Order Now

View all "Computers" ready papers, essays and assignments

Prevent a lateral channel attack Introduction  The threats on the network are varied. One of them is the lateral channel attack, capable of exploiting vulnerabilities located in h...

Pirates and security threats on the Internet of Things Introduction Since the beginning of technology and throughout our life, it has revolutionized in an impressive way, having ad...

Online adult student education Introduction The online education boom is related to the technological developments that since 1990 introduced personal computers, allowing to integr...

New orientation of the financial world Introduction. Today, as in most sectors, the use of the tools offeredThis is very important to make a fairly detailed analysis of the new......

MEXICO EDUCATION PROBLEMS BY PANDEMIA As the country evolves, in which there is a series of processes leading to a gradual change and motivating to study the variants in their......

Media in Venezuela Introduction. The media in Venezuela began, in September 1808, with the arrival of the printing press. Brought from the island of Trinidad by artisans Matthew Ga...

Marketing in young people Introduction If there is something that today's young people dominate better than anyone, are technological tools. This aptitude is made most suitable for...

Labor absenteeism and its main causes  Introduction This work seeks to be carried out from a practical academic act, looking for the purpose of making a more transcendent approach...

Keys to maintain anonymity on the Internet Although in these times, when it becomes more complex to maintain anonymity on the Internet, especially since phishing is doing its own, ...

Key concepts and elements for business success The entire world knows the renowned Apple company created by Steve Jobs. What many do not know is how this was created, what......

Intranet Security Policy Introduction Security means having means that will reduce as much as possible, the vulnerability of information and resources; Although 100% security canno...

Intel as the company with more microprocessors in the world market Intel manufactures microprocessors found in most personal computers, tablets and smartphones in the world. Today ...

Information protection in the cloud in companies Introduction At present, technology has advanced drastically, companies have to move quickly so as notUse in the best way. As a com...

Impact of video games on youth violence Introduction. Throughout the last years there are many changes and evolution suffered by new technologies. Its impact has changed the percep...

ICT influences in sexuality With the arrival of information and communication technologies better known as ICT, they have caused a revolution in the way of communicating and relati...

IBM Foundation and Development (International Bussines Machines) IBM, International Bussines Machines, is a multinational technology and consulting company dedicated to the manufac...

Human Rights of the Third Generation The so -called human rights of the third generation demand public policies that develop them and the active collaboration of civil society. Thi...

How you can steal our information How can our information and what crimes comment Today we live surrounded in the world of computer science where personal computers or computers ar...

History of computers and their effects Desktop computers or “desk tops”, laptops and tablets have become such an important part of daily life that it can be difficult to rememb...

Harry Potter Warner Studio Introduction If you are a fan of Harry Potter and want to enter the magical world and Muggle of the best known fantasy saga in history,......

Guarantees network safety in your company Introduction Guarantees network safety in your company Network security is a topic of permanent debate and very concern for companies and ...

Enigma Code, The Language of Mathematics The actor Benedict Cumberbatch has been creative in the incarnation of isolated personality and social life and imposes his authority, and ...

Elon Musk and his software company Introduction In 1995, Elon Musk, his brother Kimbal Musk and a mutual friend, Gregory Kouri, founded, with a capital of 28.000 dollars, a softwar...

Elon Musk: An ambitious entrepreneur Introduction Elon Musk is an ambitious man and with the titanic objective of changing the world as we suffer it, since it is one of......

Electronic scrap, Environmental Problems The manufacture and use of electronic equipment increases accelerated worldwide in all areas where the human being develops, that is where ...

Effect of video games on children Introduction. We could say that playing is an activity that we do voluntarily to have fun. Nowadays children and adolescents are exposed to techno...

Edward Snowden: Brilliant NASA computer scientist Edward Snowden comes from an environment that already predestined it to a career as an American government official, his father wa...

Words: 1051

Pages: 4

Read more

Distance education during history Since time immemorial humanity has sought in different and extensive ways of transmitting the knowledge obtained through the years and experiences...

Defining the word "globalization" With the word "globalization", I mean the phenomenon that covers all areas at the planetary level, it became popular from the ...

Cyberspace: Types of Crimes In the beginning of the times “it was the word, then the writing, later the role and thus subsequently has reached computers and its interconnection i...

Cuban revolution and economic blockade Introduction.  The present work aims to demonstrate the situation of the Cuban economy after the implementation of commercial blockade in th...

Cryptographic algorithms and security Introduction Privacy is an issue that gives little relevance in the media. Companies such as Google or Microsoft have been subject to many acc...

Computer science and technological development of computers   The technological development of computers. The genesis of this indispensable instrument for humanity, according to N...

Computers: Brief History and Effects Today living without computers is extremely difficult, because this device has become a device of great importance for society, currently the v...

Computer piracy and how to prevent it Introduction The Internet and intelligent devices, without a doubt, have changed, for good, the way of communicating, working and doing busine...

Computer Management Processes of a company Introduction Currently no company can work without computer science, is that, through it, its use transforms the administration of resour...

Computer crimes, characteristics and more common forms in which they commit Introduction To begin crime on the Internet, it is aimed at the exploitation of information and communic...

Communication and sign language Introduction Talking about language and communication is a way of expressing ourselves, of talking about our ideas and thoughts in many different wa...

Business models in musical radios A business model is the plan prior to the business plan, which defines what you are going to offer to the market, how you are......

Brand extensions, good and bad Brand extensions are the capacity to create new product categories within a brand, which does not necessarily have to be focused on the company itsel...

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Find out the price
1 page / 275 words
Price: 13$