SlideShare a Scribd company logo
1 of 44
STANI MEMORIAL P.G. COLLEGE
PRACTICAL FILE
Elementary Computer Application
Submitted By: jaikishan godara Submitted To:
S.NO
.
TOPIC DATE ______
______
___
1 The architecture of computer
system
20th Jan
2 Hardware and software
20th Jan
3 Input and output devices 20th Jan
4 Computer memory 20th Jan
5 Mail Merge 20th Jan
6 Four function are explained 20th Jan
7 Spread sheet 20th Jan
8 M-commerce 20th Jan
9 History of internet 20th Jan
10 Eight function are explained 20th Jan
11 Thirty-five short keys are written 20th Jan
12 Computer network 20th Jan
1. Explain the architecture of a computer system?
Answer1.A computersystemisbasicallyamachinethat simplifiescomplicatedtasks. Itshouldmaximizeperformanceand reducecosts
aswellaspower consumption.ThedifferentcomponentsintheComputerSystemArchitectureareInputUnit,Output Unit,StorageUnit,
ArithmeticLogicUnit,ControlUnit,etc.
Adiagram that showstheflowofdata betweentheseunits isas follows −
THEINPUTDATATRAVELSFROMTHEINPUTUNITTOALU.SIMILARLY,THECOMPUTEDDATATRAVELSFROMALU
TOTHEOUTPUTUNIT.THEDATACONSTANTLYMOVESFROMTHESTORAGEUNITTOALUANDBACKAGAIN.THISIS
BECAUSESTOREDDATAISCOMPUTEDBEFOREBEINGSTOREDAGAIN.THECONTROLUNITCONTROLSALLTHE
OTHERUNITSASWELLASTHEIRDATA.
DETAILSABOUTALLTHECOMPUTERUNITSARE−
•INPUTUNIT:
THEINPUTUNITPROVIDESDATATOTHECOMPUTERSYSTEMFROMTHEOUTSIDE.SO,BASICALLY,ITLINKSTHE
EXTERNALENVIRONMENTWITHTHECOMPUTER.ITTAKESDATAFROMTHEINPUTDEVICES,CONVERTSITINTO
MACHINELANGUAGE,ANDLOADSITINTOTHECOMPUTERSYSTEM.KEYBOARD,MOUSE,ETC.ARETHEMOST
COMMONLYUSEDINPUTDEVICES.
•OUTPUTUNIT:
THEOUTPUTUNITPROVIDESTHERESULTSOFTHECOMPUTERPROCESSTOTHEUSERSI.E.ITLINKSTHE
COMPUTERWITHTHEEXTERNALENVIRONMENT.MOSTOFTHEOUTPUTDATAISINTHEFORMOFAUDIOORVIDEO.
THEDIFFERENTOUTPUTDEVICESAREMONITORS,PRINTERS,SPEAKERS,HEADPHONES,ETC.
•StorageUnit:
Storageunitcontainsmanycomputercomponentsthatareusedtostore data.Itistraditionallydividedinto
primarystorageandsecondarystorage.Primarystorageisalsoknownasthemainmemoryandisthe
memorydirectlyaccessiblebytheCPU.SecondaryorexternalstorageisnotdirectlyaccessiblebytheCPU.
Thedatafromsecondarystorageneeds tobebroughtintotheprimarystoragebefore theCPUcanuseit.
Secondarystoragecontainsalargeamountofdatapermanently.
•ArithmeticLogic:
UnitAllthecalculationsrelatedtothecomputersystemareperformedbythearithmeticlogicunit.Itcan
performoperationslikeaddition,subtraction,multiplication,division,etc.Thecontrolunittransfersdatafrom
storageunittoarithmeticlogicunitwhencalculationsneedtobeperformed.Thearithmeticlogicunitandthe
controlunittogetherformthecentralprocessingunit.
•ControlUnit:
Thisunitcontrolsalltheotherunitsofthecomputersystemandsoisknownasitscentralnervoussystem.It
transfers datathroughoutthecomputerasrequiredincludingfromthestorageunittothecentralprocessing
unitandviceversa.Thecontrolunitalsodictateshowthememory,input-outputdevices,arithmeticlogicunit,
etc.shouldbehave.
2. What do you mean by hardware and software? Write down the types of computer
software?
Answer2.ComputerHardware:
Hardwarerefers tothephysicalcomponentsof acomputer.ComputerHardwareisanypartofthe
computerthatwecantouchtheseparts.Thesearetheprimaryelectronicdevicesusedtobuildupthe
computer.ExamplesofhardwareinacomputeraretheProcessor, MemoryDevices,Monitor,Printer,
Keyboard,Mouse,andtheCentralProcessingUnit.
ComputerSoftware:
Softwareisacollectionofinstructions,procedures,documentationthatperforms different tasksona
computersystem.wecansayalsoComputerSoftwareisaprogrammingcodeexecutedonacomputer
processor. Thecodecanbemachine-levelcodeorthecodewrittenforanoperatingsystem.Examples
ofsoftware areMsWord,Excel,PowerPoint,GoogleChrome,Photoshop,MySQLetc.
Types of computer software:
3. Explain different input and output devices?
Answer3.InputDevices:
Adevicethat canbeusedto insertdata into acomputersystemiscalledas inputdevice.Itallowspeopleto supply
informationtocomputerswithout anyinputdevices,acomputerwouldonlybeadisplaydeviceandnotallowusersto
interactwithit, Examplesofinputdevicesincludekeyboards, mouse,scanners,digital camerasandLight pen,joysticks,
Touch-screen,OMR,OBR,OCR.
Keyboard:Most commonand verypopular input deviceis keyboard. Thekeyboardhelpsininputting thedata to the
computer.Thelayoutofthekeyboardislikethatoftraditional typewriter, althoughtherearesomeadditional keys
providedforperformingsomeadditional functions.
Mouse:
MouseismostpopularPointingdevice.Itisaveryfamouscursor-
controldevice.Itisasmallpalmsizeboxwithagroundballatitsbase
whichsenses themovementofmouseandsendscorrespondingsignals
toCPUonpressingthebuttons.
Generally,ithastwobuttonscalledleftandrightbuttonandscrollbaris
present atthemid.Mousecanbeusedtocontroltheposition ofcursoron
screen,butitcannotbeusedtoentertextintothecomputer.
Advantages
•Easytouse•Notveryexpensive•Movesthecursorfaster thanthearrowkeys
ofkeyboard.
Scanner:
Scannerisaninputdevicewhichworksmorelikeaphotocopymachine.Itis
usedwhensomeinformationisavailableonapaperanditistobetransferred
totheharddiscof thecomputerforfurthermanipulation.Scannercaptures
imagesfromthesourcewhicharethenconvertedintothedigitalformthatcan
bestoredon thedisc.Theseimagescanbeeditedbefore theyareprinted.
Joystick:
Joystickisalsoapointingdevicewhichisusedtomovecursorposition
onamonitorscreen.Itisastickhavingasphericalballatitsbothlower
andupperends.Thelowersphericalballmovesinasocket.The
Joystickcanbemovedinallfourdirections.
Thefunctionofjoystickissimilartothatof amouse.Itismainlyusedin
ComputerAidedDesigning (CAD)andplayingcomputergames.
MagneticInkCardReader(MICR)MICRinputdeviceisgenerallyusedinbanksbecauseofalargenumber
ofchequestobeprocessed everyday.Thebank’scodenumberandchequenumberareprintedonthe
chequeswithaspecialtypeofinkthatcontainsparticlesofmagneticmaterialthataremachinereadable.
ThisreadingprocessiscalledMagneticInkCharacterRecognition(MICR).ThemainadvantageofMICRis
thatitisfastandlesserror prone.
OpticalCharacterReader(OCR):
OCRisaninputdeviceusedtoreadaprintedtext.OCRscanstextopticallycharacterbycharacter,
convertsthemintoamachine-readablecodeandstores thetextonthesystemmemory.
BarCodeReaders:
BarCodeReaderisadeviceusedforreadingbarcodeddata(datainformoflightanddarklines).
Barcodeddataisgenerallyusedinlabellinggoods,numberingthebooksetc.Itmaybeahand-held
scannerormaybeembeddedinastationaryscanner.
OpticalMarkReader(OMR):
OMRisaspecialtypeofopticalscannerusedtorecognizethetypeof
markmadebypenorpencil.Itisusedwhereoneoutofafew
alternativesistobeselectedandmarked.Itisspeciallyusedfor
checkingtheanswersheets ofexaminationshavingmultiplechoice
questions.
Touchscreen:
Touchscreenisaninputdevice.Touchscreentechnologyisthedirect
manipulationtypegesture-basedtechnology.Directmanipulationis
theabilitytomanipulatedigitalworldinsideascreenwithouttheuseof
command-linecommands.
AdevicewhichworksontouchscreentechnologyiscoinedasTouch
screen.Atouchscreenisanelectronicvisualdisplaycapableof
‘detecting’andeffectively ‘locating’atouchoveritsdisplayarea.
OutputDevices:
Adevicewhichisusedtodisplayresultfromacomputeriscalledas
outputdevice.ItAllowspeopletoreceiveinformationfromcomputers.
Anoutputdeviceisanyperipheralthatreceives ordisplaysoutput
fromacomputer.Thepictureshowsaninkjetprinter,anoutputdevice
thatcanmakeahardcopyofanythingbeingdisplayedonamonitor.
Outputdeviceiselectronicequipmentconnectedtoacomputerand
usedtotransferdataoutofthecomputerintheformoftext,images,
soundsorprint.Examplesofoutputdevicesinclude:Digitizers,Plotters,
LCD,PlasmaDisplay,Printers,etc.
Digitizer:
Digitizerisaninputdevicewhichconvertsanaloginformationintoa
digitalform.Digitizercanconvertasignalfromthetelevision camera
intoaseries of numbersthatcouldbestoredinacomputer.Theycanbe
usedbythecomputertocreateapictureof whateverthecamerahad
beenpointedat
Plotters:
Aplotterisaprinterthatinterprets commandsfromacomputerto
makelinedrawingsonpaperwithoneormoreautomatedpens.Unlike
aregularprinter,theplottercandrawcontinuouspoint-to-pointlines
directlyfromvectorgraphicsfilesorcommands.
Thereareanumberof different typesofplotters:adrumplotterdraws
onpaperwrappedaroundadrumwhichturnstoproduceonedirection
oftheplot,whilethepensmovetoprovidetheotherdirection;aflatbed
plotterdrawsonpaperplacedonaflatsurface;andanelectrostatic
plotterdrawsonnegativelychargedpaperwithpositively charged
toner.
Plotterswerethefirsttypeofprinterthatcouldprintwithcolorand
rendergraphicsandfull-sizeengineeringdrawings.Asarule,plotters
aremuchmoreexpensivethanprinters.Theyaremostfrequentlyused
forCAE(computeraidedengineering)applications,suchasCAD
(computer-aideddesign)andCAM(computer-aidedmanufacturing).
Monitors:
MonitorcommonlycalledasVisualDisplayUnit(VDU)isthemainoutput
deviceofacomputer.Itformsimagesfromtinydots,calledpixelsthat
arearrangedinarectangularform.Thesharpnessoftheimage
dependsupontheno.ofthepixels.Therearetwokindsofviewing
screenusedfor monitors.
•Cathode-RayTube(CRT)
•LiquidCristalDisplay(LCD)
•PlasmaDisplay
Printers:
Printeristhemostimportantoutputdevice,whichisusedtoprint
informationonpaper.
Therearetwotypesofprinters
•ImpactPrinters•Non-ImpactPrintersImpactPrintersTheprinters
thatprintthecharactersbystrikingagainsttheribbonandontothe
paperarecalledimpactprinters.CharacteristicsofImpactPrintersare
following
•Verylowconsumablecosts
•Impactprintersareverynoisy
•Usefulforbulkprintingduetolowcost
•Thereisphysicalcontactwiththepapertoproduceanimage
Theseprintersareoftwotypes
•Characterprinters•LineprintersCharacterPrinters:Character
Printersareprinterswhichprintonecharacteratatime.
Theseareoffurthertwotypes
•DotMatrixPrinter(DMP)•DaisyWheel
4. What do you understand by computer memory? Explain
types of memory in computer?
Answer4. Computermemoryisagenerictermfor allof thedifferent typesofdatastoragetechnology
thatacomputermayuse,includingRAM,ROM,andflashmemory.
Thekeydifference between primaryandsecondarymemoryisspeedofaccess.
•PrimarymemoryincludesROMandRAM,andislocatedclosetotheCPUonthecomputermotherboard,
enablingtheCPUtoreaddatafromprimarymemoryveryquicklyindeed.Itisusedtostore datathatthe
CPUneedsimminentlysothatitdoes nothavetowaitforittobedelivered.
•Secondarymemorybycontrast,isusuallyphysicallylocatedwithinaseparatestoragedevice,suchas
aharddiskdriveorsolid-statedrive(SSD),whichisconnectedtothecomputersystemeitherdirectly
oroveranetwork.Thecostpergigabyteof secondarymemoryismuchlower,butthereadandwrite
speedsaresignificantlyslower.
Overseveralperiodsofcomputerevolution,awideof
arrayofcomputermemorytypeshasbeendeployed,
eachwithitsownstrengthsandweaknesses.
PrimaryMemoryTypes:RAMandROMTherearetwo
keytypesofprimarymemory:
1.RAM,orrandom-accessmemory
2.ROM,orread-onlymemoryLet’slookin-depthat
bothtypesofmemory.
1) RAM
ComputerMemoryTheacronymRAMstemsfromthefactthatdatastoredinrandomaccessmemorycanbeaccessed –
asthenamesuggests–inanyrandomorder.Or,putanotherway,anyrandombitofdatacanbeaccessedjustas
quicklyasanyotherbit.
ThemostimportantthingstounderstandaboutRAMarethatRAMmemoryisveryfast,itcanbewrittentoaswellas
read,itisvolatile(soalldatastoredinRAMmemoryislostwhenitloses power)and,finally,itisveryexpensive
comparedtoalltypesofsecondarymemoryintermsofcostpergigabyte.
ItisbecauseoftherelativehighcostofRAMcomparedtosecondarymemorytypesthatmostcomputersystemsuse
bothprimaryandsecondarymemory.DatathatisrequiredforimminentprocessingismovedtoRAMwhereitcanbe
accessedandmodifiedveryquickly,sothattheCPUisnotkeptwaiting.
Whenthedataisnolongerrequireditisshuntedouttoslowerbutcheapersecondarymemory,andtheRAMspacethat
hasbeenfreedupisfilledwiththenextchunkofdatathatisabouttobeused.
Typesof RAM•
DRAM:DRAMstandsforDynamicRAM,anditisthemostcommontypeofRAMusedincomputers.Theoldest
typeisknownassingledatarate(SDR)DRAM,butnewercomputersusefaster dualdatarate(DDR)DRAM.
DDRcomesinseveralversionsincludingDDR2,DDR3,andDDR4,whichoffer betterperformanceandare
moreenergy efficient thanDDR.Howeverdifferent versions areincompatible,soitisnotpossible tomix
DDR2withDDR3DRAMinacomputersystem.
DRAMconsists ofatransistorandacapacitorineachcell.
•SRAM:SRAMstandsforStaticRAM,anditisaparticulartypeofRAMwhichisfasterthanDRAM,butmore
expensiveandbulker,havingsixtransistorsineachcell.Forthosereasons SRAMisgenerallyonlyusedas
adatacachewithinaCPUitself orasRAMinveryhigh-endserversystems.AsmallSRAMcacheof themost
imminently-neededdatacanresultinsignificantspeedimprovementsinasystemThekeydifferences
betweenDRAMandSRAMisthatSRAMisfasterthanDRAM –perhapstwotothreetimesfaster–butmore
expensiveandbulkier.SRAMisusuallyavailableinmegabytes,whileDRAMispurchasedingigabytes.
DRAMuses moreenergythanSRAMbecauseitconstantlyneedstoberefreshed tomaintaindataintegrity,
whileSRAM–thoughvolatile–doesnotneedconstantrefreshing whenitispoweredup.
2)ROM:
ComputerMemoryROMstandsfor read-onlymemory,andthenamestemsfromthefactthatwhiledata
canbereadfromthistypeof computermemory,datacannotnormallybewrittentoit.
ItisaveryfasttypeofcomputermemorywhichisusuallyinstalledclosetotheCPUonthemotherboard.
ROMisatypeofnon-volatilememory,whichmeansthatthedatastoredinROMpersists inthememory
even whenitreceivesnopower–forexamplewhenthecomputeristurnedoff.Inthatsenseitissimilar
tosecondarymemory,whichisusedfor longtermstorage.
Whenacomputeristurnedon,theCPUcanbeginreadinginformationstoredinROMwithouttheneedfor
driversorothercomplexsoftwaretohelpitcommunicate.TheROMusuallycontains“bootstrapcode”
whichisthebasicsetof instructionsacomputerneedstocarryouttobecomeawareoftheoperating
systemstoredinsecondarymemory,andtoloadpartsoftheoperatingsystemintoprimarymemoryso
thatitcanstartupandbecomereadytouse.
ROMisalsousedinsimplerelectronicdevicestostorefirmwarewhichrunsassoon asthedeviceis
switchedon.
Typesof ROM:
ROMisavailableinseveraldifferent types,includingPROM,EPROM,andEEPROM.
•PROM
PROMstandsfor ProgrammableRead-OnlyMemory,anditisdifferent fromtrueROMinthatwhilea
ROMisprogrammed(i.e.hasdatawrittentoit)duringthemanufacturingprocess,aPROMis
manufacturedinanemptystateandthenprogrammedlaterusingaPROMprogrammerorburner.
•EPROM
EPROMstandsforErasableProgrammableRead-OnlyMemory,andasthenamesuggests,datastoredin
anEPROMcanbeerasedandtheEPROMreprogrammed.ErasinganEPROMinvolvesremovingitfrom
thecomputerandexposingittoultravioletlightbefore re-burningit.
•EEPROM
EEPROMstandsfor ElectricallyErasableProgrammableRead-OnlyMemory,andthedistinctionbetween
EPROMandEEPROMisthatthelattercanbeerasedandwrittentobythecomputersystemitisinstalled
in.Inthatsense EEPROMisnotstrictlyread-only.
However,inmanycasesthewriteprocessis slow,soitisnormallyonlydonetoupdateprogramcode
suchasfirmwareorBIOScodeonanoccasionalbasis
SecondaryMemoryTypes
Secondarymemorycomprisesmanydifferentstorage mediawhichcanbedirectly
attachedto a computersystem.
Theseinclude:
•harddisk drives
•solidstate drives (SSDs)
•Optical(CDorDVD)drives
•TapedrivesDifferencesbetweenRAMand ROM
ROM:
•Non-volatile
•Fastto read
•Usuallyused insmallquantities
•Cannotbewritten to quickly
•Usedto storeboot instructionsorfirmware
•Relativelyexpensivepermegabyte storedcomparedto RAM
RAM: •Volatile• Fastto readandwrite•Usedas systemmemoryto storedata
(includingprogramcode)that theCPUneedsto processimminently•Relativelycheap
permegabyte storedcomparedto ROM,but relativelyexpensivecomparedto
secondarymemory
Answer5.Mailmergeisa MicrosoftWordfeatureoftenused toproducea numberofsimilardocuments,includingelements
froma separatedata document(e.g.adatabase, spreadsheetorOutlookcontactsfile).
Thelistiscombinedwith standard text,usually toproducea letterorinvitetoa seriesofdifferentrecipients.
Therearefivestepsto themailmergeprocess:
1. Chooseyour documenttype -Withinthemailingstabclickthestart mailmergebutton andadropdown willappear. You
canchoosefromlabels,envelopes,emails,lettersora directory.
2. 2.Selectyour recipients-Hereyou canchooseto"typea newlist"whereyou entertherecipientsintoadatabase oneby
one,"useanexistinglist"suchas aspreadsheetto importthedata or"selectfromyour Outlook contacts".You canthenedit
therecipientdata shouldyou wish.
3. 3.Write&insertfields-Nowthatyour documentislinkedto your recipientdata you canaddtheindividual personalization
fields.Thisincludesaddress fields(usethe"address block"button) andgreetingline(e.g.dearSirorMadam, recipient's
firstnameetc).
4.
5. 4.Previewresults -Checkthat thefieldsyou've insertedarepullingthecorrectdata through(e.g.thetown fieldisn't
pullingthroughthecountyinformation)andpositioned correctlyonyour document.
6. 5.Finish&merge-Now that you'rehappywith your content,andthecorrectdata fieldsarebeingimported, you canfinish
andmergethedocumentandyour data to createthefinalproduct. Therearethreeoptions here:
5.Whatismailmerge?Explainstepsformailmerge?
6. Explain the following:
a. Page Layout :
: ThePageLayout Tabholdsalltheoptions that allowyouto arrangeyour documentpages justthewayyou wantthem.You cansetmargins,apply
themes,controlofpage orientation and size,add sectionsandlinebreaks, displaylinenumbers,andsetparagraph indentation andlines.
b. Header and footer:
Theheaderisa sectionofthedocumentthat appears inthetop margin, whilethefooteris asectionofthedocumentthat appears inthebottom
margin.Headersandfootersgenerallycontainadditional information suchaspage numbers,dates, anauthor's name,andfootnotes,whichcanhelp
keeplongerdocumentsorganizedandmakethemeasiertoread.Textenteredintheheaderorfooterwillappear oneachpage ofthedocument.
c. Slide Show:
APowerPointslideshow(PPT)isapresentation createdonsoftware fromMicrosoft that allowsusersto addaudio, visual and audio/visual featuresto
apresentation.Itisconsideredto bea multimediatechnologyandalsoactsasatool forcollaboration andcontentsharing. PowerPointis includedin
MicrosoftOffice,makingitoneofthemostwell-knownand widelyused brandsofpresentation software. APowerPointslideshowisalsoknownasa
PowerPointpresentation.
d. Macro:
Amacroisanautomated inputsequencethat imitates keystrokes ormouseactions.A macroistypicallyusedtoreplacea repetitiveseriesof
keyboard andmouseactions andusedofteninspreadsheetsandwordprocessingapplications likeMSExcelandMSWord.Thefileextensionofa
macrois commonly.MAC.Theconceptofmacrosisalsowell-knownamongMMORPG gamers(Massively Multiplayer OnlineRole-PlayingGames) and
SEO(SearchEngineOptimization) specialists.Intheworldofprogramming, macrosareprogrammingscriptsusedbydevelopers to re-usecode.The
termmacrostands for“macro-instruction”(longinstruction).
7. What is a spread sheet? Explain cell referencing in MS Excel?
Answer.
Spreadsheet:
Aspreadsheetisasoftwareprogramyouusetoeasilyperformmathematicalcalculationson
statisticaldataandtotallinglongcolumnsofnumbersordeterminingpercentagesand
averages.
Cellreferences:
Acellreference, alsoknownasacelladdress,isamechanismthatdefines acellona
worksheetbycombiningacolumnletterandarownumber.Wecanrefer toanycell(inExcel
formulas)intheworksheetbyusingthecellreferences.
Typesof CellReference inExcelWehavethreedifferent typesof CellReferences inExcel–
1. RelativeCellReference inExcel
2. 2.AbsoluteCellReference inExcel
3. 3.MixedCellReference inExcel
8. What is M-Commerce?
Answer 8:
M-commerceistheuseof handheld,wireless gadgetssuchasmobile
phones,tabletsandpersonal digitalassistantstoperformonline
commercialtransactions.
It'sacomponentofelectroniccommercethatworksonmobiledevices.
M-commerceenablesabusiness toreachmorecustomersonline.
Italsoprovidescustomerswithawiderangeofproductchoicesand
paymentoptionsfromdifferent vendors.
9. Write down the history of Internet?
Answer9:
TheInternetstartedoff withresearch intowhatwasthenknownaspacketswitchingasearlyasthe1960s.Packetswitchingwasthoughtof
abetterandfaster methodtotransferdatathanthehardwaresolutiontotheproblem,i.e.,thecircuitry.Thepacketswitchingtechnology
wasessential tothedevelopmentofARPANETbytheUnitedStatesMilitary.
ARPANETisconsideredthefirstknowngroupofinterconnectedcomputersakatheinternet.Thissystemwasusedtotransferconfidential
databetween theMilitary.ThisdatasharingtechnologywasthenopenedtoeducationalinstitutesintheUnitedStatestoallowthemto
accesstothegovernment’ssupercomputer,firstat56Kbit/s,thenat1.5Mbit/s,andthenat45Mbit/s.ComInternetservice providersbegan
toariseinthelate1980sandtheinternetwasfullycommercializedintheUSby1995.
10.Explain the following:
a. Firewall:
Firewallscanbeviewedasgatedbordersorgatewaysthatmanagethetravelof permittedandprohibitedwebactivityina
privatenetwork.Thetermcomesfromtheconceptof physicalwallsbeingbarrierstoslowthespreadoffire untilemergency
services canextinguish it.Comparably,networksecurityfirewallsareforwebtrafficmanagement—typicallyintendedto
slowthespreadof webthreats.
b. Security threats:
Cybersecurityprofessionals shouldhaveanin-depthunderstandingofthefollowingtypesofcybersecuritythreats.
1. Malware:
Malwareismalicioussoftware suchasspyware,ransomware,virusesandworms.Malwareisactivatedwhenauserclickson
amaliciouslinkorattachment,whichleadstoinstallingdangeroussoftware.Ciscoreportsthatmalware,onceactivated,can:
•Blockaccesstokeynetworkcomponents(ransomware)
•Installadditionalharmfulsoftware
•Covertlyobtaininformationbytransmittingdatafromtheharddrive(spyware)
•Disruptindividualparts,makingthesysteminoperable
2.Emotet:
TheCybersecurityandInfrastructureSecurityAgency(CISA)describes Emotetas“anadvanced,modularbankingTrojanthat
primarilyfunctionsasadownloaderordropperof otherbankingTrojans.Emotetcontinuestobeamongthemostcostlyand
destructivemalware.”
3.Denialof Service:
Adenialof service(DoS)isatypeofcyber-attackthatfloodsacomputerornetworksoitcan’trespondtorequests.AdistributedDoS
(DDoS)doesthesamething,buttheattackoriginatesfromacomputernetwork.Cyberattackersoften useafloodattacktodisruptthe
“handshake”processandcarryoutaDoS.Severalothertechniquesmaybeused,andsomecyberattackersusethetimethata
networkisdisabledtolaunchotherattacks.AbotnetisatypeofDDoSinwhichmillionsofsystemscanbeinfectedwithmalwareand
controlledbyahacker,accordingtoJeff Melnickof Netwrix,aninformationtechnologysecuritysoftwarecompany.Botnets,
sometimescalledzombiesystems,targetandoverwhelmatarget’sprocessingcapabilities.Botnetsareindifferent geographic
locationsandhardtotrace.
4.ManintheMiddle:
Aman-in-the-middle(MITM)attackoccurswhenhackersinsertthemselvesintoatwo-partytransaction.Afterinterruptingthe
traffic,theycanfilterandstealdata,accordingtoCisco.MITMattacksoften occurwhenavisitorusesanunsecuredpublicWi-Fi
network.Attackersinsertthemselvesbetween thevisitorandthenetwork,andthenusemalwaretoinstallsoftware andusedata
maliciously.
5.Phishing:
Phishingattacksusefakecommunication,suchasanemail,totrickthereceiverintoopeningitandcarryingout
theinstructionsinside, suchasprovidingacreditcardnumber.“Thegoalistostealsensitive datalikecreditcard
andlogininformationortoinstallmalwareonthevictim’smachine,”Ciscoreports.
6.SQLInjection:
AStructuredQueryLanguage(SQL)injectionisatypeofcyber-attackthatresultsfrominsertingmaliciouscode
intoaserverthatuses SQL.Wheninfected,theserverreleases information.Submittingthemaliciouscodecanbe
assimpleasenteringitintoavulnerablewebsite searchbox.
7.Password:
AttacksWiththerightpassword,acyberattackerhasaccesstoawealthofinformation.Socialengineeringisa
typeof passwordattackthatDataInsiderdefines as“astrategycyberattackerusethatrelies heavilyonhuman
interactionandoften involvestrickingpeopleintobreakingstandardsecuritypractices.”Othertypesofpassword
attacksincludeaccessingapassworddatabaseoroutrightguessing.
3.CyberLawandCyberSecurity:
Cybersecuritydenotes thetechnologiesandproceduresintendedtosafeguard
computers,networks,anddatafromunlawfuladmittance,weaknesses, andattacks
transportedthroughtheInternetbycyberdelinquents.ISO27001(ISO27001)isthe
internationalCybersecurityStandardthatdeliversamodelfor creating,applying,
functioning,monitoring,reviewing,preserving,andimprovinganInformationSecurity
ManagementSystem.
TheMinistryofCommunicationandInformationTechnologyunderthegovernmentof
IndiaprovidesastrategyoutlinecalledtheNationalCybersecurityPolicy.
Thepurposeofthisgovernmentbodyistoprotectthepublicandprivateinfrastructure
fromcyber-attacks.TheInformationTechnologyAct2000oranylegislationinthe
CountrydoesnotdescribeormentionthetermCyberCrime.Itcanbeglobally
consideredasthegloomierfaceof technology.
Theonlydifference betweenatraditionalcrimeandacyber-crimeisthatthecyber-
crimeinvolvesinacrimerelatedtocomputers.
4.Piracy:
Piracyrefers totheunauthorizedduplicationof copyrightedcontentthatis
thensoldatsubstantiallylowerpricesinthe'grey'market.Theeaseof
accesstotechnologyhasmeantthatovertheyears,piracyhasbecomemore
rampant.Forexample,CDwritersareavailableoff theshelfatverylow
prices,makingmusicpiracyasimpleaffair.
Copyright:
Copyrightisatypeofintellectualpropertythatprotectsoriginalworksof
authorshipassoon asanauthorfixes theworkinatangibleformof
expression. Incopyrightlaw,therearealotofdifferent typesofworks,
includingpaintings,photographs,illustrations,musicalcompositions,sound
recordings,computerprograms,books,poems,blogposts,movies,
architecturalworks,plays,andsomuchmore!
OpenSource:
Thetermopen sourcerefers tosomethingpeoplecanmodifyandshare
becauseitsdesignispubliclyaccessible.Exampleof opensourcesoftware
areLinux,Androidetc.
11. Write down the shortcut keys for the following purposes:
I. New Document = Ctrl + N
II. Open a document = Ctrl + O
III. Save a document = Ctrl + S
IV. Save as a document = F12
V. Print a document = Ctrl + P
VI. New Slide = Ctrl + M
VII. Hyperlink = Ctrl + K
VIII. Superscript = Ctrl + Shift + +
IX. Subscript = Ctrl + =
X. Cut = Ctrl + X
XI. Copy = Ctrl + C
XII. Paste = Ctrl + V
XIII. Undo = Ctrl + Z
XIV. Redo = Ctrl + Y
XV. Increase font size =Ctrl+ Shift+>
XVI. Decrease font size =Ctrl + Shift+<
XVII.Underline = Ctrl+ U
XVIII.Bold = Ctrl + B
XIX.Italic=Ctrl+I
XX. Find=Ctrl+F
XXI.Replace=Ctrl+H
XXII.Selectall=Ctrl+A
XXIII.Closecurrentdocument=Ctrl+W
XXIV.SpellingandGrammarinWord=F7
XXV.Thesaurus=Shift+F7
XXVI.Help=F1
XXVII.LeftAlignment=Ctrl+L
XXVIII.RightAlignment=Ctrl+R
XXIX.CentreAlignment=Ctrl+E
XXX.JustifyContent=Ctrl+J
XXXI.SlideShowfrombeginning=F5
XXXII.SlideshowofcurrentSlide=Shift+F5
XXXIII.InsertFunctioninExcel=Shift+F3
XXXIV.FilterinExcel=Ctrl+Shift+L
12.What do you mean by computer network?
Answer12. Acomputernetworkisagroupofcomputerslinkedtoeachotherthatenablesthecomputerto
communicatewithanothercomputerandsharetheirresources, data,andapplications.
Acomputernetworkcanbecategorizedbytheirsize.Acomputernetworkismainlyof fourtypes:
LAN(LocalAreaNetwork):
oLocalAreaNetworkisagroupofcomputersconnectedtoeachotherinasmallareasuchasbuilding,office. o
LANisusedfor connectingtwoormorepersonalcomputersthroughacommunicationmediumsuchastwisted
pair,coaxialcable,etc.oItislesscostlyasitisbuiltwithinexpensive hardwaresuchashubs,networkadapters,
andethernetcables.oThedataistransferred atanextremelyfasterrateinLocalAreaNetwork.oLocalArea
Networkprovideshighersecurity.
PAN(PersonalAreaNetwork):
oPersonalAreaNetworkisanetworkarrangedwithinanindividual
person,typicallywithinarangeof 10meters.
oPersonalAreaNetworkisusedforconnectingthecomputerdevices
ofpersonal useisknownasPersonalAreaNetwork.
oThomasZimmermanwasthefirstresearchscientist tobringtheidea
ofthePersonalAreaNetwork.oPersonalAreaNetworkcoversanarea
of30feet.
oPersonalcomputerdevicesthatareusedtodevelopthepersonal
areanetworkarethelaptop,mobilephones,mediaplayerandplay
stations.
TherearetwotypesofPersonal AreaNetwork:
oWiredPersonalAreaNetwork
oWireless PersonalAreaNetwork
Wireless PersonalAreaNetwork:
Wireless PersonalAreaNetworkisdevelopedbysimplyusingwireless technologiessuchasWIFI,Bluetooth.Itis
alowrangenetwork.WiredPersonal AreaNetwork:WiredPersonalAreaNetworkiscreatedbyusingtheUSB.
ExamplesofPersonal
AreaNetwork:
oBodyAreaNetwork:BodyAreaNetworkisanetworkthatmoveswithaperson.Forexample,amobilenetwork
moveswithaperson.Supposeaperson establishesanetworkconnectionandthencreatesaconnectionwith
anotherdevicetosharetheinformation.
oOffline Network:Anoffline networkcanbecreatedinsidethehome,soitisalsoknownasahomenetwork.A
homenetworkisdesignedtointegratethedevicessuchasprinters,computer,television buttheyarenot
connectedtotheinternet.
oSmallHomeOffice:Itisusedtoconnectavarietyofdevicestotheinternetandtoacorporatenetworkusinga
VPN
MAN(MetropolitanAreaNetwork)
oAmetropolitanareanetworkisanetworkthatcoversalarger
geographicareabyinterconnectingadifferent LANtoformalarger
network.
oGovernmentagenciesuseMANtoconnecttothecitizensandprivate
industries.
oInMAN,variousLANsareconnectedtoeachotherthroughatelephone
exchangeline.
oThemostwidelyusedprotocolsinMANareRS-232,FrameRelay,ATM,
ISDN,OC-3,ADSL,etc.
oIthasahigherrangethanLocalAreaNetwork(LAN)
UsesofMetropolitanAreaNetwork:
oMANisusedincommunicationbetween thebanksinacity.
oItcanbeusedinanAirlineReservation. oItcanbeusedinacollege
withinacity.
oItcanalsobeusedfor communicationinthemilitary
WAN(WideAreaNetwork):
oAWideAreaNetworkisanetworkthatextendsoveralarge
geographicalareasuchasstatesorcountries.
oAWideAreaNetworkisquitebiggernetworkthantheLAN.
oAWideAreaNetworkisnotlimitedtoasinglelocation,butitspans
overalargegeographicalareathroughatelephoneline,fibreoptic
cableorsatellitelinks.
oTheinternetisoneofthebiggestWANintheworld.oAWideArea
NetworkiswidelyusedinthefieldofBusiness,government,and
education.
ExamplesofWideAreaNetwork:
oMobileBroadband:
A4Gnetworkiswidelyusedacrossaregionorcountry.oLastmile:A
telecomcompanyisusedtoprovidetheinternetservices tothe
customersinhundredsofcitiesbyconnectingtheirhomewithfibre.
oPrivatenetwork:Abankprovidesaprivatenetworkthatconnectsthe
44offices. Thisnetworkismadebyusingthetelephoneleasedline
providedbythetelecomcompany.
Advantages of Wide Area Network:
Following are the advantages of the Wide Area Network:
o Geographical area: A Wide Area Network provides a large geographical area. Suppose if the
branch of our office is in a different city then we can connect with them through WAN. The
internet provides a leased line through which we can connect with another branch.
o Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to
buy the emails, files or back up servers.
o Get updated files: Software companies work on the live server. Therefore, the programmers
get the updated files within seconds.
o Exchange messages: In a WAN network, messages are transmitted fast. The web
application like Facebook, WhatsApp, Skype allows you to communicate with friends.
o Sharing of software and resources: In WAN network, we can share the software and other
resources like a hard drive, RAM. o Global business: We can do the business over the internet
globally.
o High bandwidth: If we use the leased lines for our company then this gives the high
bandwidth. The high bandwidth increases the data transfer rate which in turn increases the
productivity of our company.
Disadvantages of Wide Area Network:
The following are the disadvantages of the Wide Area
Network:
o Security issue: A WAN network has more security issues as
compared to LAN and MAN network as all the technologies
are combined together that creates the security problem.
o Needs Firewall & antivirus software: The data is transferred
on the internet which can be changed or hacked by the
hackers, so the firewall needs to be used. Some people can
inject the virus in our system so antivirus is needed to
protect from such a virus.
o High Setup cost: An installation cost of the WAN network
is high as it involves the purchasing of routers, switches.
o Troubleshooting problems: It covers a large area so fixing
the problem is difficult.
concon

More Related Content

Similar to computer file for elementry computer application's.pptx

A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...Ryousei Takano
 
Dr.Balamurugan_Fundamentals_of_Computer.pptx
Dr.Balamurugan_Fundamentals_of_Computer.pptxDr.Balamurugan_Fundamentals_of_Computer.pptx
Dr.Balamurugan_Fundamentals_of_Computer.pptxBalamurugan M
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...IRJET Journal
 
COA-Unit 1 Introduction.pptx
COA-Unit 1 Introduction.pptxCOA-Unit 1 Introduction.pptx
COA-Unit 1 Introduction.pptxOmGadekar2
 
Itb Chap 11
Itb Chap 11Itb Chap 11
Itb Chap 11lindy23
 
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling SystemIRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling System
IRJET- Smart Energy Meter Billing, Monitoring and Controlling SystemIRJET Journal
 
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...Deployment of the Festo PA Workstation for Undergraduate Training on Industri...
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...theijes
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Higher Order Thinking - Question paper setting
Higher Order Thinking - Question paper settingHigher Order Thinking - Question paper setting
Higher Order Thinking - Question paper settingPradeep Kumar TS
 
MCSoC'13 Keynote Talk "Taming Big Data Streams"
MCSoC'13 Keynote Talk "Taming Big Data Streams"MCSoC'13 Keynote Talk "Taming Big Data Streams"
MCSoC'13 Keynote Talk "Taming Big Data Streams"Hideyuki Kawashima
 
Simulation and Modelling of 3-Floor Elevator System using PLC
Simulation and Modelling of 3-Floor Elevator System using PLCSimulation and Modelling of 3-Floor Elevator System using PLC
Simulation and Modelling of 3-Floor Elevator System using PLCIRJET Journal
 
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...IOSR Journals
 

Similar to computer file for elementry computer application's.pptx (20)

Module2 computer system
Module2 computer systemModule2 computer system
Module2 computer system
 
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
 
Dr.Balamurugan_Fundamentals_of_Computer.pptx
Dr.Balamurugan_Fundamentals_of_Computer.pptxDr.Balamurugan_Fundamentals_of_Computer.pptx
Dr.Balamurugan_Fundamentals_of_Computer.pptx
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...
 
Functional units
Functional unitsFunctional units
Functional units
 
COA-Unit 1 Introduction.pptx
COA-Unit 1 Introduction.pptxCOA-Unit 1 Introduction.pptx
COA-Unit 1 Introduction.pptx
 
Itb Chap 11
Itb Chap 11Itb Chap 11
Itb Chap 11
 
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling SystemIRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling System
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
 
COA_UNIT-1new[1].pdf
COA_UNIT-1new[1].pdfCOA_UNIT-1new[1].pdf
COA_UNIT-1new[1].pdf
 
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...Deployment of the Festo PA Workstation for Undergraduate Training on Industri...
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Higher Order Thinking - Question paper setting
Higher Order Thinking - Question paper settingHigher Order Thinking - Question paper setting
Higher Order Thinking - Question paper setting
 
MCSoC'13 Keynote Talk "Taming Big Data Streams"
MCSoC'13 Keynote Talk "Taming Big Data Streams"MCSoC'13 Keynote Talk "Taming Big Data Streams"
MCSoC'13 Keynote Talk "Taming Big Data Streams"
 
Simulation and Modelling of 3-Floor Elevator System using PLC
Simulation and Modelling of 3-Floor Elevator System using PLCSimulation and Modelling of 3-Floor Elevator System using PLC
Simulation and Modelling of 3-Floor Elevator System using PLC
 
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...
 
Ntroduction to computer architecture and organization
Ntroduction to computer architecture and organizationNtroduction to computer architecture and organization
Ntroduction to computer architecture and organization
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
UNIT 1.docx
UNIT 1.docxUNIT 1.docx
UNIT 1.docx
 
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

computer file for elementry computer application's.pptx