Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse

Esimese labori vorm (0)

1 Hindamata
Punktid

Lõik failist

Esimese labori vorm #1
Punktid Tasuta Faili alla laadimine on tasuta
Leheküljed ~ 1 leht Lehekülgede arv dokumendis
Aeg2015-03-09 Kuupäev, millal dokument üles laeti
Allalaadimisi 5 laadimist Kokku alla laetud
Kommentaarid 0 arvamust Teiste kasutajate poolt lisatud kommentaarid
Autor keeksirull Õppematerjali autor

Sarnased õppematerjalid

thumbnail
11
pdf

Projekt

Tallinna Tehnikaülikool Raadio- ja sidetehnika instituut Projekt ainetes ,,IRT0030 Andmeside" ja ,,IRT0100 Kommunikatsioonivõrkude struktuurid ja teenused" teemal «VoIP teenus» Üliõpilane: Ruslan Karpovits Õpperühm: IATM Matrikli nr: 050829 Õppejõud: Avo Ots Tallinn 2008 Author's word This project is written to show some interesting aspects of working with VoIP (Voice over Internet Protocol) service. The project briefly describes the process of finding a solution for based VoIP problem and its realization.

Andmeside
thumbnail
276
docx

Inglise keel unit 5 answers

1. (a) (i) gene length of DNA; codes for a (specific), polypeptide / protein / RNA; max 1 allele alternative form of a gene; found at a, locus / particular position on, a chromosome; max 1 (ii) assume allele refers to coat colour allele (coat colour) gene / alleles, only on X chromosome; A no (coat colour), gene / allele, on Y chromosome male cats, XY / only have one X chromosome; males have only one (coat colour) allele / cannot have two (coat colour) alleles; need black and orange alleles for tortoiseshell colour; 2 r r w w (b) parental genotypes C C × C C ; r w gametes C , C ; F1 genotypes and pheno

Inglise keel
thumbnail
120
doc

Lühendite seletus

A... AA Auto Answer AAA Authentication, Authorization and Accounting AAB All-to-All Broadcast AAC Advanced Audio Coding AACS Advanced Access Control System AAL Asynchronous Transfer Mode Adaption Layer AAM Automatic Acoustic Management AAP Applications Access Point [DEC] AARP AppleTalk Address Resolution Protocol AAS All-to-All Scatter AASP ASCII Asynchronous Support Package AAT Average Access Time AATP Authorized Academic Training Program [Microsoft] .ABA Address Book Archive (file name extension) [Palm] ABAP Advanced Business Application Programming [SAP] ABC * Atanasoff-Berry Computer (First digital calculating machine that used vacuum tubes) ABEND Abnormal End ABI Application Binary Interface ABIOS Advanced BIOS ABIST Automatic Built-In Self-Test [IBM] ABLE Adaptive Battery Life Extender + Agent Building and Learning Environment [IBM] ABM Asynchronous Balanced Mode ABR Available Bit Rate ABRD

Informaatika
thumbnail
18
docx

Vormistamine ülesanne 3

Edith D. de Leeuw, Joop J. Hox, Don A. Dillman INTERNATIONAL HANDBOOK OF SURVEY METHODOLOGY ÜLESANNE Õppeaines: SISSEJUHATUS ERIALASSE Tehnoloogia ja ringmajanduse instituut Õpperühm: Juhendaja: Tallinn 2021 TABLE OF CONTENTS 2 1 THE CORNERSTONES OF SURVEY RESEARCH 1.1 Introduction The idea of conducting a survey is deceptively simple. It involves identifying a specific group or category of people and collecting information from some of them in order to gain insight into what the entire group does or thinks; however, undertaking a survey inevitably raises questions that may be difficult to answer. How many people need to be surveyed in order to be able to describe fairly accurately the entire group? How should the people be selected? What questions should be asked and how should they be posed to respondents? In addition, what data collectio

Andme-ja tekstitöötlus
thumbnail
10
doc

Automaatika referaat (eng)

Tallinna Polütehnikum Automation Author: TomTom2 Group :AA-09 Instructor: Marina Zotikova Tallinn 2010 Contents Introduction......................................................................................................................3-4 Person Knowledge Technologies supports......................................................................4-6 Online Essay Evaluation Service.....................................................................................6-7 WordNet lexical database................................................................................................7-8 Practice Online (TPO)......................................................................................................8-9 Conclusion..........................

Automaatika
thumbnail
140
pdf

Thesis Kivimaa August 2022

Thesis “How is it possible to calculate IT security effectiveness?” Kristjan Kivimaa August 2022 1 Abstract In IT Security world, there is lack of available, reliable systems for measuring security levels/posture. They lack the range of quantitative measurements and easy and fast deployment, and potentially affects companies of all sizes. Readily available security standards provide qualitative security levels, but not quantitative results – that would be easily comparable. This deficiency makes it hard for companies to evaluate their security posture accurately. Absence of security metrics makes it complicated for customers to select the appropriate measures for particular security level needed. The research question for this research project is – “How is it possible to calculate IT security effectiveness?”. The aim of this research is to use this reference m

Infotehnoloogia
thumbnail
5
docx

Inglise keele sõnad ADVERTISING

THE INTERNET AND E-COMMERCE 1. ISP ­ it is a organization that provides internet access. The internet service provider. 2. e-tailing - the selling of goods and services on the Internet or through e- mail solicitation. 3. B2C.- business-to-consumer, selling to the public on the internet. 4. e-procurement - 5. B2G ­ business-to-goverment, business applay for government contracts and pay taxes. 6. shopping cart ­ Shopping cart is where you put product you have purchased from online shop. 7. last mile problem ­ how to deliver products, purcased on internet to the customers 8. bricks-and-mortar shop ­ Brick and mortar shops are physical shops where customers interact face-to-face. They are opposite to online shops. TELEMARKETING 1. telemarketing ­ for of direct marketing, where telemarketers call to their customers 2. cost per inquiry, cost per order ­ its how they measure the success of telemarketing compaigns 3. cold calling ­ It

Inglise keel
thumbnail
13
pdf

Boolean Functions and their Cryptographic Criteria

2018 Boolean Functions and their Cryptographic Criteria * Univeristy of Tartu, Estonia Lomonosov Moscow State University, Russia Contents 1. Introduction ..................................................................................................................................... 3 2. Boolean functions and their representations ................................................................................. 4 2.1 Truth table ............................................................................................................................... 4 2.1.1 Disjunctive normal form .................................................................................................. 4 2.1.2 Conjunctive normal form ................................................................................................ 5 2.2 Algebraic normal for

krüptograafia




Meedia

Kommentaarid (0)

Kommentaarid sellele materjalile puuduvad. Ole esimene ja kommenteeri



Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun