Usetutoringspotscode to get 8% OFF on your first order!

  • time icon24/7 online - support@tutoringspots.com
  • phone icon1-316-444-1378 or 44-141-628-6690
  • login iconLogin

Designing a Secured Wireless Network Infrastructure

1. Introduction and Background A description of the general area of study
2. Literature review Strategy and Findings
a. Keywords used and results obtained
b. Journals used and evaluation of worth
c. Principal authors and their positions
d. Summary of findings
e. Properly referenced bibliography (at end of document)
3. Research Methodology
a. Type(s) of data sought and sources of data.
b. Methodological approaches considered (for data acquisition and data
analysis)
c. Explanation of how methodology will provide data required
4. Refined research question
a. What are you going to do?
b. Why are you going to do it?
c. Who will be interested?
d. What is the scope?
e. What are the limitations (what will you not cover?)

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes