilities of the services you use every day, with new and beautiful apps for entertainment and productivity and a best-in-class browsing experience with Internet Explorer 10....
27p xuanhao1210 02-10-2013 138 3 Download
-
Document "Global social media usage" give you the knowledge: Internet regional overview, internet use, time spent on the internet, share of web traffic by device, average net connection speeds,...
376p pierre1991 03-01-2016 64 10 Download
-
This research is a single case study of the impact of the introduction of both information technology (software, hardware and Internet) and a company policy about IT use on the internal operations of a fire truck assembly company and its supply chain relationships. Using Action Research, the research focuses on a fire truck assembly company in Thailand, where supply chain efficiency was not improving and where costs of, and relationships with, both upstream suppliers and downstream clients in the supply chain were increasing.
306p runthenight04 02-02-2023 9 2 Download
-
This study was conducted to explore information-seeking processes among primary school children using the Internet in a school setting. This chapter outlines the rationale for the research, describes the importance of information seeking for primary school children, and articulates the research problems. The research objectives and questions are then discussed, followed by a description of contribution to knowledge. The chapter concludes by outlining the organisation of the thesis.
363p runthenight04 02-02-2023 7 3 Download
-
Identifying whether there are any differences between two groups with real estate purchase intention to live in, who prefer townhouse, villas and those interested in apartment building under the relationship between EWOM perception and real estate purchase intention in Vietnam. Proposing recommendations to use EWOM in developing information channels through the Internet in order to promote real estate market in Vietnam.
0p angicungduoc11 17-04-2021 38 4 Download
-
The research focuses on consumer intentions for eWOM and purchase in the period of internet connection. Therefore, targeted objects are identified as individual consumers from over 18 years of age, who are currently using social networks or online communication platforms, and can independently making purchase decision (called for connected spenders).
24p trinhthamhodang1217 14-01-2021 34 3 Download
-
This paper presents that lately call the sky toll with High Throughput Satellite (HTS) technology can be the best solution, especially in supporting government programs in accelerating the internet into the village.
9p lucastanguyen 01-06-2020 12 2 Download
-
A new model of banks conceptualized by the Reserve Bank of India (RBI) is popularly known as Payment Bank. As these banks cannot issue loans and credit cards, but both current and savings accounts can be operated by such banks. Money is the life blood of every economy.
8p guineverehuynh 17-06-2020 34 3 Download
-
This paper empirically examines the Internet of Things (IoT) and its implementation on the business and manufacturing process, in the Bosch which is situated in Bangalore.
5p guineverehuynh 18-06-2020 28 5 Download
-
This paper conceptualizes smart farming effectiveness and the main lessons that emanate from this paper are that Internet of Things (IoT), combined with big data, provides farmers with a wealth of information that they can use to maximize productivity in the vulnerable environment and maintain the quality of food in the supply chain.
5p guineverehuynh 20-06-2020 19 6 Download
-
In this paper, study is made for exploring supplier evaluation based on: (1) Evaluation parameters identified by 161 researchers from 1966 to 2012 (2) Scorecards used by Indian car manufacturing companies for evaluation of their suppliers and (3) International standard ISO/TS16949.
13p guineverehuynh 22-06-2020 9 0 Download
-
The main purpose of this study is to better understand how the post merger integration contributes to a successful merger or acquisition transaction. This study attempts to find out why the numbers of failures in M&A are so high. This study used data from two sources, primary and secondary data. The primary data was collected by in depth interviews. In fact, two interviews were done to achieve valuable information. Secondary data was collected from different sources such as libraries, journal articles, books, catalogues, textbooks and Internet.
98p nguyenyenyn117 18-06-2019 50 11 Download
-
Module 13: Implementing ISA Server 2004 Enterprise edition: Site-to-site VPN scenario. This module should prepare students to implement a scalable site-to-site VPN solution using ISA Server Enterprise Edition. The scenario will demonstrate how to implement a site-to-site VPN scenario that reflects a minimal but realistic set of business requirements.
10p nomoney2 10-02-2017 38 3 Download
-
This chapter is an introduction to the application layer. In the next eight chapters we introduce common client-server applications used in the Internet. In this chapter, we give a general picture of how a client-server program is designed and give some simple codes of their implementation. The area of network programming is a very vast and complicated one; it cannot be covered in one chapter. We need to give a bird’s-eye view of this discipline to make the contents of the next eight chapters easier to understand.
20p tangtuy09 26-04-2016 59 4 Download
-
The chapter has several objectives: To give a brief history of the Internet; To give the definition of the two often-used terms in the discussion of the Internet: protocol and standard; To categorize standard organizations involved in the Internet and give a brief discussion of each; To define Internet Standards and explain the mechanism through which these standards are developed; to discuss the Internet administration and give a brief description of each branch.
16p tangtuy09 26-04-2016 46 1 Download
-
In this chapter you will: To understand how firms create an internal database, to learn about building a database from a Web site, to become familiar data mining, to understand the advantages and disadvantages of of using secondary data, to understand the role of the Internet in obtaining secondary data, to learn about types of information management systems.
13p allbymyself_06 28-01-2016 65 4 Download
-
Use ISA Server to: Provide proxy and caching services to conserve Internet bandwidth. Configure dial-up connections to the Internet. Block all inbound network traffic. Provide secure configurations using network templates and server publishing wizards.
15p nhqkhtn 24-08-2013 90 4 Download
-
The Usefulness of Accounting and NonFinancial Information in Explaining Revenues and Valuations for Internet Firms Table 1.7 presents regression models for the average level of SAT scores across MSAs. Column A includes only the choice index as a regressor. It enters with a positive coefficient, implying that fully decentralized MSAs produce average SAT scores about forty points higher than do those with only a single district.
102p mualan_mualan 25-02-2013 55 7 Download
-
The Web has become the visible interface of the Internet Many corporations now use the Web for advertising, marketing and sales Web servers might be easy to use but… Complicated to configure correctly and difficult to build without security flaws They can serve as a security hole by which an adversary might be able to access other data and computer systems
19p muathu_102 28-01-2013 48 4 Download