Digital world

Sort By:
Page 50 of 50 - About 500 essays
  • Better Essays

    MALICIOUS DETECTION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT C.VINODHINI Mr.S.Sakthivel Dept.name of org:ME(AE),dept of ECE Dept.name of org:AP,dept of ECE Vivekanandha College Of Vivekanandha College Of Engineering For Women Engineering For Women City,Country:Elayampalayam,India City,Country:namakkal,India vinoblossom@gmail.com sakthiece@gmail

    • 2651 Words
    • 11 Pages
    Better Essays
  • Decent Essays

    advertising efforts into digital and social media venues (Hoffman et al., 2014). Researchers estimate that approximately two-thirds of alcohol marketing is conducted via new media. Famous music, movies, and television shows have noticeable references to alcohol and drugs, these references as well as the move of advertising to digital and social media venues. The research team of Hoffman et al. continued research of the links among social media use and alcohol-related digital marketing. College students

    • 1951 Words
    • 8 Pages
    Decent Essays
  • Good Essays

    Educational Podcast Analysis Jessica Vandeventer Description Activity Educational Podcasts Information This project will be used to gain an understanding of where to find audio sources and the importance of implementing them in a classroom environment. Points 100 Points Total Due Date Project is due January 30, 2017 1. What is the URL (web site) that you downloaded or listened to the Podcast from? http://www.scienceupdate.com/2017/01/bee-stings-2/ http://www.scienceupdate.com/2017/01/insects-in-winter-2/

    • 1117 Words
    • 5 Pages
    Good Essays
  • Decent Essays

    Why Direct Mail Marketers Love Variable Data Printing Keywords: variable data printing, variable printing, digital printing Persona: Direct Marketing Daryl Photo options: http://depositphotos.com/40101833/stock-photo-printing-machine.html http://depositphotos.com/13123801/stock-photo-hand-reaching-images-streaming-as.html http://depositphotos.com/22715635/stock-photo-distributing-information-in-a-digital.html http://depositphotos.com/23356664/stock-photo-junk-mail-flyers.html Today, brands play

    • 1134 Words
    • 5 Pages
    Decent Essays
  • Better Essays

    Over the last few years, podcasting has continued to grow in both audience and programming. However, most of those listening to the podcasts are in the minority of the American public and about half of the country hasn’t even heard of the term podcasting and they don’t know what it means. Those that produce podcasts have continued to try and experiment with different revenue streams throughout the year and some have moved beyond the standard method of downloading to get people to listen. Podcast

    • 1460 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Contents For your safety Get started Keys and parts Insert the SIM card Switch the phone on Lock the keys and screen Charge your phone Connect the headset Your first H-phone? Set up your phone Explore your tiles, apps, and settings Navigate inside an app Use the touch screen Transfer content to your H-PHONE Basics What’s new in this release? Get to know your phone Accounts Personalize your phone Accessibility Take a screenshot

    • 1234 Words
    • 5 Pages
    Better Essays
  • Decent Essays

    allowed to be executed efficiently by the development of software techniques. High-resolution measurements are performed, leading to the commercially available digital photography, which can be used to measure surface deformation down to one part per million of images. The use of suitable software techniques The sources of the images vary from digital cameras, macroscopes, microscopes, conventional CCD, high-speed video and

    • 940 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    The security aspects of Lisk are on the higher side. Since the applications are built on the sidechains, the failure of an application does not affect the Lisk network which is not the case in many other blockchain platforms. All aspects of the Lisk system is secured using cryptographic hash techniques. The EdDSA technique is adopted in Lisk as it does hashing fast and provide high security. Along with the security provided using public and private keypairs, additional security is provided using

    • 973 Words
    • 4 Pages
    Decent Essays
  • Better Essays

    Neopets Case Study Essay

    • 1242 Words
    • 5 Pages

    Neopets – Case Study As per the Neopets website, Neopets is an online youth-focused virtual world whose primary focus is to allow members to create and take care of virtual pets. In addition to virtual pets, it also offers games, auctions, trades and messaging. Neopets have been created in 11 languages and generates more than 5 billion pageviews per month. With nearly 200 games, weekly contests, discussion boards, plots and thousands of virtual items to collect, Neopets members are as passionate

    • 1242 Words
    • 5 Pages
    Better Essays
  • Decent Essays

    Cryptograpy Exam

    • 655 Words
    • 3 Pages

    1. What are some threats associated with a direct digital signature scheme? a. The scheme validation is dependent on the security of the sender’s private key, which the sender can later claim lost or stolen and that the signature was forged when trying to deny sending a particular message. b. If a private key is stolen from Bob at time t, the thief can send a message signed with Bob’s signature with a time stamp equal to or less than t. c. The need for trust between 2 participants is a potential

    • 655 Words
    • 3 Pages
    Decent Essays