Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse
✍🏽 Avalikusta oma sahtlis olevad luuletused! Luuletus.ee Sulge

Internet ( slaidid ) - sarnased materjalid

internet, work, network, protocol, other, email, networks, global, arpa, develop, first, message, sent, communication, serve, technology, node, host, address, arpanet, developed, across, layer, part, load, suite, electronic, university, wide, growth, others, share, structure, location, another, send, names, numbers, server, users, academic, linked
thumbnail
11
pdf

Projekt

Conclusion ............................................................................................................................... - 10 - Referencies .............................................................................................................................. - 11 - -3- Introduction VoIP is a solid technology available since some years that allows people to communicate via voice using the IP protocol instead of telephone lines. Unfortunately this technology has been relegated in a niche market due to several factors such as proprietary standards, high price tag, limited integration with existing telephony environments. However in the last couple of years the situation changed dramatically since some open source tools such as asterisk as well as low-cost VoIP telephone adapters and services become available. In fact, today it is quite common for

Andmeside
68 allalaadimist
thumbnail
3
doc

Tööstuslik andmeside kontrolltöö 2 abimaterjal - vastused

oData transparency: In bit and byte oriented protocols, there is a problem if a control character (for ETX (End of Text) ·Same as ETB, only no more blocks will follow. ITB (End of > Differences with HDLC ­ length of protocol field (1B or 2B) byte-oriented protocols) or the start-of-frame flag (for bit-oriented protocols) appears in the actual data. Intermediate Transmission Block) ·Same as ETB, except that the receiving statio Differs from HDLC because of multiaccess MAC that provides · Maximum payload length (default: 1500) This was not likely to happen in ASCII text, but is very likely with binary data. This is known as a data will not acknowledge after the error checking

Tööstuslik andmeside
29 allalaadimist
thumbnail
102
pdf

Kommunikatsioonimudel

standarditele (tarkvarale). Kaks osapoolt samal kihil suhtlevad protokollide abil. Kuid standardeid on vaja ülemistele kihtidele ostatavate teenuste tarvis(alumiselt kihilt tuleb ülemisele teenus). 7. TCP/IP mudel Pakett erinevates kihtides: sõnum rakenduskihis, segment transpordikihis, datagramm võrgu kihis, kaader(frame) kanalikihis ISO OSI mudeli ja TCP/IP mudeli vaheline võrdlus: 8. Internet ja hajusrakendused Võrgus võib olla miljoneid ühendatud seadmeid: *hostid, lõppsüsteemid(PC, serverid, PDA, aga ntks ka rösterid) * kommunikatsiooni ühendused(fiiber, raadiovõrgud, satelliit) *ruuterid(edastada andmepakette läbi võrgu) Protokollid on selleks, et kontrolida võrgus sõnumite saatmist

Tehnoloogia
16 allalaadimist
thumbnail
120
doc

Lühendite seletus

A... AA Auto Answer AAA Authentication, Authorization and Accounting AAB All-to-All Broadcast AAC Advanced Audio Coding AACS Advanced Access Control System AAL Asynchronous Transfer Mode Adaption Layer AAM Automatic Acoustic Management AAP Applications Access Point [DEC] AARP AppleTalk Address Resolution Protocol AAS All-to-All Scatter AASP ASCII Asynchronous Support Package AAT Average Access Time AATP Authorized Academic Training Program [Microsoft] .ABA Address Book Archive (file name extension) [Palm] ABAP Advanced Business Application Programming [SAP] ABC * Atanasoff-Berry Computer (First digital calculating machine that used vacuum tubes) ABEND Abnormal End ABI Application Binary Interface ABIOS Advanced BIOS ABIST Automatic Built-In Self-Test [IBM]

Informaatika
117 allalaadimist
thumbnail
9
docx

Big data in cloud

Hadoop) have eased the burden. [3] - Velocity. Data streams in at an unprecedented speed and must be dealt with in a timely manner. RFID tags, sensors, and smart metering are driving the need to deal with torrents of data in near-real time. [3] - Variety. Data comes in all types of formats – from structured, numeric data in traditional databases to unstructured text documents, email, video, audio, stock ticker data, and financial transactions. [3] With its extensive volumes, it needs to be stored somewhere, so it could be easily accessed and then processed. The best storage location we have for it, for now, is the cloud, or in other words, the deep web. A good analogy is of an iceberg, where the part which is above the water level is the part, that the user can see and interact with. And the part below is comprised of the database and

Algoritmid ja andmestruktuurid
2 allalaadimist
thumbnail
2
pdf

Inglise keele sõnad

microchips ­ tiny pieces of silicon containing complex electronic circuits  design ­ to make or draw plans for something  financial ­ relating to money or how money is managed  electronic ­ involving the use of electric current in devices such as TV sets or computers  Internet ­ the large system of connected computers around the world  print ­ to produce text and pictures using a printer  unformatted ­ a disk that is completely blank, so information can't be recorded onto it  Extranet ­ a network that allows communication between a company and the people it deals with  transmission ­ the process of sending data over a communication channel  reboot ­ to restart the computer, without switching it off completely  microbrowser ­ a web browser designed for small screens on hand­held devices  software engineer ­ a person who designs and maint

Inglise keel
5 allalaadimist
thumbnail
138
docx

Sissejuhatus infotehnoloogiasse konspekt

formuleeritud, selgeid, algoritmilisi probleeme ei saa garanteeritult algoritmiga lahendada. 1. Lepime sellega, et mõnes olukorras ei õnnestu vastust leida 2. Valime vahel juhuslikult, ehk: teeme vahel vigu  The five types of information that are the only types the computer commonly manipulates:  Visual (pictures)  Numeric (numbers)  Character (text)  Audio (sound)  Instructions (programs) Modern computers work in a system of numbers called binary numbers  Binary numbers:  Similar to familiar decimal system.  Uses only two symbols: 0 and 1.  The choice of using binary numbers is dictated by cost and reliability.  Binary circuits:  Electronic circuits are cheapest and most reliable if they only assume two states or conditions.

Sissejuhatus...
241 allalaadimist
thumbnail
12
docx

Värvitud Petri võrgud CPN eksami konspekt

reproduced, systematic error investigation) 2 Introduction CPN • CPN is a graphical language for concurrent system design and analysis and also general-purpose modelling environment and also applicable for industrial projects and high level programming. • Petri nets provide(– graphical notation– modelling concurrency, communication, synchronisation) • CPN application domains that are typical(– communication protocols, data networks, distributed algorithms) • Broader CPN applications for concurrent systems(– business processes and workflows, manufacturing systems, multi- agent systems)  CPN models are(– executable and used to model and specify the behaviour of concurrent systems- events cause the system to change states – simulations of the model to investigate different scenarios and explore the behaviour – simulations is to debug and investigate the system design –

Värvitud Petri võrgud
2 allalaadimist
thumbnail
40
doc

Introduction of SCM

INTRODUCTION OF SUPPLY CHAIN MANAGEMENT (SCM) A supply chain is a network of facilities and distribution options that performs the functions of procurement of materials, transformation of these materials into intermediate and finished products, and the distribution of these finished products to customers. Supply chains exist in both service and manufacturing organizations, although the complexity of the chain may vary greatly from industry to industry and firm to firm. Supply chain management is typically viewed to lie between fully

2 allalaadimist
thumbnail
16
docx

Social media information and data collection and security

Privacy and data protecion topics are becoming more and more important and the amouts of data generated is becoming larger. When wrongly access this kind of data, a lot damage could be done by criminals. Users privacy settings should be reviewd and fixed when needed. Social media Humans have always felt the need to socialize. Constantly. From the early ages to the signs and speech, from letters to telegram, from phones to internet, need to communicate has become less of an hussle and more convenient and accessible. In our modern society social media usage is constantly rising. For example since January 2016 to January 2017 active social media users have increased by 21% and internet users have increased by 10%. Our every day life is internet connection, sharing information, expressing ideas, liking and disliking content. It helps us to feel connected to the world and

Inglise keel
2 allalaadimist
thumbnail
44
doc

IT arhitektuur

1.The Conceptual Architecture identifies the high-level components of the system, and the relationships among them. Its purpose is to direct attention at an appropriate decomposition other system without delving into details. Moreover, it provides a useful vehicle for communicating the architecture to non-technical audiences, such as management, marketing, and users. Logical Architecture In Logical Architecture, the externally visible properties of the components are made precise and unambiguous through well-defined interfaces and component specifications, and key architectural mechanisms are detailed. The Logical Architecture provides a detailed "blueprint" from which

It arhitektuur
77 allalaadimist
thumbnail
14
docx

Trojan horse

Utility hidden controls allow you to do with the computer all that they laid the author: to take or send files, start and destroy them, display messages, erase, reboot the computer, etc. Trojan-PSW - stealing passwords When you start looking for PSW-Trojan sictemnye files stored on a range of confidential information (usually phone numbers and passwords to access the Internet) and send it to the specified code in the "Trojan" e-mail address or addresses. Trojan-Clicker - Internet clickers. This family of Trojans, whose main function - the organization of unauthorized access to Internet resources. Trojan-Downloader - Ships other malware Trojan horses of this class are designed to download and install on the victim machine new versions of malicious programs, install Trojans or advertising systems. Trojan-Dropper - installers other malware As a result of using this class of software hackers reach two goals: a secretive installation of

inglise teaduskeel
2 allalaadimist
thumbnail
40
doc

Veebiteenused (kordamisküsimused ja vastused kontrolltööks)

VEEBIT EENUSED. KONT ROLLTÖÖ. SOA o A service-oriented architecture (SOA) is an architectural pattern in computer software design in which application components provide services to other components via a communications protocol, typically over a network. The principles of service-orientation are independent of any vendor, product or technology. o Kasutab XMLi sõnumivahetuseks o Võimalus integreeride süsteeme Service-oriented architecture (SOA)  Arhitektuur, mis kasutab – teenuseid organisatsiooni integrastiooni ehitusklotsidena – komponentide taaskasutust läbi nõrga seotuse. SOA: On arhitektuur  Mingi hulga teenuste tegemine ei anna meile SOA-d.

Programmeerimine
55 allalaadimist
thumbnail
5
docx

All about High Tech

high investment in high-tech sectors of the economy. High-tech startup enterprises receive a large portion of venture capital. However, if, as has happened in the past, investment exceeds actual potential, then investors can lose all or most of their investment. High tech is often viewed as high risk, but offering the opportunity for high profits. Like Big Science, high technology is an international phenomenon, spanning continents, epitomized by the worldwide communication of the Internet. Thus a multinational corporation might work on a project 24 hours a day, with teams waking and working with the advance of the sun across the globe; such projects might be in software development or in the development of an integrated circuit. The help desks of a multinational corporation might thus employ, successively, teams in Kenya, Brazil, the Philippines, or India, with the only requirement fluency in the mother tongue, be it Spanish, Portuguese or English.

Inglise keel
24 allalaadimist
thumbnail
11
doc

Using Blogs as a Platform in the TEFL

UNIVERSITY OF TARTU DEPARTMENT OF ENGLISH Using Blogs as a Platform in the Teaching of English as a Foreign Language Research paper Tartu 2010 ABSTRACT This work analyses the usefulness of blogging in teaching English as a foreign language. The definition of the term `blog' is provided along with the advantages and disadvantages of blogs' usage in practice. The analysis of language skills developed by students throughout the use of blogs for learning purposes is given in the paper with possible limitations that blogs have. Author of this paper also shares personal comments about the experience in the field. In this paper it is also

Inglise keel
8 allalaadimist
thumbnail
10
doc

Industry of television and video technics

...........................................................10 2 1. Video Technics Inc 1.1 About Video Technics Video Technics Inc., a worldwide supplier of cutting-edge broadcast products, continues to pioneer the way digital media is ingested, edited, produced, and played to air. Offering much more than its signature feature-packed, robust, scalable servers, the company also delivers innovative and reliable complete end-to-end global broadcasting solutions for the corporate, financial, government, education and postproduction sectors. Established in Atlanta, Georgia in 1987, VT has consistently delivered the most feature-packed and affordable solutions to the broadcast industry. Video Technics' ApellaTM and NewsFlowTM solutions streamline the entire production process from automated ingest, to edit, production, playout to air, to archive and feature proxy creation, and unparalleled asset management

Geograafia
9 allalaadimist
thumbnail
21
docx

SISSEJUHATUS ITSSE

corporation until merging with Siemens in 1990. 1953 IBM shipped its first electronic computer, the 701 Speedcoding: John Backus. 1954 Texas Instruments announces the start of commercial production on silicon transistors. Herbert Simon and Allen Newell unveiled Logic Theorist software that supplied rules of reasoning and proved symbolic logic theorems. Newell, Simon and Shaw went on to construct the General Problem Solver, or GPS. The first version of GPS ran in 1957 and work continued on the project for about a decade. 1955 William Shockley founds Shockley Semiconductor in Palo Alto, California 1956 IBM develops the first hard disk, the RAMAC 305, with 50 two-foot diameter platters. Total capacity is 5 MB. (350 Disk Storage Unit) The first transistorized computer is completed, the TX-O (Transistorized Experimental computer), at the Massachusetts Institute of Technology. 1957 A new language, FORTRAN (short for formula translator), enabled a computer to perform a

Sissejuhatus...
113 allalaadimist
thumbnail
14
docx

Misusing and Abusing the IoT ( Ingliskeelne referaat andmeturve ITX0040 jaoks)

Misusing and Abusing the IoT - Now and in the Future The Internet of Things is the network of physical objects—devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data [1]. As the amount of devices connected to the internet of things is constantly on the rise, making it innately more secure and protecting those devices from abuse, in a sense of unwanted access , manipulation by third parties and other scenarios, is rapidly turning into a pressing issue. According to some sources there were about 13.4 billion connected devices back in 2015 and the projections show there might be up to 38.5 billion such devices in 2020 [2]. As the number of devices increases, the necessity for a proper security

Andmeturbe alused
6 allalaadimist
thumbnail
10
docx

Artikli kokkuvõte akadeemilises inglise keeles „Understanding the Internet of Things (IoT)“

In the 2014 article, ,,Understanding the Internet of Things (IoT)" GSMA shares its vision of the evolution of The Internet of Things that will lead to the so-called Connected Life. The future of mobile connectivity goes beyond tablets and cars, allowing to connect virtually everything. It is assumed that there will be a significant rise of connected devices throughout the world, allowing the growth of new services, transforming the way people work and live. The lack of human interaction will probably cause the emergence of new business models and promote the delivery of services across diverse socio-economic sectors. A research by Machina Research predicts that the Internet of Things is likely to boost the economy by an enormous amount up to US$ 4.5 trillion yearly. The needs of variable industries are already met by the use of Machine to Machine (M2M) solutions using wireless networks

Akadeemiline inglise keel
16 allalaadimist
thumbnail
1
docx

Infotehnoloogiast ja suhtlusvõrgud

Are IT and communication technology bringing about more positive or negative changes? Dear audience, i want to tell you about the positive and negative sides of it and communication technology. Informational technology is most commonly used to talk about computers and computer networks but it also includes other information sorces such as television and telephones. Electronic computers began to appear in the early 1940's. The origins of the internet are from the 1960's. Over a third of the human's population have used the services of the internet. But what about the other two thirds? Is is better for them to have not been able to use this huge network, or is it a bad thing? The first biggest concerns are the communication sites because they are used too often and they tend to change the view how we understand the term ,,personal relationships". The most popular social network-Facebook-was launched in 2004 and

Inglise keel
4 allalaadimist
thumbnail
8
doc

Inglise keele kodulugemine teemal: Mass Media

better and send better messages for the development of the youth than what it is sending today. Mass Media Influence on Adults Like children and youth, mass media influences adults too, although perhaps not on the same scale. Most adults with a platonic view of things will resist the temptation of being buoyed up by what the mass media has to offer. While men usually find it difficult to hold them selves back in the face of the allure of sexuality. Other subjects which also appeal to men are financial security and a luxurious hassle-free lifestyle. Women on the other hand are more tempted towards products which guarantee immunity from aging altogether and not just what the previous generation called 'aging gracefully'. Mass media can yet be used constructively to teach the adults about the importance of insurance, financial education and how to maintain a healthy lifestyle.

Inglise keel
34 allalaadimist
thumbnail
10
docx

Sissejuhatus infotehnoloogiasse konspekt 2020

koodiviidetega  mis Eksamteeb Eksamloader Eksam– Eksamotsib vajalikud failid osa sümbolinfo seostamiseks päris koodiviidetega 4 Eksamiks: Eksam  Python(1989) Eksam– Eksamalgas ABC järeltulijana, 2.0 release 2000 with full garbage collector and unicode support, 3.0 released 2008, backwards compatible  html Eksam– EksamHyperText Markup Language, selle abil sai internetile ligipääsu WorldWideWeb  http Eksam– EksamHyperText Transfer Protocol  internet eestis Eksam– Eksam1990 Küberneetika instituudis modem, ühendus soomega, peamiselt sai soome kaudu emailidele ligi  Linux Eksam– Eksam1991 EksamLinus Torvalds alustas hobikorras Linuxiga, kasutas Minix’it ja GNU’d,  Linux = Minix-inspired kernel for GNU  netscape Eksam– Eksamesimene korralik www browser  usenet Eksam- Eksam  php Eksam– EksamPersonal Home Page tools – scripting language for web development

Sissejuhatus...
96 allalaadimist
thumbnail
2
doc

Social network

In September 2012 Facebook had over billion active users and more than half of them were also using Facebook on a mobile device. Facebook's latest research shows that the most popular mobile device used for visiting m.facebook.com is iOS and by the popularity the second most used device is Android. Using Facebook on your mobile device raises the potential of your account getting stealed. It is so because most of the users don't use safe connection so all your data is available to other users on the same network. So the very first thing you should do is to use safe connection by adding to the end of this word ,,http://" (which you can find in the beginning of every webpage) an ,,s" so the address should be like ,,https://". The second thing you can do is that if you own the Wi-Fi access point then you should definately put a password to it because then others that don't have a password can not connect to your network

Inglise keel
5 allalaadimist
thumbnail
24
pdf

IT Strateegia IT Ettevõttele

.............................................18 6. Infrastructure ..........................................................................................................................19 6.1. Computers .......................................................................................................................19 6.2. Servers ............................................................................................................................19 6.3. Network Devices.............................................................................................................20 6.4. Employees.......................................................................................................................20 7. Internal Projects......................................................................................................................21 7.1. Training Schedule .............................................................

Informaatika
57 allalaadimist
thumbnail
555
doc

Programmeerimiskeel

Mõtestatud tekst koosneb kas (a) loogika ja matemaatika formaalsetest väidetest või (b) konkreetsete teadusharude fakte esitavatest lausetest. Igasugusel fakti esitaval väitel on sisu ainult siis, kui on võimalik öelda, kuidas selle väite kehtivust kontrollida. Metafüüsilised väited, mis ei lange punktide 1 ja 2 alla, on sisutud. Kõik moraali, esteetikat ja religiooni käsitlevad väited on mittekontrollitavad ja mõttetud. 1945 Konrad Zuse began work on Plankalkul (plan Calculus). The first algorithmic programming language, with an aim of creating the theoretical preconditions for the formulation of problems of a general nature. John von Neumann wrote "First Draft of a Report on the EDVAC." Grace Hopper recorded the first actual computer "bug." 1946 In February, the public got its first glimpse of the ENIAC, a machine built by John Mauchly and J. Presper Eckert that improved by 1,000 times on the speed of its contemporaries.

Infotehnoloogia
148 allalaadimist
thumbnail
31
ppt

ECDIS Voyage planning

Obtaining route plan table with coordinates of each WP, distances & courses between WP's total distance of created route plan. The Navi-Sailor 3000 ECDIS Route Plan table contains the following:  Geographical data (coordinates, course, GC/RL…)  Schedule information (ETA, ETD, Average speed…)  Route Plan calculations take into account relevant weather and current information Other useful capabilities of the Route Planning facility include:  'Check Route' functionality, both online and after the planning  Upload route to GPS  Graphical on-screen and tabular route plan editing  Equalising of data between Master and Slave station(-s)  Print out of Route Plan information Autopilot  Navi-Sailor 3000 ECDIS provides a facility for sailing in the Autopilot mode. Route Monitoring

Navigeerimine
6 allalaadimist
thumbnail
4
docx

The effect of modern technology on our everyday life

It plays a major role not only in our lives, but also helped in development of various industries, changed education, entertainment. We can not measure this process and it`s impact on society, but one thing we can say for sure – technology has become part of pupils lives. There are so many advantages connected with technology and how it affected our everyday life. To start with, development of mobile technology, computers and internet made life easier. We can find information in sites like Google in a couple of minutes instead of looking for required information in books for hours. In the older times, writing a letter, sending and bringing to a required person took minimum a month; now this procedure happens within a minute, if people communicate using social networks. Also, social networks gave a chance to people to communicate with old friends, relatives and so on, who are far away from them

Inglise keel
9 allalaadimist
thumbnail
10
doc

Automaatika referaat (eng)

to review stacks of papers. While PEG produced impressive results, the technology of the time was too primitive to make it a practical application. Text had to be typed on IBM 80-column punched cards and read into a mainframe computer before it could be evaluated. As a consequence, the technology sat dormant until the early 1990s and was revitalized with the confluence of two technological developments: microcomputers and the Internet. Microcomputers permitted the generation of electronic text from a regular keyboard and the internet provided a universal platform to submit text for review (Shermis, Mzumara, Olson, & Harrington, 2001). Automated Essay Scoring 3 Automated essay scoring is a measurement technology in which computers evaluate written work (Shermis & Burstein, 2003). Most of the initial applications have been in English, but past work has been applied to Japanese (Kawate-Mierzejewska,

Automaatika
19 allalaadimist
thumbnail
45
docx

Side konspekt 2020 / eksami kordamisküsimused

Eksami küsimused: 1. Mida tähendab mitmekiireline levi Mitmekiireline levi – info levib mööda peegeldusi, otselevi on väga harva. Kohale jõuab mitu lainet samaaegselt. Halb, sest lained liituvad (võivad tasakaalustada ennast ning signaal kustub ära, nõrgeneb). Kuna inimene liigub, muutub sagedus – lainepikkus – tuleb kogu aeg kanalit järgi kruttida. 2. Mida tähendab alla- ja üleslüli ning dupleks kaugus mobiilsides Pertaining to computer networks, a downlink is a connection from data communications equipment towards data terminal equipment. This is also known as a downstream connection. The uplink port is used to connect a device or smaller local network to a larger network, or connect to the next "higher" device in the topology. For example, the edge switch connects "up" to the distribution layer managed switch. Lühidalt - The communication going from a satellite to ground is called downlink,

Side
74 allalaadimist
thumbnail
2
docx

How the right of privacy was viewed in the 1890s and 2010s.

the privacy is the right to be let alone. This means, that a person is free to go and do what ever the person wants, no one has a right to harm him/her physically or mentally and vice versa. What ever the person decides to do, nobody else has the right to know about it without persons premission. Julie Cohen starts her essay with a point that privacy has the image problem. In the world where there is no mobile platforms, data mining social meedia, in simple words the internet, its easyer to leave the person alone, but what can we do in the world where is very difficult to be incognito because your every move is statistics and sometimes lawfully, somebodys elses bussines ?. Julie Cohen continues with describeing the new sight of the privacy. Compare to the year 1890 we are now facing new problems with privacy. The technology people use can store data. Data will contain information about transactions and behavioral data about people. For example, with a single click

Ajalugu
2 allalaadimist
thumbnail
18
docx

Vormistamine ülesanne 3

How many people need to be surveyed in order to be able to describe fairly accurately the entire group? How should the people be selected? What questions should be asked and how should they be posed to respondents? In addition, what data collection methods should one consider using, and are some of those methods of collecting data better than others? And, once one has collected the information, how should it be analyzed and reported? Deciding to do a survey means committing oneself to work through a myriad of issues each of which is critical to the ultimate success of the survey. Yet, each day, throughout the world, thousands of surveys are being undertaken. Some surveys involve years of planning, require arduous efforts to select and interview respondents in their home and take many months to complete and many more months to report results. Other surveys are conducted with seemingly lightning speed as web survey requests are transmitted simultaneously to

Andme-ja tekstitöötlus
2 allalaadimist
thumbnail
26
pdf

Suurbritannia ühiskond ja kultuur quiz 1 mõisted

1. Society- people who interact in such a way as to share a common culture. The cultural bond may be ethnic or racial or geographical, based on gender, or due to shared beliefs, values, and activities. 2. Culture- beliefs, behaviors, objects, and other characteristics common to the members of a particular group or society. 3. A unitary state- a state governed as one single power in which the central government is ultimately supreme and any administrative divisions (subnational units) exercise only powers that their central government chooses to delegate. The majority of states in the world have a unitary system of government. 4. A federal state-- a political entity characterized by a union of partially self-

Inglise keel
1 allalaadimist
thumbnail
7
doc

Nokia Report

involved in many sectors, producing at one time or another paper products, bicycle and car tires, footwear, personal computers, communications cables, televisions, aluminium, etc. The seeds of the current incarnation of Nokia were planted with the founding of the electronics section in the 1960s. In the 1970s, Nokia became more involved in the telecommunications industry. In 1981 Nokia invented the Nordic Mobile Telephony (NMT), which was the world's very first multinational cellular network. Soon after that Nokia started developing Global System for Mobile Communication (GSM) phones and became very successful at that time. As the years went Nokia became the largest manufacturer of mobile telephones and made its way to what it is today. PRESENT-DAY STATE Today Nokia is a well known corporation. In fact Nokia is currently the world's largest manufacturer of mobile telephones and has the number one production in digital

Inglise keel
100 allalaadimist


Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun