Order Now

View all "Computers" ready papers, essays and assignments

Sydney and Construction Opera Design Summary In this PDF, the design and construction of the Sydney opera or the Sydney Opera house will be shown, when the architect had to......

Society and Deep Learning dependence The Deep Learning is not a recent research topic, in the year of 1950 Allan Turing made the publication of a research article called: Computing...

Services quality control insurance Introduction Quality management is an important issue in all types of company that offers different products or services, ISO 9001 2015, is one o...

Science and technology under human domain Science is implied as the knowledge obtained by empirical experiences. Man uses this creation to exceed obstacles in daily life, which ove...

Research designs Introduction This chapter will define the approach, method and techniques to be used in this research, which aims to design a pedagogical proposal based on educati...

Prevent a lateral channel attack Introduction  The threats on the network are varied. One of them is the lateral channel attack, capable of exploiting vulnerabilities located in h...

Pirates and security threats on the Internet of Things Introduction Since the beginning of technology and throughout our life, it has revolutionized in an impressive way, having ad...

Online adult student education Introduction The online education boom is related to the technological developments that since 1990 introduced personal computers, allowing to integr...

New orientation of the financial world Introduction. Today, as in most sectors, the use of the tools offeredThis is very important to make a fairly detailed analysis of the new......

MEXICO EDUCATION PROBLEMS BY PANDEMIA As the country evolves, in which there is a series of processes leading to a gradual change and motivating to study the variants in their......

Media in Venezuela Introduction. The media in Venezuela began, in September 1808, with the arrival of the printing press. Brought from the island of Trinidad by artisans Matthew Ga...

Marketing in young people Introduction If there is something that today's young people dominate better than anyone, are technological tools. This aptitude is made most suitable for...

Labor absenteeism and its main causes  Introduction This work seeks to be carried out from a practical academic act, looking for the purpose of making a more transcendent approach...

Keys to maintain anonymity on the Internet Although in these times, when it becomes more complex to maintain anonymity on the Internet, especially since phishing is doing its own, ...

Key concepts and elements for business success The entire world knows the renowned Apple company created by Steve Jobs. What many do not know is how this was created, what......

Intranet Security Policy Introduction Security means having means that will reduce as much as possible, the vulnerability of information and resources; Although 100% security canno...

Intel as the company with more microprocessors in the world market Intel manufactures microprocessors found in most personal computers, tablets and smartphones in the world. Today ...

Information protection in the cloud in companies Introduction At present, technology has advanced drastically, companies have to move quickly so as notUse in the best way. As a com...

Impact of video games on youth violence Introduction. Throughout the last years there are many changes and evolution suffered by new technologies. Its impact has changed the percep...

ICT influences in sexuality With the arrival of information and communication technologies better known as ICT, they have caused a revolution in the way of communicating and relati...

IBM Foundation and Development (International Bussines Machines) IBM, International Bussines Machines, is a multinational technology and consulting company dedicated to the manufac...

Human Rights of the Third Generation The so -called human rights of the third generation demand public policies that develop them and the active collaboration of civil society. Thi...

How you can steal our information How can our information and what crimes comment Today we live surrounded in the world of computer science where personal computers or computers ar...

History of computers and their effects Desktop computers or “desk tops”, laptops and tablets have become such an important part of daily life that it can be difficult to rememb...

Harry Potter Warner Studio Introduction If you are a fan of Harry Potter and want to enter the magical world and Muggle of the best known fantasy saga in history,......

Guarantees network safety in your company Introduction Guarantees network safety in your company Network security is a topic of permanent debate and very concern for companies and ...

Enigma Code, The Language of Mathematics The actor Benedict Cumberbatch has been creative in the incarnation of isolated personality and social life and imposes his authority, and ...

Elon Musk and his software company Introduction In 1995, Elon Musk, his brother Kimbal Musk and a mutual friend, Gregory Kouri, founded, with a capital of 28.000 dollars, a softwar...

Elon Musk: An ambitious entrepreneur Introduction Elon Musk is an ambitious man and with the titanic objective of changing the world as we suffer it, since it is one of......

Electronic scrap, Environmental Problems The manufacture and use of electronic equipment increases accelerated worldwide in all areas where the human being develops, that is where ...

Effect of video games on children Introduction. We could say that playing is an activity that we do voluntarily to have fun. Nowadays children and adolescents are exposed to techno...

Edward Snowden: Brilliant NASA computer scientist Edward Snowden comes from an environment that already predestined it to a career as an American government official, his father wa...

Words: 1051

Pages: 4

Read more

Distance education during history Since time immemorial humanity has sought in different and extensive ways of transmitting the knowledge obtained through the years and experiences...

Defining the word "globalization" With the word "globalization", I mean the phenomenon that covers all areas at the planetary level, it became popular from the ...

Cyberspace: Types of Crimes In the beginning of the times “it was the word, then the writing, later the role and thus subsequently has reached computers and its interconnection i...

Cuban revolution and economic blockade Introduction.  The present work aims to demonstrate the situation of the Cuban economy after the implementation of commercial blockade in th...

Cryptographic algorithms and security Introduction Privacy is an issue that gives little relevance in the media. Companies such as Google or Microsoft have been subject to many acc...

Computer science and technological development of computers   The technological development of computers. The genesis of this indispensable instrument for humanity, according to N...

Computers: Brief History and Effects Today living without computers is extremely difficult, because this device has become a device of great importance for society, currently the v...

Computer piracy and how to prevent it Introduction The Internet and intelligent devices, without a doubt, have changed, for good, the way of communicating, working and doing busine...

Pages: 1

(275 words)

Pages: 1

(275 words)

Pages: 2

(550 words)

Pages: 3

(926 words)

Pages: 11

(3000 words)

Pages: 4

(1100 words)

Pages: 2

(550 words)

Pages: 9

(2462 words)

Pages: 1

(275 words)

Pages: 1

(550 words)

Pages: 3

(825 words)

Pages: 3

(800 words)

Pages: 6

(1650 words)

Pages: 6

(1650 words)

Pages: 4

(1155 words)

Pages: 2

(550 words)

Pages: 1

(275 words)

Pages: 1

(275 words)

Pages: 3

(1650 words)

Pages: 1

(275 words)

Pages: 2

(550 words)

Pages: 1

(352 words)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Find out the price
1 page / 275 words
Price: 10$