Rating
CYBER BULLYING
Cyber Bullying
Cyber Bullying
Introduction
Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others". Cyber bullying is used to harass others through the use of cellular phones, instant messages, social network sites such ...
Rating
JUSTFABULOUS
JustFabulous
Table of Contents
Outline3
Introduction3
Discussion4
Description4
Visual Appeal5
Target Segmentation5
SWOT6
Navigation7
Conclusion8
References9
Appendices10
JustFabulous
Outline
This paper will be based over the following outline
Introduction
Discussion
Description
Visual Appeal
Target Segmentation
SWOT
Navigation
Virtual Store
Conclusion
Introduction
The JustFabulous website is a different type of online store that offers a membership program for people. The people are considered to be VIPs and the website gives the members access to information regarding ...
Rating
BIONICS
Bionics
Bionics
Limb Transplantation
Patients that have to be dealt with in the amputation surgery, are increasingly asking us to a tricky question: why not make a transplant after the amputation of hands or feet? Kidney, heart, lungs, liver, pancreas successfully transplanted from one person to another, is not it time to extend ...
Rating
Mashup is a Type Of Repetition
Introduction
A mashup is a web application that uses content from more than one source to create a single new service displayed in a single graphical interface. For example, you could combine the addresses and photographs of your library branches with a Google map to create ...
Rating
WEB ACCESSIBILITY
Web Accessibility
Web Accessibility
Introduction
The Web Accessibility is the issue of access to online content and services for disabled and elderly . Defined by standards techniques established by the Web Accessibility Initiative (WAI) World Wide Web Consortium (W3C), it requires treatment throughout the lifecycle of a website , for ...
Rating
PROGRAMMING
Data structures and algorithms
Table of Contents
Data Structure4
Array4
Heap4
Stack5
Queue5
Deque6
Ring Buffer6
Linked List7
Double Linked List7
Graph8
Hash Table9
Binary Tree10
Red-Black Tree10
Priority Queue10
B-Tree11
Directed Graph11
Weighted Graph12
Algorithms:12
Depth-first search,12
Breadth-first ,12
Dijkstra's algorithm,13
Floyd-Warshall algorithm,14
Ford-Fulkerson,14
Heap Sort,14
Basics15
Example:15
Shell Sort,15
Quick Sort,16
Radix Sort,16
Bucket Sort,17
Selection Sort,17
Merge Sort,18
Bubble Sort,18
Binary Search,19
Greedy Algorithm,19
Brute Force Algorithm,19
Divide and Conquer,20
Fibonacci search technique,20
Monte Carlo methods,20
Alpha-beta pruning21
Data structures and algorithms
Data Structure
Array
It is a linear ...
Rating
SPENDING ON SCIENCE
To What Extent can Science Assist the World in Becoming a
Better Place to live in Future
To What Extent can Science Assist the World in Becoming a
Better Place to live in Future
Introduction
Science and the human race have an authentic relationship. With time, there are great developments and ...
Rating
DATA HIDING TECHNIQUES
DATA HIDING TECHNIQUES
DATA HIDING TECHNIQUES
Data Streams NTFS
Windows operating systems are endowed with two little-known features hiding data: data streams NTFS (also known as alternate data streams) and admission to a list of resources on the basis of authorization Access-based Enumeration (ABE). Alternate data streams provide an ...
Rating
COMPUTER FORENSICS
Computer Forensics Tools
Name of Writer
Name of Institution
Computer Forensics Tools
Computer forensics is the study of law and computer science that analyze, evaluate and present the information in computer systems, networks, wireless communications, and storage devices in a way that is permissible by law. Since, computer forensics is a relatively new ...
Rating
HTML AND WWW
HTML and the WORLD WIDE WEB
Proposal In this term paper I would highlight the crucial aspect of the technological advancements which are the two notions of internet that got highly famous amongst our average knowledgeable minds. However, the terms have become a cliché which lead to create ...