StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Cloud Computing and Virtualization Logic & Programming Essay
5 pages (1576 words) , Download 0 , Essay
Free
It provides means for a government organization and private companies to address the issues of agility of service and budget issues. Concurrently, new business models based on cloud computing are defined debated and implemented in various fields. Smart implementation of cloud-based services requires state-of-the-art architecture and cost-effective techniques.
Preview sample
Applying Agile Methodology to Object-Oriented Software Development Logic & Programming Coursework
5 pages (1419 words) , Download 0 , Coursework
Free
This has led to the shift from the phase-based software development processes to the current methods that are aimed to tackle the development of quality software, one of the methodologies is the Agile methodologies which have proved to be more viable in the object software development (Soria 2012, pp. 216). The Agile methodologies' origin is Japan.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Software Engineering Issues Logic & Programming Coursework
5 pages (1395 words) , Download 0 , Coursework
Free
Testing each module is an essential function of software engineering, and thus, should be performed throughout the development process (James 2008). Although testing is generally performed when the software development process is nearly at its end, this is considered a wrong practice as it results in consuming more time and money to correct errors.
Preview sample
Spear-Phishing Issues Logic & Programming Report
5 pages (1521 words) , Download 0 , Report
Free
Phishing attacks have recently become a common phenomenon in computing. Phishing refers to exploratory attacks that are carried out by criminals to obtain the personal and sensitive data of a computer user. The attacks take the form of disguised emails, impersonation in phone calls, or even impersonated websites.
Preview sample
Software Testing Tools Logic & Programming Assignment
5 pages (1374 words) , Download 0 , Assignment
Free
The software can be tested effectively and efficiently in a fast way. These test tools offer a platform for the identification of bugs in software. Identification of errors or bugs in software and fixing of the same is much cheaper than fixing it at later stages. To ensure quality therefore testing has to be done well and perfectly (Ron, 2005).
Preview sample
Django Web Framework Logic & Programming Essay
5 pages (1328 words) , Download 0 , Essay
Free
Django provides developers with a standard way to code (Holocaty & Kaplan-moss, 2008). Developers have a standard way of syntax and calling methods and utilize the advantages provided by Python. Python has a clean syntax reinforced by a huge library of modules and standards which enables developers to perform almost everything they want.
Preview sample
Distributed Processing Logic & Programming Assignment
5 pages (1385 words) , Download 0 , Assignment
Free
It interacts with various subsystems like the application, operating system, external databases, etc. It resides as a medium of interaction between two or more layers and also has a lot of other functionalities to overcome the issues as shown in the following points. They also highlight the different ways in which interfacing is done in these subsystems.
Preview sample
Random-Access Memory Issues Logic & Programming Coursework
5 pages (1327 words) , Download 0 , Coursework
Free
Some are classified as internal and others are external memory. The internal memory stores data while the computer program is running, for example, random-access memory. This is an electronic chip that has short term ability to memorize data. The external memory or auxiliary memory can keep the information and data for quite a long time.
Preview sample
Impacts of Geo-Tagging Technology Logic & Programming Coursework
5 pages (1689 words) , Download 0 , Coursework
Free
Between 2009 to 2010, social communication websites such as Facebook, and Twitter, have experienced a rapid rise with the number of new applicants, and YouTube doubling in size every few months (Nations, 2010). In the year 2010, is when location-based services, such as social communication websites, are being integrated into everything.
Preview sample
Database Design and Implementation Logic & Programming Math Problem
5 pages (1593 words) , Download 1 , Math Problem
Free
It will support the online store website and it allows users to query this information and search for albums. The Albums will include an audio CD, vinyl record, audio cassette, and downloadable MP3. The price of albums varies depending on the format, e.g. a vinyl record is typically more expensive than an audio CD of the same album.
Preview sample
Internet Protocol Version 6 (IPv6) Issues Logic & Programming Research Paper
5 pages (1481 words) , Download 0 , Research Paper
Free
The Internet protocol version is an advancement of the precursor Internet Protocol Version four (IPv4) commonly referred to as the Internet protocol (IP). The field of networking technology has a long history since the invention of the internet in 1969. The Internet Protocol Version four (IPv4) has been in use since then.
Preview sample
Cryptographic Overhead of IPSec Protocol Suite Logic & Programming Research Paper
5 pages (1779 words) , Download 0 , Research Paper
Free
There is a need for effective security measures and mechanisms to ensure the security of these communications. The most common services of IPSec implementation are VPN (virtual private networking) services that can be used over existing networks, e.g. Internet, can provide the secure transfer of sensitive data over a public network.
Preview sample
Authors Comments on Paper Review and Assessment Logic & Programming Assignment
5 pages (1252 words) , Download 0 , Assignment
Free
When a process moves from one step to another, predicted volatility is expected to quantify the amount of gross churn, which is likely to take place as a task is accomplished. Volatility is an important concept from the management point of view, intended to correlate parameters as project planning exercises with that of "budgeted versus actual".
Preview sample
IT Landscape - Data Mining Logic & Programming Literature review
5 pages (1654 words) , Download 0 , Literature review
Free
The paper "IT Landscape - Data Mining" is an outstanding example of a management literature review. Data mining is a process of extracting hidden or covered analytical information from a massive collection of data or databases. Basically, it is an amazing ground-breaking technology with the wide-ranging power to facilitate every kind of business or industry to put their attention on the most significant data.
Preview sample
Logistics Management of Zara Logic & Programming Case Study
6 pages (1736 words) , Download 1 , Case Study
Free
The paper "Logistics Management of Zara" is a perfect example of logic and programming case study. Zara is a clothing company located in Coruna in North West Spain. The company was recently rated among the world’s fastest-growing companies. Zara owes this reputation to the nature of the company’s supply chain. For instance, the company has a successful chain designed in such a manner that it guarantees lower inventory levels hence totally eradicating product obsolescence; a major difficult strategy to implement by Zara’s major competitors.
Preview sample
Data Modeling and Poor Structured Data Models in Databases Logic & Programming Assignment
8 pages (1289 words) , Download 0 , Assignment
Free
The paper “Data Modeling and Poor Structured Data Models in Databases” is an excellent example of a logic & programming assignment. Here are entities and primary key. The following are entities listed in a table. The job history table is where the worker's details are recorded once hired for a job by the CEPA it is used when they are looking for a candidate to hire.
Preview sample
The Logistical Process of Exporting Goods Logic & Programming Coursework
6 pages (1770 words) , Download 0 , Coursework
Free
The paper "The Logistical Process of Exporting Goods" is a good example of Logic and Programming coursework. Trade is increasingly becoming a global connecting factor. Logistics and supply chain management systems have emerged as one of the crucial aspects of the trade. These systems ensure that goods and services transcend different borders within maximum ease.
Preview sample
An Ontology of Tasks for Common Appliances and Stuation Types Logic & Programming Thesis
21 pages (6353 words) , Thesis
Nobody downloaded yet
First level ontology for methods is an application of the problem-solving knowledge with the control knowledge. This is the stage in which the goals and the goal sub-goal tree that is induced. Second level ontologies are inclusive of the methods including the characterization of the ways in which the problem solving is to be done.  
Preview sample
Visiblity Optimization for Categorical Data Logic & Programming Term Paper
12 pages (3421 words) , Download 0 , Term Paper
Free
A point with a high saliency level does not have similarities with its surrounding points nor its background. This makes it outstanding. Its saliency is determined by the surround within the surrounding radius. The computation of this measure is mainly based on the color differences with the surrounding. It also depends on the center point.
Preview sample
The Current Status of Motion Detection, Event Detection and Situation Awareness Logic & Programming Thesis
47 pages (15369 words) , Thesis
Nobody downloaded yet
We are at a time where computing power, server space, video capture equipment, and networking technology have sufficiently expanded to make remarkable influences in motion detection, event detection, and situation awareness. The most viable aspect of these developments is the capability to browse over large amounts of stored data.
Preview sample
Java Collections Framework Logic & Programming Essay
6 pages (1677 words) , Download 0 , Essay
Free
The Java collections framework defines a set of interfaces and their implementations to manipulate collections, which serve as a container for a group of subjects such as a collection of emails or a set of words in a dictionary (Naftalin Maurice & Wadler Philip, 2009). These frameworks allow one to store, retrieve, and update a set of objects; it also provide an API to work with the data structures, such as lists, sets, maps, and trees.
Preview sample
Evaluation of Software Development Packages for Mobile Applications Logic & Programming Research Paper
17 pages (4475 words) , Download 0 , Research Paper
Free
Mobile users are now adapting to the use of Smartphones due to their extra functionality and services. Smartphones are therefore being adopted in environments where integrity and confidentiality utmost vital. In order to understand the Smartphone, it is prudent to state the three levels of Smartphone software.
Preview sample
Revolution of High Performance Computing Logic & Programming Essay
10 pages (2725 words) , Download 0 , Essay
Free
Conventional CPU technology does not have the capability of scaling in performance adequately to handle this demand. The parallel processing capacity of the general processing units (GPUs) helps to subdivide complex computing tasks that may be run at the same time. This is helping computational researchers and scientists deal with many of the most challenging computational issues in the world.
Preview sample
Relevance of Twitter in Marketing Campaigns Logic & Programming Essay
9 pages (2675 words) , Download 0 , Essay
Free
An underlying problem in marketing is identifying target communities or people who identify with a product, followers, or a brand or organization. Another key concern in marketing remains to build trust and long-term relationships with customers. A problem also arises in matters that concern creating marketing content that relates well to the needs of specific target markets.
Preview sample
Requirements Analysis in the Field of Software Engineering Logic & Programming Term Paper
15 pages (3702 words) , Download 0 , Term Paper
Free
The expectations are classified in terms of environment, constraints, mission objectives, and suitability and effectiveness measures6. These requirements include operational deployment or distribution; related or performance parameters; mission scenario; utilization environments; effectiveness requirements; environment; and operational lifecycle.
Preview sample
Modelling Passenger Flow for the new King Abdul-Aziz International Airport Logic & Programming Thesis
39 pages (10222 words) , Thesis
Nobody downloaded yet
The study findings show that there is a reduction by 25% for the check-in and 75% in the passport control, and 25% reduction with the security area registered as the best scenario for the normal check-in in term of the time spent since most of the passenger spent less than 50 minutes at the terminal crosses the three main areas.  
Preview sample
Classical Controller Design Strategy Logic & Programming Lab Report
6 pages (1679 words) , Download 1 , Lab Report
Free
The design uses Matlab for the Mathematical workouts and Simulink for the simulation of the designed controller to attain the required state of stability. The design controller in this experiment uses the single-axis camera controller for experimentation with the controller design. The experimentation and details refer to/apply to the single-axis controller.
Preview sample
A Mobile Application for 2086 Game Logic & Programming Case Study
6 pages (1717 words) , Download 0 , Case Study
Free
Since it may be hard to make an app for mobile operating systems, it is prudent to make one that will cover a population.  This follows the fact that android is the most popular mobile OS. For a starter project, it is always good to start with a game that is popular. One of the most popular games in 2048 games.
Preview sample
Strategy of Solving the Problem Logic & Programming Math Problem
7 pages (1922 words) , Download 0 , Math Problem
Free
In solving the problem above the first individual organized information in a table in order to enhance his understanding by extracting the key information that would help to solve the problem such as the number of plates chipped, the number of plates cracked, the number of plates chipped and cracked and the number of plates without chips and cracks
Preview sample
Evolution of Information Transfer Protocols Logic & Programming Assignment
11 pages (2942 words) , Download 0 , Assignment
Free
Given the fact that files are very vital resources in data communication, it is therefore important that remote access is available to enable file sharing and creation of files remotely. For this reason, there have been developments to make data transfer effective and efficient. The Internet has been seen to be the driver of this evolution. 
Preview sample
Digital Divide and Social Impact Logic & Programming Assignment
6 pages (1730 words) , Download 0 , Assignment
Free
The difference in the availability and accessibility of digital technology is defined by the challenges posed by physical factors such as computer availability and connections.It is through the digital divide that countries have been challenged in that they are looking for ways to reduce this issue of the digital divide internally and externally. 
Preview sample
Back Ground And Definesions for Delay Tolerant Network Logic & Programming Assignment
9 pages (2797 words) , Download 0 , Assignment
Free
Data fusion in this type of routing would fail as data aggregation may not occur in address-centric routing particularly when data is coming from wireless communication devices (Stojmenovic, 2005, p.495). Nodes in DTN are mobile and connectivity is only established when nodes are within range of each other (Abraham & Jebapriya 2012, p.44).
Preview sample
Language as a Means of Communication in Every Culture Logic & Programming Report
12 pages (3266 words) , Download 0 , Report
Free
The main objective of this paper is to provide critical analysis of the article by Kevin McGovern, Adoption is better than abortion.  This will be through a provision of the rationale for choosing the article, critical approach to discourse analysis, the structure of the article, the position of the reader, and the use of the article to provide an analysis of its relationship with language and power.
Preview sample
Neural Networks and Fuzzy Systems Logic & Programming Assignment
9 pages (2196 words) , Download 0 , Assignment
Free
The Multilayer Perceptron neural network is possibly the most well-known and well used neural network and was developed to solve more challenging problems, “The Multilayer Perceptron neural networks are constituted by a set of sensor units forming the input layer, one or more hidden layers, and an output layer of computational nodes” (Nedjah and Mourelle, 2005, p. 185). Each neuron within an MLP can be connected to one or all neurons in the following layer.
Preview sample
Architecture and Techniques for Data Warehousing and Data Mining Logic & Programming Research Paper
6 pages (1683 words) , Download 0 , Research Paper
Free
Organizations have been actively implementing data warehousing technology, which facilitates enormous enterprise-wide databases. As a result, the amount of data that organizations possess is growing at a phenomenal rate. The next challenge for these organizations is how to interpret the data and how to transform it.
Preview sample
Computer Network: Botnet Problem Logic & Programming Research Paper
10 pages (2613 words) , Download 0 , Research Paper
Free
For one to understand the intricacies of network securities, a good knowledge of a network is crucial. A computer network is also known as a data network; it is a telecommunications network to facilitate the transmission of data from one node (device) to another. In the communications network, the medium used to connect these computers is called the data link.
Preview sample
Cyber-Security Issues Logic & Programming Assignment
13 pages (3587 words) , Download 2 , Assignment
Free
In this attack, hackers stole private information about customers such as passwords, credit card numbers, etc. which was only meant for the company. According to Moore (2017), the attack was in progress for about 5 months before it was realized and he argues that some experts believed the Equifax data breach was due to an older vulnerability.
Preview sample
Internet Protocol 4 (IPv4) vs Internet Protocol 6 (IPv6) Logic & Programming Essay
5 pages (1250 words) , Download 0 , Essay
Free
The addressing system of IPv4 is 32-bit which accommodates only four billion varied addressed devices. As such, this ever-rising demand for IP addresses led to research work into developing a new IP address scheme with a large capacity of address space and/or that is capable of excluding quite several Internet devices from public addressing.
Preview sample
DOS Attacks as Easy Tools for Hackers Logic & Programming Case Study
5 pages (1401 words) , Download 0 , Case Study
Free
The main goal of Denial of Service or DOS attack is to deny valid Internet and Network users from the services of the target system or network or server. It launches an attack that prevents the use of services that are offered to legitimate users by the Network. In other words, the DOS attack is described as an attack in which the memory clogged.
Preview sample
Revenue Models Used by Game Producers Logic & Programming Research Proposal
7 pages (1977 words) , Download 0 , Research Proposal
Free
The increasing popularity of this industry has captured the interests of the Government, trade associations, as well as other promoters who have expressed keen interest in the growth potential of this emerging industry. The UK for instance enjoys tax incentives for the development of online games, with similar policies being adopted by other countries in the EU as well such as Germany and France.
Preview sample
Application of Computer Software SimaPro5.1 Logic & Programming Report
5 pages (1496 words) , Download 0 , Report
Free
The necessity for this Software has arisen because of the need to forecast the cascading effects, adverse or otherwise, of manufacturing processes and services on the surrounding environment as a significant part of global environmental audit and the need to preserve the ecological life systems. This software has been structured according to the ISO Guidelines for Life Cycle Assessment (LCA).
Preview sample
Programmable Logic Controllers Logic & Programming Case Study
12 pages (2344 words) , Download 0 , Case Study
Free
A Modular PLC is a PLC that comes in modules for inputs and outputs. The basic structure of a modular PLC contains a main CPU and input and output modules. The main CPU contains a power supply and communication terminals that connect the modules to the main CPU and Connects the PLC to the other PLCs, computers, or communication devices. 
Preview sample
JavaScript Wrapper Logic & Programming Report
6 pages (1856 words) , Download 1 , Report
Free
These are errors that occur (as the name suggests) while the script is running. These errors result from JavaScript that has the correct syntax but encounters a problem in its execution environment. Mainly runtime errors result from trying to access a variable, property, method, or object that does not exist or from attempting to utilize a resource that is not available.
Preview sample
The REDD+ Program Logic & Programming Report
5 pages (1556 words) , Download 1 , Report
Free
There are proposals being made to include forest conservation in the next commitment period of the protocol. Inclusion of forest conservation is highly significant for tropical countries such as Brazil where a large amount of carbon is emitted from fossil fuel emissions and deforestation (Moutinho, Santilli, Schwartzman & Rodrigues, n.d).
Preview sample
A Comparison of Programming Languages Logic & Programming Coursework
5 pages (1358 words) , Download 1 , Coursework
Free
In terms of supporting multithreading, ruby and python have been designed to support multithreading functionality. In python, there is the Global interpreter lock while in Ruby, there is the Global VM lock. Another feature comparison among the three languages is the interactive development with the interpreter. 
Preview sample
Critical Analysis of an Article Logic & Programming Essay
5 pages (1275 words) , Download 1 , Essay
Free
The author Bryan Walsh analyzed in his writing that every social movement has a starting point. He supported his idea with the examples of civil actions, anti-war movements, and environmentalism. He conveyed that each of the issues under these categories had victims, an impact on society, and a solution that was somehow discovered.
Preview sample
Prejudice, Stereotypes and Discrimination Logic & Programming Essay
5 pages (1359 words) , Download 1 , Essay
Free
On the other hand, discrimination is the negative actions or behavior directed toward an individual or group of people in the society based on race, social class, sexual orientation, or gender, among other factors, according to Baumeister and Bushman (393). Stereotypes pertain to negative generalizations about the characteristics of members of a particular group in society usually. 
Preview sample
How does a Computer Program Work Logic & Programming Research Paper
5 pages (1250 words) , Download 1 , Research Paper
Free
They have evolved immensely over time yet the main components stay unharmed. The first commercial PC was the Altair 8800 and it sold for a nominal price of 395usd (Parsons, June). Ever since PCs have been popular and now we have laptops, notebooks, and tablets which are compact versions of the same thing.
Preview sample
Civil and Criminal Categories of the No Electronic Theft Act: Criminal Copyright Infringement Logic & Programming Research Paper
5 pages (1250 words) , Download 1 , Research Paper
Free
The No Electronic Theft Act was passed by the United States of America in the year 1997. This law applies to individuals who indulge in violation of copyright rules even in cases where is no financial or commercial profit involved. The concerned individuals are either subjected to five-year prison or can be fined up to 250,000.
Preview sample
Understanding Linux Network Internals Logic & Programming Case Study
6 pages (1967 words) , Download 1 , Case Study
Free
An operating system (OS) is a set of basic programming instructions to computer hardware, forming a layer of instructions on which other applications and functions of the computer are built. The programming code that is the core of the operating system is called the kernel. Code is a general term that refers to instructions written in a computer programming language.
Preview sample
    51 - 100 results of 675 items
    We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
    Contact Us