Abstract Cybercrimes are interrupting normal computer functions and has brought many known companies and personal entities to their knees. Over the last decade, crime has entered into the world of information. Crime is developing gradually since the days when merchandise was transported by stagecoach, theft or extortion has changed to keep up, even to our […]

A computer virus is a computer program that can copy itself[1] and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some […]

Acknowledgement This is an assignment for Networking Assignment that is an elective subject in international diploma in computer studies (IDCS). Network is very important communicate each other. So, this is very important. I would like to thank to our teacher U Tin Naing Htwe who teaches us Networking. When he teaches this subjective, we know […]

1. Introduction Voting is understood to be the form of choice. This form of expression can be performed through the ballot, or by any other electoral schemes. The electronic voting is a way in which votes cast by voters of a specific electronic medium that can be retrieved, tallied and stored electronically. The project to […]

Abstract In this module we will discuss the importance of data and the management issues that relate to it, and its life cycle. We will also focus on document management system, discuss the details of data warehousing, data mining, analytical processing and knowledge management. We will also discuss about transaction and analytic processing systems. We […]

Despite the growth of technology displaying definite significant to the society, it has been subjected to many challenges with the most conspicuous challenge being the cyber security issue.  To be in a position of defining how cyber security has negatively affected the technology industry, it serves great importance mentioning that cyber security is a set […]

Recently, there has been an alarming upward trend in cybersecurity breaches, with 2018 seeing over 600 breaches only halfway into the year. Cybercrime is now the fastest growing crime in the US, and according to the FBI every 3 seconds, an identity is stolen. That’s 35,000 every day and more than 15 million every year! […]

1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject will be analysed and critically evaluated, then expanded upon further to reflect the range of possible solutions and raise awareness of the risk and […]

The Royal Financial institution of Canada seasoned some fundamental managerial mistakes in May well 2003. It was noted as a major “glitch” that had been caused by erroneous configuration for the duration of the set up system. A simple difficulty experienced seriously impacted the lives of thousands and thousands of people. In this essay I […]