Tallinna Tehnikaülikool Raadio- ja sidetehnika instituut Projekt ainetes ,,IRT0030 Andmeside" ja ,,IRT0100 Kommunikatsioonivõrkude struktuurid ja teenused" teemal «VoIP teenus» Üliõpilane: Ruslan Karpovits Õpperühm: IATM Matrikli nr: 050829 Õppejõud: Avo Ots Tallinn 2008 Author's word This project is written to show some interesting aspects of working with VoIP (Voice over Internet Protocol) service. The project briefly describes the process of finding a solution for based VoIP problem and its realization.
1. (a) (i) gene length of DNA; codes for a (specific), polypeptide / protein / RNA; max 1 allele alternative form of a gene; found at a, locus / particular position on, a chromosome; max 1 (ii) assume allele refers to coat colour allele (coat colour) gene / alleles, only on X chromosome; A no (coat colour), gene / allele, on Y chromosome male cats, XY / only have one X chromosome; males have only one (coat colour) allele / cannot have two (coat colour) alleles; need black and orange alleles for tortoiseshell colour; 2 r r w w (b) parental genotypes C C × C C ; r w gametes C , C ; F1 genotypes and pheno
A... AA Auto Answer AAA Authentication, Authorization and Accounting AAB All-to-All Broadcast AAC Advanced Audio Coding AACS Advanced Access Control System AAL Asynchronous Transfer Mode Adaption Layer AAM Automatic Acoustic Management AAP Applications Access Point [DEC] AARP AppleTalk Address Resolution Protocol AAS All-to-All Scatter AASP ASCII Asynchronous Support Package AAT Average Access Time AATP Authorized Academic Training Program [Microsoft] .ABA Address Book Archive (file name extension) [Palm] ABAP Advanced Business Application Programming [SAP] ABC * Atanasoff-Berry Computer (First digital calculating machine that used vacuum tubes) ABEND Abnormal End ABI Application Binary Interface ABIOS Advanced BIOS ABIST Automatic Built-In Self-Test [IBM] ABLE Adaptive Battery Life Extender + Agent Building and Learning Environment [IBM] ABM Asynchronous Balanced Mode ABR Available Bit Rate ABRD
Edith D. de Leeuw, Joop J. Hox, Don A. Dillman INTERNATIONAL HANDBOOK OF SURVEY METHODOLOGY ÜLESANNE Õppeaines: SISSEJUHATUS ERIALASSE Tehnoloogia ja ringmajanduse instituut Õpperühm: Juhendaja: Tallinn 2021 TABLE OF CONTENTS 2 1 THE CORNERSTONES OF SURVEY RESEARCH 1.1 Introduction The idea of conducting a survey is deceptively simple. It involves identifying a specific group or category of people and collecting information from some of them in order to gain insight into what the entire group does or thinks; however, undertaking a survey inevitably raises questions that may be difficult to answer. How many people need to be surveyed in order to be able to describe fairly accurately the entire group? How should the people be selected? What questions should be asked and how should they be posed to respondents? In addition, what data collectio
Tallinna Polütehnikum Automation Author: TomTom2 Group :AA-09 Instructor: Marina Zotikova Tallinn 2010 Contents Introduction......................................................................................................................3-4 Person Knowledge Technologies supports......................................................................4-6 Online Essay Evaluation Service.....................................................................................6-7 WordNet lexical database................................................................................................7-8 Practice Online (TPO)......................................................................................................8-9 Conclusion..........................
Thesis “How is it possible to calculate IT security effectiveness?” Kristjan Kivimaa August 2022 1 Abstract In IT Security world, there is lack of available, reliable systems for measuring security levels/posture. They lack the range of quantitative measurements and easy and fast deployment, and potentially affects companies of all sizes. Readily available security standards provide qualitative security levels, but not quantitative results – that would be easily comparable. This deficiency makes it hard for companies to evaluate their security posture accurately. Absence of security metrics makes it complicated for customers to select the appropriate measures for particular security level needed. The research question for this research project is – “How is it possible to calculate IT security effectiveness?”. The aim of this research is to use this reference m
THE INTERNET AND E-COMMERCE 1. ISP it is a organization that provides internet access. The internet service provider. 2. e-tailing - the selling of goods and services on the Internet or through e- mail solicitation. 3. B2C.- business-to-consumer, selling to the public on the internet. 4. e-procurement - 5. B2G business-to-goverment, business applay for government contracts and pay taxes. 6. shopping cart Shopping cart is where you put product you have purchased from online shop. 7. last mile problem how to deliver products, purcased on internet to the customers 8. bricks-and-mortar shop Brick and mortar shops are physical shops where customers interact face-to-face. They are opposite to online shops. TELEMARKETING 1. telemarketing for of direct marketing, where telemarketers call to their customers 2. cost per inquiry, cost per order its how they measure the success of telemarketing compaigns 3. cold calling It
2018 Boolean Functions and their Cryptographic Criteria * Univeristy of Tartu, Estonia Lomonosov Moscow State University, Russia Contents 1. Introduction ..................................................................................................................................... 3 2. Boolean functions and their representations ................................................................................. 4 2.1 Truth table ............................................................................................................................... 4 2.1.1 Disjunctive normal form .................................................................................................. 4 2.1.2 Conjunctive normal form ................................................................................................ 5 2.2 Algebraic normal for
Kõik kommentaarid