SlideShare uma empresa Scribd logo
1 de 7
• This has a wide variety of programs which enable the user to store, extract and modify the
information within it. There can be many different type of databases which range from the
small used on personal computers to huge which are used on mainframes.
• This system is important for the use of the different programs that are used on computer
otherwise you won’t have the use of the programs your computer gives you access to.
• Proxy is computer which offers computer networks a chance to find an indirect connection
to other network services. The client first has to connect the proxy server and then will
request a connection, file or different resource which is available on another server.
• Without the use of this system people will be blocked from websites they will need to be
able to be given access to if they want to be able to do there work.
• Printing is basically being able to transfer work that is done on the computer onto sheets
of paper. You will be able to do printing of work such as newspapers, images, book pages,
posters, newspaper articles, spreadsheets, etc.
• Without the use of printing we won’t be able to make the transfer for computer documents
to paper and everything have to be done by hand.
• This maintains the storage of digital copies of data across a high-speed local area
network connection. This has also been designed to back up databases, files and other
data to a central location that can easily be accessed via the standard network protocols
and tools.
• This is important otherwise once done a file and won’t be able save it the we’d have to do
all our work over again and to maintain where we’d saved it we’d have to constantly keep
printing the same thing of over and over again.
• VoIP stands for Voice over Internet Protocol. This piece of technology allows telephone
calls to be made over the internet and other different computer networks. This is able to
convert voice signals into various packets of data and can support real-time, two way
conversations using internet protocol.
• Without the use of this being able to do voice messages on websites such as skype will
impossible and you will only be able to do messages via typing.
• http://www.webopedia.com/TERM/D/database_management_system_DBMS.html
• http://whatismyipaddress.com/proxy-server
• http://compnetworking.about.com/od/networkstorage/f/network-storage.htm

Mais conteúdo relacionado

Mais de ConnorJohnAdkins

Mais de ConnorJohnAdkins (20)

9 frames
9 frames9 frames
9 frames
 
5. digipak analysis
5. digipak analysis5. digipak analysis
5. digipak analysis
 
14. storyboard
14. storyboard14. storyboard
14. storyboard
 
14. storyboard
14. storyboard14. storyboard
14. storyboard
 
4. record labels and permissions
4. record labels and permissions4. record labels and permissions
4. record labels and permissions
 
,Directory services
,Directory services,Directory services
,Directory services
 
8. cinematography and editing for music videos
8. cinematography and editing for music videos8. cinematography and editing for music videos
8. cinematography and editing for music videos
 
File services
File servicesFile services
File services
 
6. magazine advert analysis
6. magazine advert analysis6. magazine advert analysis
6. magazine advert analysis
 
2. genre music video analysis
2. genre music video analysis2. genre music video analysis
2. genre music video analysis
 
5. digipak analysis
5. digipak analysis5. digipak analysis
5. digipak analysis
 
7. theories of production
7. theories of production7. theories of production
7. theories of production
 
History of the cinema's technological developments
History of the cinema's technological developmentsHistory of the cinema's technological developments
History of the cinema's technological developments
 
Nine frames
Nine framesNine frames
Nine frames
 
13. mood board
13. mood board13. mood board
13. mood board
 
13. mood board
13. mood board13. mood board
13. mood board
 
4. the history of the genre of murder mystery
4. the history of the genre of murder mystery4. the history of the genre of murder mystery
4. the history of the genre of murder mystery
 
2. understanding micro elements in film opening
2. understanding micro elements in film opening2. understanding micro elements in film opening
2. understanding micro elements in film opening
 
Mood board
Mood boardMood board
Mood board
 
The history of the genre of murder mystery
The history of the genre of murder mysteryThe history of the genre of murder mystery
The history of the genre of murder mystery
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Application services

  • 1.
  • 2. • This has a wide variety of programs which enable the user to store, extract and modify the information within it. There can be many different type of databases which range from the small used on personal computers to huge which are used on mainframes. • This system is important for the use of the different programs that are used on computer otherwise you won’t have the use of the programs your computer gives you access to.
  • 3. • Proxy is computer which offers computer networks a chance to find an indirect connection to other network services. The client first has to connect the proxy server and then will request a connection, file or different resource which is available on another server. • Without the use of this system people will be blocked from websites they will need to be able to be given access to if they want to be able to do there work.
  • 4. • Printing is basically being able to transfer work that is done on the computer onto sheets of paper. You will be able to do printing of work such as newspapers, images, book pages, posters, newspaper articles, spreadsheets, etc. • Without the use of printing we won’t be able to make the transfer for computer documents to paper and everything have to be done by hand.
  • 5. • This maintains the storage of digital copies of data across a high-speed local area network connection. This has also been designed to back up databases, files and other data to a central location that can easily be accessed via the standard network protocols and tools. • This is important otherwise once done a file and won’t be able save it the we’d have to do all our work over again and to maintain where we’d saved it we’d have to constantly keep printing the same thing of over and over again.
  • 6. • VoIP stands for Voice over Internet Protocol. This piece of technology allows telephone calls to be made over the internet and other different computer networks. This is able to convert voice signals into various packets of data and can support real-time, two way conversations using internet protocol. • Without the use of this being able to do voice messages on websites such as skype will impossible and you will only be able to do messages via typing.