Sunday, January 27, 2008
compile reports
ellw guys...come to the end our report..
all the tasks are done... and i will do the compiling all the documents into report..
khliq i need a favor from you to print the blog k...
thanks you guys for all MARVELOUS cooperation, we finish on time schedule :)
by Eddie
all the tasks are done... and i will do the compiling all the documents into report..
khliq i need a favor from you to print the blog k...
thanks you guys for all MARVELOUS cooperation, we finish on time schedule :)
by Eddie
Done =D
Guys, i've finished my task already.
Time to print!
And Eddie, where are you??
Said you'd come over to Khaliq's place at 5..
its almost 6 now...
by Sim
Time to print!
And Eddie, where are you??
Said you'd come over to Khaliq's place at 5..
its almost 6 now...
by Sim
Friday, January 25, 2008
case study 2
im finish my another task searching and findings the security, privacy problems only..
and ethics done by eddie wuhuhu
and ethics done by eddie wuhuhu
Report
Guys remember this...Inside the report, we must include: -
table of contents - compile our tasks first before do this
introduction - background some MOrange from our understanding
contents - make sure clearly mark the each question number in the heading
biliography - each of your task and research, you need to take reference of it k...its important!!
appendix - our blog and MOrange brochure
by Eddie
table of contents - compile our tasks first before do this
introduction - background some MOrange from our understanding
contents - make sure clearly mark the each question number in the heading
biliography - each of your task and research, you need to take reference of it k...its important!!
appendix - our blog and MOrange brochure
by Eddie
finished with number 4
i've done with my task number 4, most of the information i get from ideas and information from telecommunication notes ^^
Case 2
on case 2 we have discuss on primary concern on security, privacy and ethics
and we also need to look on strategies to solve on security and privacy....
i think all the information in that book to...so lets we find it :)
by Eddie
and we also need to look on strategies to solve on security and privacy....
i think all the information in that book to...so lets we find it :)
by Eddie
Subscribe to:
Posts (Atom)