SlideShare une entreprise Scribd logo
1  sur  60
Q) What do you understand by SDLC? Explain the steps involved in a s/w devt cycle. What the various types of error that are encountered while developing software?<br />Ans)  A software development process is a structure imposed on the development of a software product. Synonyms include software life cycle and software process. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during the process.<br />SDLC is the process of developing information systems through investigation, analysis, design, implementation and maintenance. SDLC is also known as information systems development or application development. SDLC is a systems approach to problem solving and is made up of several phases, each comprised of multiple steps: <br />The software concept - identifies and defines a need for the new system <br />A requirements analysis - analyzes the information needs of the end users <br />The architectural design - creates a blueprint for the design with the necessary specifications for the hardware, software, people and data resources <br />Coding and debugging - creates and programs the final system <br />System testing - evaluates the system's actual functionality in relation to expected or intended functionality. <br />Steps in S/W development cycle :<br />System Engineering and Modelling:<br /> In this process we have to identify the projects requirement and main features proposed in the application. Here the development team visits the customer and their system. They investigate the need for possible software automation in the given system. By the end of the investigation study. The team writes a document that holds the specifications for the customer system. <br />Software Requirement Analysis<br />In this software requirements analysis, firstly analysis the requirement for the proposed system. To understand the nature of the program to built, the system engineer must understand the information domain for the software, as well as required functions, performance and the interfacing. From the available information the system engineer develops a list of the actors use cases and system level requirement for the project. With the help of key user the list of use case and requirement is reviewed. Refined and updated in an iterative fashion until the user is satisfied that it represents the essence of the proposed system. <br />Systems analysis and design<br />The design is the process of designing exactly how the specifications are to be implemented. It defines specifically how the software is to be written including an object model with properties and method for each object, the client/server technology, the number of tiers needed for the package architecture and a detailed database design. Analysis and design are very important in the whole development cycle. Any glitch in the design could be very expensive to solve in the later stage of the software development. <br />Code generation<br />The design must be translated into a machine readable form. The code generation step performs this task. The development phase involves the actual coding of the entire application. If design is performed in a detailed manner. Code generation can be accomplished with out much complicated. Programming tools like compilers, interpreters like c, c++, and java are used for coding .with respect to the type of application. The right programming language is chosen. <br />Testing<br />After the coding. The program testing begins. There are different methods are there to detect the error in coding .different method are already available. Some companies are developed they own testing tools <br />Development and Maintenance<br />The development and maintenance is a staged roll out of the new application, this involves installation and initial training and may involve hardware and network upgrades. Software will definitely undergo change once it is delivered to the customer. There are many reasons for the change. Change could be happen because of some unexpected input values into the system. In addition, the changes in the system could be directly affecting the software operations. The software should be developed to accommodate changes that could happen during the post implementation period.<br />Errors encountered while developing software: <br />Q) What do you understand by I-P-O cycle in data processing? Discuss the relevance of an I-P-O cycle for :<br />,[object Object]
On-Line processing systemAns) <br />The Input-Process-Output Model also known as the IPO+S Model is a functional model and conceptual schema of a general system. An IPO chart identifies a program’s inputs, its outputs, and the processing steps required to transform the inputs into the outputs.<br />The IPOS Cycle is how a computer intakes data, processes the data, outputs information, and then saves the information. <br />1.InputComputer receives data from input device. 2.ProcessingComputer's central processing unit (CPU) processes the data into information. 3.OutputMeaningful information displayed on monitor or printed out. 4.StorageSaves results to computers hard drive or other types of secondary storage. <br />Sub-components:<br />Sub-components of a system can also have their own set of inputs and outputs that may differ from those of the larger system. Typically, outputs of a subcomponent are either input for another sub-component or become part of the ultimate output of the larger system. Whether or not a system is being considered at the macro or micro level determines what a specific item in a system is considered, and this variable level of detail is referred to as scope. Explicit discussions on scope are more common in a technological discussion as sub-units are considered more discretely in the natural sciences. In ecosystems, for example, sub-units are impacts as opposed to objects, namespaces, methods, and scale. Exceptions to this convention are when nominal data points must be encoded for a scientific model simulation.<br />Batch Processing System:<br />A batch processing system is one where programs and data are collected together in a batch before processing starts. <br />Each piece of work for a batch processing system is called a job. A job usually consists of a program and the data to be run.<br />Jobs are stored in job queues until the computer is ready to process them.<br />There is no interaction between the user and the computer while the program is being run. Computers which do batch processing often operate at night.<br />Example: Payroll - when a company calculates the wages for its workforce and prints pay slips.<br />Batch processing is execution of a series of programs (quot;
jobsquot;
) on a computer without manual intervention.<br />Batch jobs are set up so they can be run to completion without manual intervention, so all input data is preselected through scripts or command-line parameters. This is in contrast to quot;
onlinequot;
 or interactive programs which prompt the user for such input. A program takes a set of data files as input, process the data, and produces a set of output data files. This operating environment is termed as quot;
batch processingquot;
 because the input data are collected into batches on files and are processed in batches by the program.<br />Batch processing has these benefits:<br />It allows sharing of computer resources among many users and programs, <br />It shifts the time of job processing to when the computing resources are less busy, <br />It avoids idling the computing resources with minute-by-minute manual intervention and supervision, <br />By keeping high overall rate of utilization, it better amortizes the cost of a computer, especially an expensive one. <br />Common batch processing usage<br />Data processing<br />A typical batch processing procedure is End of day-reporting (EOD), especially on mainframes. Historically systems were designed to have a batch window where online subsystems were turned off and system capacity was used to run jobs common to all data (accounts, users or customers) on a system. In a bank, for example, EOD jobs include interest calculation, generation of reports and data sets to other systems, print (statements) and payment processing.<br />Printing<br />A popular computerized batch processing procedure is printing. This normally involves the operator selecting the documents they need printed and indicating to the batch printing software when, where they should be output and priority of the print job. Then the job is sent to the print queue from where printing daemon sends them to the printer.<br /> Databases<br />Batch processing is also used for efficient bulk database updates and automated transaction processing, as contrasted to interactive online transaction processing (OLTP) applications.<br />Images<br />Batch processing is often used to perform various operations with digital images. There exist computer programs that let one resize, convert, watermark, or otherwise edit image files.<br />Converting<br />Batch processing is also used for converting a number of computer files from one format to another. This is to make files portable and versatile especially for proprietary and legacy files where viewers are not easy to come by.<br />Online Processing System:<br />Online transaction processing, or OLTP, refers to a class of systems that facilitate and manage transaction-oriented applications, typically for data entry and retrieval transaction processing. The term is somewhat ambiguous; some understand a quot;
transactionquot;
 in the context of computer or database transactions, while others (such as the Transaction Processing Performance Council) define it in terms of business or commercial transactions.[1] OLTP has also been used to refer to processing in which the system responds immediately to user requests. An automatic teller machine (ATM) for a bank is an example of a commercial transaction processing application.<br />The technology is used in a number of industries, including banking, airlines, mailorder, supermarkets, and manufacturing. Applications include electronic banking, order processing, employee time clock systems, e-commerce, and eTrading<br />Online transaction processing increasingly requires support for transactions that span a network and may include more than one company. For this reason, new OLTP software uses client/server processing and brokering software that allows transactions to run on different computer platforms in a network.<br />In large applications, efficient OLTP may depend on sophisticated transaction management software (such as CICS) and/or database optimization tactics to facilitate the processing of large numbers of concurrent updates to an OLTP-oriented database.<br />For even more demanding Decentralized database systems, OLTP brokering programs can distribute transaction processing among multiple computers on a network. OLTP is often integrated into SOA service-oriented architecture and Web services. Because there is a need for transactions you will need online processing.<br />Benefits<br />Online Transaction Processing has two key benefits: simplicity and efficiency. Reduced paper trails and the faster, more accurate forecasts for revenues and expenses are both examples of how OLTP makes things simpler for businesses.<br /> Disadvantages<br />As with any information processing system, security and reliability are considerations. Online transaction systems are generally more susceptible to direct attack and abuse than their offline counterparts. When organizations choose to rely on OLTP, operations can be severely impacted if the transaction system or database is unavailable due to data corruption, systems failure, or network availability issues. Additionally, like many modern online information technology solutions, some systems require offline maintenance which further affects the cost-benefit analysis.<br /> <br />Short Notes:<br />,[object Object],A computer language is the means by which instructions and data are transmitted to computers. Put another way, computer languages are the interface between a computer and a human being. There are various computer languages, each with differing complexities. For example, the information that is understandable to a computer is expressed as zeros and ones (i.e., binary language). However, binary language is incomprehensible to humans. Computer scientists find it far more efficient to communicate with computers in a higher level language.<br />Computer Languages - First-generation Language<br />First-generation language is the lowest level computer language. Information is conveyed to the computer by the programmer as binary instructions. Binary instructions are the equivalent of the on/off signals used by computers to carry out operations. The language consists of zeros and ones. In the 1940s and 1950s, computers were programmed by scientists sitting before control panels equipped with …<br />Computer Languages - Second-generation Language<br />Assembly or assembler language was the second generation of computer language. By the late 1950s, this language had become popular. Assembly language consists of letters of the alphabet. This makes programming much easier than trying to program a series of zeros and ones. As an added programming assist, assembly language makes use of mnemonics, or memory aids, which are easier for the human progra…<br />Computer Languages - Third-generation Language<br />The introduction of the compiler in 1952 spurred the development of third-generation computer languages. These languages enable a programmer to create program files using commands that are similar to spoken English. Third-level computer languages have become the major means of communication between the digital computer and its user. By 1957, the International Business Machine Corporation (IBM) had…<br />Computer Languages - Fourth-generation Language<br />Fourth-generation languages attempt to make communicating with computers as much like the processes of thinking and talking to other people as possible. The problem is that the computer still only understands zeros and ones, so a compiler and interpreter must still convert the source code into the machine code that the computer can understand.<br />,[object Object],A Computer Network or simply Network is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. Networks may be classified according to a wide variety of characteristics. <br />Development of the network began in 1969, based on designs developed during the 1960s.<br />Facilitating communications.<br /> Sharing hardware.<br /> Sharing files, data, and information.<br /> Sharing software.<br />list presents categories used for classifying networks.<br />Connection method<br />Computer networks can be classified according to the hardware and software technology that is used to interconnect the individual devices in the network, such as optical fiber, Ethernet, Wireless LAN, HomePNA, Power line communication or G.hn.<br />Wired technologies<br />Twisted-pair wireCoaxial<br />Fiber optic cable<br />,[object Object],Terrestrial Microwave <br />Communications Satellites <br />Cellular and PCS Systems <br />Wireless LANs –<br />Bluetooth – A short range wireless technology. Operate at approx. 1Mbps with range from 10 to 100 meters. Bluetooth is an open wireless protocol for data exchange over short distances. <br />The Wireless Web <br />Scale<br />Networks are often classified as local area network (LAN), wide area network (WAN), metropolitan area network (MAN), personal area network (PAN), virtual private network (VPN), campus area network (CAN), storage area network (SAN), and others, depending on their scale, scope and purpose. Usage, trust level, and access right often differ between these types of network. For example, LANs tend to be designed for internal use by an organization's internal systems and employees in individual physical locations (such as a building), while WANs may connect physically separate parts of an organization and may include connections to third parties.<br />Functional relationship (network architecture)<br />Computer networks may be classified according to the functional relationships which exist among the elements of the network, e.g., active networking, client-server and peer-to-peer (workgroup) architecture.<br />Network topology<br />Computer networks may be classified according to the network topology upon which the network is based, such as bus network, star network, ring network, mesh network, star-bus network, tree or hierarchical topology network. Network topology is the coordination by which devices in the network are arrange in their logical relations to one another, independent of physical arrangement. Even if networked computers are physically placed in a linear arrangement and are connected to a hub, the network has a star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct. Networks may be classified based on the method of data used to convey the data, these include digital and analog networks.<br />Types of networks<br />Common types of computer networks may be identified by their scale.<br />Personal area network<br />A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. A PAN may include wired and wireless connections between devices. The reach of a PAN typically extends to 10 meters.[2] Wired PAN network is usually constructed with USB and Firewire while wireless with Bluetooth and Infrared.[3]<br />Local area network<br />A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines)[4].<br />Typical library network, in a branching tree topology and controlled access to resources<br />All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called quot;
layer 3 switchesquot;
 because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers.<br />The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their higher data transfer rates, smaller geographic range, and no need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 40 and 100 Gbit/s.[5]<br />Home area network<br />A home area network (HAN) or home network is a residential local area network which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. An important function is the sharing of Internet access, often a broadband service through a CATV or Digital Subscriber Line (DSL) provider.<br />Campus area network<br />A campus area network (CAN) is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. It can be considered one form of a metropolitan area network, specific to an academic setting.<br />In the case of a university campus-based campus area network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. A campus area network is larger than a local area network but smaller than a wide area network (WAN) (in some cases).<br />The main aim of a campus area network is to facilitate students accessing internet and university resources. This is a network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, office building, or a military base. A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to a smaller area than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network. A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings.<br />Metropolitan area network<br />A metropolitan area network (MAN) is a network that connects two or more local area networks or campus area networks together but does not extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are connected to create a metropolitan area network.<br />Wide area network<br />A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.<br />Global area network<br />A global area network (GAN) is a model for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is handing off the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial WIRELESS local area networks (WLAN).[6]<br />Virtual private network<br />A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.<br />A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.<br />A VPN allows computer users to appear to be editing from an IP address location other than the one which connects the actual computer to the Internet.<br />Internet<br />The Internet is a global system of interconnected governmental, academic, public, and private computer networks. It is based on the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the U.S. Department of Defense. The Internet is also the communications backbone underlying the World Wide Web (WWW). The 'Internet' is most commonly spelled with a capital 'I' as a proper noun, for historical reasons and to distinguish it from other generic internetworks.<br />Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP Addresses) administered by the Internet Assigned Numbers Authority and address registries. Service providers and large enterprises exchange information about the reachability of their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths.<br />Intranets and extranets<br />Intranets and extranets are parts or extensions of a computer network, usually a local area network.<br />An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications, that is under the control of a single administrative entity. That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. A large intranet will typically have at least one web server to provide users with organizational information.<br />An extranet is a network that is limited in scope to a single organization or entity and also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities (e.g., a company's customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be considered 'trusted' from a security standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network.<br />,[object Object],Cloud computing is a way of computing, via the Internet, that broadly shares computer resources instead of using software or storage on a local computer.<br />Cloud computing is an outgrowth of the ease-of-access to remote computing sites provided by the Internet.[1]<br />In concept, it is a paradigm shift whereby details are abstracted from the users who no longer have need of, expertise in, or control over the technology infrastructure quot;
in the cloudquot;
 that supports them.[2] Cloud computing describes a new supplement, consumption and delivery model for IT services based on the Internet, and it typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet.[3][4]<br />The term cloud is used as a metaphor for the Internet, based on the cloud drawing used to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents.[5] Typical cloud computing providers deliver common business applications online which are accessed from a web browser, while the software and data are stored on servers.<br />A technical definition is quot;
a computing capability that provides an abstraction between the computing resource and its underlying technical architecture (e.g., servers, storage, networks), enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.quot;
[6] This definition states that clouds have five essential characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.[6] Narrowly speaking, cloud computing is client-server computing that abstract the details of the server away – one requests a service (resource), not a specific server (machine). However, cloud computing may be conflated with other terms, including client-server and utility computing, and the term has been criticized as vague and referring to quot;
everything that we currently doquot;
.[7][8][9]<br />The majority of cloud computing infrastructure, as of 2009[update], consists of reliable services delivered through data centers and built on servers. Clouds often appear as single points of access for all consumers' computing needs. Commercial offerings are generally expected to meet quality of service (QoS) requirements of customers and typically offer SLAs.[10]<br />Comparisons<br />Cloud computing can be confused with:<br />Grid computing — quot;
a form of distributed computing and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasksquot;
 <br />Utility computing — the quot;
packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricityquot;
;[11] <br />Autonomic computing — quot;
computer systems capable of self-managementquot;
.[12] <br />Client-server – Client-server computing refers broadly to any distributed application that distinguishes between service providers (servers) and service requesters (clients).[13] Cloud computing is a narrower form of client-server, where the details of the server are abstracted – for example, one may not connect to a specific server. However, due to the popularity of the cloud metaphor, quot;
cloud computingquot;
 may be used to refer to any form of client-server computing. <br />,[object Object],Computer programming (often shortened to programming or coding) is the process of writing, testing, debugging/troubleshooting, and maintaining the source code of computer programs. This source code is written in a programming language. The code may be a modification of an existing source or something completely new. The purpose of programming is to create a program that exhibits a certain desired behaviour (customization). The process of writing source code often requires expertise in many different subjects, including knowledge of the application domain, specialized algorithms and formal logic.<br />Overview<br />Within software engineering, programming (the implementation) is regarded as one phase in a software development process.<br />There is an ongoing debate on the extent to which the writing of programs is an art, a craft or an engineering discipline.[1] In general, good programming is considered to be the measured application of all three, with the goal of producing an efficient and evolvable software solution (the criteria for quot;
efficientquot;
 and quot;
evolvablequot;
 vary considerably). The discipline differs from many other technical professions in that programmers, in general, do not need to be licensed or pass any standardized (or governmentally regulated) certification tests in order to call themselves quot;
programmersquot;
 or even quot;
software engineers.quot;
 However, representing oneself as a quot;
Professional Software Engineerquot;
 without a license from an accredited institution is illegal in many parts of the world.[citation needed]<br />Another ongoing debate is the extent to which the programming language used in writing computer programs affects the form that the final program takes. This debate is analogous to that surrounding the Sapir-Whorf hypothesis [2] in linguistics, that postulates that a particular language's nature influences the habitual thought of its speakers. Different language patterns yield different patterns of thought. This idea challenges the possibility of representing the world perfectly with language, because it acknowledges that the mechanisms of any language condition the thoughts of its speaker community.<br />Said another way, programming is the craft of transforming requirements into something that a computer can execute.<br />E-Commerce :<br />Electronic commerce, commonly known as (electronic marketing) e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with widespread Internet usage. The use of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.<br />A large percentage of electronic commerce is conducted entirely electronically for virtual items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. Online retailers are sometimes known as e-tailers and online retail is sometimes known as e-tail. Almost all big retailers have electronic commerce presence on the World Wide Web.<br />Electronic commerce that is conducted between businesses is referred to as business-to-business or B2B. B2B can be open to all interested parties (e.g. commodity exchange) or limited to specific, pre-qualified participants (private electronic market). Electronic commerce that is conducted between businesses and consumers, on the other hand, is referred to as business-to-consumer or B2C. This is the type of electronic commerce conducted by companies such as Amazon.com.<br />Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.<br />Some common applications related to electronic commerce are the following:<br />Email <br />Enterprise content management <br />Instant messaging <br />Newsgroups <br />Online shopping and order tracking <br />Online banking <br />Online office suites <br />Domestic and international payment systems <br />Shopping cart software <br />Teleconferencing <br />Electronic tickets <br />Flow – Charting:<br />A flowchart is a common type of diagram, that represents an algorithm or process, showing the steps as boxes of various kinds, and their order by connecting these with arrows. This diagrammatic representation can give a step-by-step solution to a given problem. Data is represented in these boxes, and arrows connecting them represent flow / direction of flow of data. Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.<br />Flowchart building blocks<br />Examples<br />A simple flowchart for computing factorial N (N!)<br />A flowchart for computing factorial N (N!) where N! = (1 * 2 * 3 * ... * N), see image. This flowchart represents a quot;
loop and a halfquot;
 — a situation discussed in introductory programming textbooks that requires either a duplication of a component (to be both inside and outside the loop) or the component to be put inside a branch in the loop. (Note: Some textbooks recommend against this quot;
loop and a halfquot;
 since it is considered bad structure, instead a 'priming read' should be used and the loop should return back to the original question and not above it.[7])<br />Symbols<br />A typical flowchart from older Computer Science textbooks may have the following kinds of symbols:<br />Start and end symbols <br />Represented as circles, ovals or rounded rectangles, usually containing the word quot;
Startquot;
 or quot;
Endquot;
, or another phrase signaling the start or end of a process, such as quot;
submit enquiryquot;
 or quot;
receive productquot;
. <br />Arrows <br />Showing what's called quot;
flow of controlquot;
 in computer science. An arrow coming from one symbol and ending at another symbol represents that control passes to the symbol the arrow points to. <br />Processing steps <br />Represented as rectangles. Examples: quot;
Add 1 to Xquot;
; quot;
replace identified partquot;
; quot;
save changesquot;
 or similar. <br />Input/Output <br />Represented as a parallelogram. Examples: Get X from the user; display X. <br />Conditional or decision <br />Represented as a diamond (rhombus). These typically contain a Yes/No question or True/False test. This symbol is unique in that it has two arrows coming out of it, usually from the bottom point and right point, one corresponding to Yes or True, and one corresponding to No or False. The arrows should always be labeled. More than two arrows can be used, but this is normally a clear indicator that a complex decision is being taken, in which case it may need to be broken-down further, or replaced with the quot;
pre-defined processquot;
 symbol. <br />A number of other symbols that have less universal currency, such as:<br />A Document represented as a rectangle with a wavy base; <br />A Manual input represented by parallelogram, with the top irregularly sloping up from left to right. An example would be to signify data-entry from a form; <br />A Manual operation represented by a trapezoid with the longest parallel side at the top, to represent an operation or adjustment to process that can only be made manually. <br />A Data File represented by a cylinder. <br /> <br />Flow Chart for Computing Factorial of N<br />Short Notes:<br />“Goal Seek” Analysis:<br />Goal Seek is used to get a particular result when you're not too sure of the starting value. For example, if the answer is 56, and the first number is 8, what is the second number? Is it 8 multiplied by 7, or 8 multiplied by 6? You can use Goal Seek to find out. We'll try that example to get you started, and then have a go at a more practical example.<br />Create the following Excel 2007 spreadsheet<br />In the spreadsheet above, we know that we want to multiply the number in B1 by the number in B2. The number in cell B2 is the one we're not too sure of. The answer is going in cell B3. Our answer is wrong at the moment, because we has a Goal of 56. To use Goal Seek to get the answer, try the following:<br />From the Excel menu bar, click on Data <br />Locate the Data Tools panel and the What if Analysis item. From the What if Analysis menu, select Goal Seek <br />The following dialogue box appears: <br />The first thing Excel is looking for is quot;
Set cellquot;
. This is not very well named. It means quot;
Which cell contains the Formula that you want Excel to usequot;
. For us, this is cell B3. We have the following formula in B3:<br />= B1 * B2<br />So enter B3 into the quot;
Set cellquot;
 box, if it's not already in there.<br />The quot;
To valuequot;
 box means quot;
What answer are you looking forquot;
? For us, this is 56. So just type 56 into the quot;
To valuequot;
 box<br />The quot;
By Changing Cellquot;
 is the part you're not sure of. Excel will be changing this part. For us, it was cell B2. We're weren't sure which number, when multiplied by 8, gave the answer 56. So type B2 into the box.<br />You Goal Seek dialogue box should look like ours below:<br />Click OK and Excel will tell you if it has found a solution:<br />Click OK again, because Excel has found the answer. Your new spreadsheet will look like this one:<br />As you can see, Excel has changed cell B2 and replace the 6 with a 7 - the correct answer. <br />Track Changes:<br />Track Changes is a way for Microsoft Word to keep track of the changes you make to a document. You can then choose to accept or reject those changes.<br />Let's say Bill creates a document and emails it to his colleague, Lee, for feedback. Lee can edit the document with Track Changes on. When Lee sends the document back to Bill, Bill can see what changes Lee had made.<br />Track Changes is also known as redline, or redlining. This is because some industries traditionally draw a vertical red line in the margin to show that some text has changed.<br />To use Track Changes, you need to know that there are three entirely separate things that might be going on at any one time:<br />First, at some time in the past (last week, yesterday, one millisecond ago), Word might have kept track of the changes you made. It did this because you turned on Track Changes. Word then remembered the changes you made to your document, and stored the changes in your document. <br />Second, if Word has stored information about changes you've made to your document, then you can choose to display those changes, or to hide them. Hiding them doesn't make them go away. It just hides them from view. (The only way to remove the tracked changes from your document is to accept or reject them.) <br />Third, at this very moment in time, Word may be tracking the changes you make to your document. <br />Just to make the point:<br />Word may, or may not, be currently keeping track of the changes you make. <br />At the same time, Word may, or may not, have stored  changes you made to the document at some point in the past. <br />And, at the same time, Word may, or may not, be displaying those tracked changes. Turning off (ie, hiding) the tracked changes doesn't remove them. It just hides them. To remove the tracked changes from the document, you must accept or reject them <br />World Wide Web:<br /> The World Wide Web, abbreviated as WWW and commonly known as The Web, is a system of interlinked hypertext documents contained on the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them by using hyperlinks. Using concepts from earlier hypertext systems, British engineer and computer scientist Sir Tim Berners Lee, now the Director of the World Wide Web Consortium, wrote a proposal in March 1989 for what would eventually become the World Wide Web.[1] He was later joined by Belgian computer scientist Robert Cailliau while both were working at CERN in Geneva, Switzerland. In 1990, they proposed using quot;
HyperText [...] to link and access information of various kinds as a web of nodes in which the user can browse at willquot;
,[2] and released that web in December.[3]<br />quot;
The World-Wide Web (W3) was developed to be a pool of human knowledge, which would allow collaborators in remote sites to share their ideas and all aspects of a common project.quot;
 [4] If two projects are independently created, rather than have a central figure make the changes, the two bodies of information could form into one cohesive piece of work.<br />The terms Internet and World Wide Web are often used in every-day speech without much distinction. However, the Internet and the World Wide Web are not one and the same. The Internet is a global system of interconnected computer networks. In contrast, the Web is one of the services that runs on the Internet. It is a collection of interconnected documents and other resources, linked by hyperlinks and URLs. In short, the Web is an application running on the Internet.[17] Viewing a web page on the World Wide Web normally begins either by typing the URL of the page into a web browser, or by following a hyperlink to that page or resource. The web browser then initiates a series of communication messages, behind the scenes, in order to fetch and display it.<br />First, the server-name portion of the URL is resolved into an IP address using the global, distributed Internet database known as the domain name system, or DNS. This IP address is necessary to contact the Web server. The browser then requests the resource by sending an HTTP request to the Web server at that particular address. In the case of a typical web page, the HTML text of the page is requested first and parsed immediately by the web browser, which then makes additional requests for images and any other files that form parts of the page. Statistics measuring a website's popularity are usually based either on the number of 'page views' or associated server 'hits' (file requests) that take place.<br />While receiving these files from the web server, browsers may progressively render the page onto the screen as specified by its HTML, CSS, and other web languages. Any images and other resources are incorporated to produce the on-screen web page that the user sees. Most web pages will themselves contain hyperlinks to other related pages and perhaps to downloads, source documents, definitions and other web resources. Such a collection of useful, related resources, interconnected via hypertext links, is what was dubbed a quot;
webquot;
 of information. Making it available on the Internet created what Tim Berners-Lee first called the WorldWideWeb (in its original CamelCase, which was subsequently discarded) in November 1990.[2]<br />What does W3 define?<br />W3, or WWW, represents many concepts:<br />the idea of a boundless world of information interconnected by hypertext links for easy point-and-click access; <br />the Uniform Resource Identifier (URI) concept, an addressing system that the project implemented to make this world possible, despite many different protocols; <br />the Hypertext Transfer Protocol (HTTP), a network protocol used to transfer web pages; <br />the Hypertext Markup Language (HTML) a content formatting framework that every WWW client can understand, and is used for the formatting of text, menus and simple on-line help information across the net;<br />Embedded Systems: <br />An embedded system is a computer system designed to perform one or a few dedicated functions[1][2] often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer, is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today.[3]<br />Embedded systems are controlled by one or more main processing cores that is typically either a microcontroller or a digital signal processor (DSP).[4] The key characteristic is however being dedicated to handle a particular task, which may require very powerful processors. For example, air traffic control systems may usefully be viewed as embedded, even though they involve mainframe computers and dedicated regional and national networks between airports and radar sites. (Each radar probably includes one or more embedded systems of its own.)<br />Since the embedded system is dedicated to specific tasks, design engineers can optimize it reducing the size and cost of the product and increasing the reliability and performance. Some embedded systems are mass-produced, benefiting from economies of scale.<br />Physically, embedded systems range from portable devices such as digital watches and MP3 players, to large stationary installations like traffic lights, factory controllers, or the systems controlling nuclear power plants. Complexity varies from low, with a single microcontroller chip, to very high with multiple units, peripherals and networks mounted inside a large chassis or enclosure.<br />In general, quot;
embedded systemquot;
 is not a strictly definable term, as most systems have some element of extensibility or programmability. For example, handheld computers share some elements with embedded systems such as the operating systems and microprocessors which power them, but they allow different applications to be loaded and peripherals to be connected. Moreover, even systems which don't expose programmability as a primary feature generally need to support software updates. On a continuum from quot;
general purposequot;
 to quot;
embeddedquot;
, large application systems will have subcomponents at most points even if the system as a whole is quot;
designed to perform one or a few dedicated functionsquot;
, and is thus appropriate to call quot;
embeddedquot;
.<br />Characteristics<br />Soekris net4801, an embedded system targeted at network applications.<br />Embedded systems are designed to do some specific task, rather than be a general-purpose computer for multiple tasks. Some also have real-time performance constraints that must be met, for reasons such as safety and usability; others may have low or no performance requirements, allowing the system hardware to be simplified to reduce costs. <br />Embedded systems are not always standalone devices. Many embedded systems consist of small, computerized parts within a larger device that serves a more general purpose. For example, the Gibson Robot Guitar features an embedded system for tuning the strings, but the overall purpose of the Robot Guitar is, of course, to play music.[5] Similarly, an embedded system in an automobile provides a specific function as a subsystem of the car itself. <br />The program instructions written for embedded systems are referred to as firmware, and are stored in read-only memory or Flash memory chips. They run with limited computer hardware resources: little memory, small or non-existent keyboard and/or screen. <br />URL:<br />In computing, a Uniform Resource Locator (URL) is a subset of the Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it. In popular usage and in many technical documents and verbal discussions it is often incorrectly used as a synonym for URI,[1] the best-known example of which is the 'address' of a web page on the World Wide Web.<br />Syntax<br />Main article: URI scheme#Generic syntax<br />Every URL consists of some of the following: the scheme name (commonly called protocol), followed by a colon, then, depending on scheme, a hostname (alternatively, IP address), a port number, the path of the resource to be fetched or the program to be run, then, for programs such as Common Gateway Interface (CGI) scripts, a query string,[6][7] and with HTML documents, an anchor (optional) for where the page should start to be displayed.[8]<br />The combined syntax isresource_type://username:password@domain:port/path?query_string#anchor<br />The scheme name, or resource type, defines its namespace, purpose, and the syntax of the remaining part of the URL. Most Web-enabled programs will try to dereference a URL according to the semantics of its scheme and a context. For example, a Web browser will usually dereference the URL http://example.org:80 by performing an HTTP request to the host example.org, at the port number 80. Dereferencing the URN mailto:bob@example.com will usually start an e-mail composer with the address bob@example.com in the To field. <br />Absolute vs relative URLs<br />An absolute URL is one that completely specifies the desired resource starting from the root of the resource name space. It is unique, meaning that if two absolute URLs are identical, they point to the same resource.[9] An example is: http://en.wikipedia.org/wiki/File:Raster_to_Vector_Mechanical_Example.jpg<br />A relative URL points to the location of a resource relative to a base URL.[9][10] It is preceded by two dots (../directory_path/file.txt) for the directory above, one dot (./directory_path/file.txt) for the current directory or without the beginning slash (directory_path/file.txt) which is also the current directory. No dots (/directory_path/file.txt) for the root directory or domain. Which results to http://www.webreference.com/directory_path/file.txt.<br />URLs as locators<br />A URL is a URI that, quot;
in addition to identifying a resource, provides a means of locating the resource<br /> by describing its primary access mechanism (e.g., its network location<br />Relational Databases:<br />A relational database matches data by using common characteristics found within the data set. The resulting groups of data are organized and are much easier for people to understand.<br />For example, a data set containing all the real-estate transactions in a town can be grouped by the year the transaction occurred; or it can be grouped by the sale price of the transaction; or it can be grouped by the buyer's last name; and so on.<br />Such a grouping uses the relational model (a technical term for this is schema). Hence, such a database is called a quot;
relational database.quot;
<br />The software used to do this grouping is called a relational database management system. The term quot;
relational databasequot;
 often refers to this type of software.<br />Relational databases are currently the predominant choice in storing financial records, manufacturing and logistical information, personnel data and much more.<br />Relational termSQL equivalentrelation, base relvartablederived relvarview, query result, result settuplerowattributecolumn<br />[edit] Relations or Tables<br />Main articles: Relation (database) and Table (database)<br />A relation is defined as a set of tuples that have the same attributes. A tuple usually represents an object and information about that object. Objects are typically physical objects or concepts. A relation is usually described as a table, which is organized into rows and columns. All the data referenced by an attribute are in the same domain and conform to the same constraints.<br />The relational model specifies that the tuples of a relation have no specific order and that the tuples, in turn, impose no order on the attributes. Applications access data by specifying queries, <br />which use operations such as select to identify tuples, project to identify attributes, and join to combine relations. Relations can be modified using the insert, delete, and update operators. New tuples can supply explicit values or be derived from a query. Similarly, queries identify tuples for updating or deleting. It is necessary for each tuple of a relation to be uniquely identifiable by some combination (one or more) of its attribute values. This combination is referred to as the primary key.<br />Mail Merge:<br />You use mail merge when you want to create a set of documents that are essentially the same but where each document contains unique elements. For example, in a letter that announces a new product, your company logo and the text about the product will appear in each letter, and the address and greeting line will be different in each letter. <br />Using mail merge, you can create:<br />A set of labels or envelopes   The return address is the same on all the labels or envelopes, but the destination address is unique on each one. <br />A set of form letters, e-mail messages, or faxes   The basic content is the same in all the letters, messages, or faxes, but each contains information that is specific to the individual recipient, such as name, address, or some other piece of personal data. <br />A set of numbered coupons   The coupons are identical except that each contains a unique number. <br />Creating each letter, message, fax, label, envelope, or coupon individually would take hours. That's where mail merge comes in. Using mail merge, all you have to do is create one document that contains the information that is the same in each version. Then you just add some placeholders for the information that is unique to each version. Word takes care of the rest.<br />Start the mail merge process<br />To start the mail merge process: <br />Start Word. <br />A blank document opens by default. Leave it open. If you close it, the next step won't work.<br />On the Tools menu, point to Letters and Mailings, and then click Mail Merge. <br /> Note    In Word 2002, on the Tools menu, point to Letters and Mailings, and then click Mail Merge Wizard.<br />The Mail Merge task pane opens. By using hyperlinks in the task pane, you navigate through the mail-merge process.<br />Slide Transition:<br />What is a Slide Transition?<br />A slide transition is the visual motion when one slide changes to the next during a presentation. By default, one slide simply replaces the previous one on screen, much the same way that a slide show of photographs would change from one to the next. Most presentation software programs provide many different transition effects that you can use to liven up your slide show. <br />What are the Slide Transition Choices?<br />Transitions range from a simple Cover Down, where the next slide covers the current one from the top of the screen, to a Wheel Clockwise where the new slide spins in like spokes on a wheel to cover the previous one. You can also have slides dissolve into each other, push each other off the screen, or open up like horizontal or vertical blinds. <br />Common Mistakes When Using Slide Transitions<br />While all this choice may seem like a great thing, common mistakes made are to use too many transitions, or to use one that doesn’t fit well with the subject matter. In most cases, find one transition that doesn’t detract from the presentation and use it throughout the show. <br />Add a Different Slide Transition to Slides Needing Special Emphasis<br />If there is a slide that needs special emphasis, you might consider using a separate transition for it, but don’t choose a separate transition for each slide. Your slide show will look amateurish and your audience will quite likely be distracted from the presentation itself, as they wait and watch for the next transition. <br />Slide Transitions are Finishing Touches<br />Slide Transitions are one of the many finishing touches to a presentation. Wait until you have the slides edited and arranged in the preferred order before setting animations.<br /> <br />,[object Object],Hierarchy of storage<br />Various forms of storage, divided according to their distance from the central processing unit. The fundamental components of a general-purpose computer are arithmetic and logic unit, control circuitry, storage space, and input/output devices. Technology and capacity as in common home computers around 2005.<br />[edit] Primary storage<br />Direct links to this section: Primary storage, Main memory, Internal Memory. <br />Primary storage (or main memory or internal memory), often referred to simply as memory, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required. Any data actively operated on is also stored there in uniform manner.<br />Historically, early computers used delay lines, Williams tubes, or rotating magnetic drums as primary storage. By 1954, those unreliable methods were mostly replaced by magnetic core memory, which was still rather cumbersome. Undoubtedly, a revolution was started with the invention of a transistor, that soon enabled then-unbelievable miniaturization of electronic memory via solid-state silicon chip technology.<br />This led to a modern random-access memory (RAM). It is small-sized, light, but quite expensive at the same time. (The particular types of RAM used for primary storage are also volatile, i.e. they lose the information when not powered).<br />As shown in the diagram, traditionally there are two more sub-layers of the primary storage, besides main large-capacity RAM:<br />Processor registers are located inside the processor. Each register typically holds a word of data (often 32 or 64 bits). CPU instructions instruct the arithmetic and logic unit to perform various calculations or other operations on this data (or with the help of it). Registers are technically among the fastest of all forms of computer data storage. <br />Processor cache is an intermediate stage between ultra-fast registers and much slower main memory. It's introduced solely to increase performance of the computer. Most actively used information in the main memory is just duplicated in the cache memory, which is faster, but of much lesser capacity. On the other hand it is much slower, but much larger than processor registers. Multi-level hierarchical cache setup is also commonly used—primary cache being smallest, fastest and located inside the processor; secondary cache being somewhat larger and slower. <br />Main memory is directly or indirectly connected to the CPU via a memory bus. It is actually two buses (not on the diagram): an address bus and a data bus. The CPU firstly sends a number through an address bus, a number called memory address, that indicates the desired location of data. Then it reads or writes the data itself using the data bus. Additionally, a memory management unit (MMU) is a small device between CPU and RAM recalculating the actual memory address, for example to provide an abstraction of virtual memory or other tasks.<br />As the RAM types used for primary storage are volatile (cleared at start up), a computer containing only such storage would not have a source to read instructions from, in order to start the computer. Hence, non-volatile primary storage containing a small startup program (BIOS) is used to bootstrap the computer, that is, to read a larger program from non-volatile secondary storage to RAM and start to execute it. A non-volatile technology used for this purpose is called ROM, for read-only memory (the terminology may be somewhat confusing as most ROM types are also capable of random access).<br />Many types of quot;
ROMquot;
 are not literally read only, as updates are possible; however it is slow and memory must be erased in large portions before it can be re-written. Some embedded systems run programs directly from ROM (or similar), because such programs are rarely changed. Standard computers do not store non-rudimentary programs in ROM, rather use large capacities of secondary storage, which is non-volatile as well, and not as costly.<br />Recently, primary storage and secondary storage in some uses refer to what was historically called, respectively, secondary storage and tertiary storage.[1]<br />[edit] Secondary storage<br />A hard disk drive with protective cover removed.<br />Secondary storage (or external memory) differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage. Secondary storage does not lose the data when the device is powered down—it is non-volatile. Per unit, it is typically also an order of magnitude less expensive than primary storage. Consequently, modern computer systems typically have an order of magnitude more secondary storage than primary storage and data is kept for a longer time there.<br />In modern computers, hard disk drives are usually used as secondary storage. The time taken to access a given byte of information stored on a hard disk is typically a few thousandths of a second, or milliseconds. By contrast, the time taken to access a given byte of information stored in random access memory is measured in billionths of a second, or nanoseconds. This illustrates the very significant access-time difference which distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically about a million times slower than memory. Rotating optical storage devices, such as CD and DVD drives, have even longer access times. With disk drives, once the disk read/write head reaches the proper placement and the data of interest rotates under it, subsequent data on the track are very fast to access. As a result, in order to hide the initial seek time and rotational latency, data are transferred to and from disks in large contiguous blocks.<br />When data reside on disk, block access to hide latency offers a ray of hope in designing efficient external memory algorithms. Sequential or block access on disks is orders of magnitude faster than random access, and many sophisticated paradigms have been developed to design efficient algorithms based upon sequential and block access . Another way to reduce the I/O bottleneck is to use multiple disks in parallel in order to increase the bandwidth between primary and secondary memory.[2]<br />Some other examples of secondary storage technologies are: flash memory (e.g. USB flash drives or keys), floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks, and Iomega Zip drives.<br />The secondary storage is often formatted according to a file system format, which provides the abstraction necessary to organize data into files and directories, providing also additional information (called metadata) describing the owner of a certain file, the access time, the access permissions, and other information.<br />Most computer operating systems use the concept of virtual memory, allowing utilization of more primary storage capacity than is physically available in the system. As the primary memory fills up, the system moves the least-used chunks (pages) to secondary storage devices (to a swap file or page file), retrieving them later when they are needed. As more of these retrievals from slower secondary storage are necessary, the more the overall system performance is degraded.<br />Difference:<br />PRIMARY STORAGE DEVICES            SECONDARY STORAGE DEVICES<br />1.These devices are tempo-      1.These devices are permanent.<br />rary.                       <br />2.These devices are expensive.  2.These are cheaper.<br />3.These devices are faster as,  3.These devices Computers via <br />Connected directly               cables,and slow, therefore <br />                                cheaper.<br />4.These devices have less       4.These devices have high =<br />storage capacity.               storage capacity.<br />5.These devices refer to RAM.   5.These devices refer to FDD<br />6.Refers to as Volatile memory 6. Non Volatile memory<br />As Storage capacity is limited                               as storage capacity is unlimited   <br />Q) What do you understand by the term  Operating System? <br />Ans) In computing, an operating system (OS) is an interface between hardware and user, which is responsible for the management and coordination of activities and the sharing of the resources of a computer, that acts as a host for computing applications run on the machine. One of the purposes of an operating system is to handle the resource allocation and access protection of the hardware. This relieves the application programmers from having to manage these details.<br />Operating systems offer a number of services to application programs and users. Applications access these services through application programming interfaces (APIs) or system calls. By invoking these interfaces, the application can request a service from the operating system, pass parameters, and receive the results of the operation. Users may also interact with the operating system with some kind of software user interface like typing commands by using command line interface (CLI) or using a graphical user interface. For hand-held and desktop computers, the user interface is generally considered part of the operating system. <br />Services provided by an operating system<br />Program execution. The operating system loads the contents (or sections) of a file into memory and begins its execution. A userlevel program could not be trusted to properly allocate CPU time.<br />I/O operations. Disks, tapes, serial lines, and other devices must be communicated with at a very low level. The user need only specify the device and the operation to perform on it, while the system converts that request into device- or controller-specific commands. User-level programs cannot be trusted to access only devices they should have access to and to access them only when they are otherwise unused.<br /> File-system manipulation. There are many details in file creation, deletion, allocation, and naming that users should not have to perform. Blocks of disk space are used by files and must be tracked. Deleting a file requires removing the name file information and freeing the allocated blocks. Protections must also be checked to assure proper file access. User programs could neither ensure adherence to protection methods nor be trusted to allocate only free blocks and deallocate blocks on file deletion.<br /> Communications. Message passing between systems requires messages to be turned into packets of information, sent to the network controller, transmitted across a communications medium, and reassembled by the destination system. Packet ordering and data correction must take place. Again, user programs might not coordinate access to the network device, or they might receive packets destined for other processes.<br /> Error detection. Error detection occurs at both the hardware and software levels. At the hardware level, all data transfers must be inspected to ensure that data have not been corrupted in transit. All data on media must be checked to be sure they have not changed since they were written to the media. At the software level, media must be hecked for data consistency; for instance, whether the number of allocated and unallocated blocks of storage match the total number on the device. There, errors are frequently process-independent (for instance, the corruption of data on a disk), so there must be a global program (the operating system) that handles all types of errors. Also, by having errors processed by the operating system, processes need not contain code to catch and correct all the errors possible on a system.<br />Comparison between two operating systems:  Windows and Linux<br />Comparisons between the Microsoft Windows and Linux computer operating systems are a common topic of discussion among their users. Currently, Windows is the dominant proprietary operating system for personal desktop use (in terms of desktop installations), while Linux is the most prominent free software operating system. Both operating systems not only compete for user base in the personal computer market but are also rivals in the server and embedded systems markets.<br />User interface<br />WindowsLinuxNotesGraphical user interfaceThe Windows Shell. The window manager is the Desktop Window Manager on Windows Vista, and a Stacking window manager built on top of GDI in older versions. The desktop environment may be modified by a variety of third party products such as WindowBlinds; or completely replaced, for example by Blackbox for Windows, or LiteStep. With Windows Server 2008 and later server releases, there is also the option of running quot;
Server Corequot;
 which lacks the standard window manager. [22]. The graphics drivers, subsystem, and core widgets are included with all installations, including those used as servers.The KDE Plasma DesktopA number of desktop environments are available, of which GNOME and KDE are the most widely used. By default, they use as their window managers Metacity and KWin respectively, though these can be replaced by other window managers such as Compiz Fusion.Other desktop environments and window managers include Xfce, LXDE, Enlightenment, Xmonad, Openbox, Fluxbox, etc. The X Window system runs in user-space and is optional.[23] Multiple X Window system instances can run at once, and it is a fully networked protocol. See Also: Comparison of X Window System desktop environments.Command-line interfaceA sample Windows PowerShell sessionThe Command Prompt exists to provide direct communication between the user and the operating system. A .NET-based command line environment called Windows PowerShell has been developed. It varies from Unix/Linux shells in that, rather than using byte streams, the PowerShell pipeline is an object pipeline; that is, the data passed between cmdlets are fully typed objects. When data is piped as objects, the elements they encapsulate retain their structure and types across cmdlets, without the need for any serialization or explicit parsing of the stream. Cygwin or MS's own Services for Unix provides a bash terminal for Windows.[citation needed] Posix subsystem is built in but not enabled by default. The Console can execute up to 4 kinds of environments, MSDOS scripts under NT or via Command.com runnung on NTVDM, NT shell scripts and OS/2 Console Scripts. Windows Script Host is included in Windows 98 and newer versions.A sample Bash sessionLinux is strongly integrated with the system console. The command line can be used to recover the system if the graphics subsystem fails.[24][25] A large number of Unix shells exists; with the majority being quot;
Bourne shell compatiblequot;
 shells, of which the most widely used is GNU Bash. Alternatives include the feature-full Z shell; as well as shells based on the syntax of other programming languages, such as the C shell, and Perl Shell. Many applications can be scripted through the system console,[26] there are a lot of small and specialized utilities meant to work together and to integrate with other programs. This is called the toolbox principle.A command-line interface, typically displayed in a system console or terminal emulator window, allows users to tell the computer to perform tasks ranging from the simple (for example, copying a file) to the complex (compiling and installing new software). Shells are powerful but can be confusing to new users. Some complex tasks are more easily accomplished through shells than through a GUI, such as piping, or scripting. See also: Comparison of computer shells.<br />Installation :<br />Ease of InstallOn Windows Server 2003 and prior, the installation is divided into two stages; the first, text-mode; the second, graphical.[27] On Windows Vista and newer, the installation is single stage and graphical. Some older versions require third party drivers (for example, by using driver floppies disks or slipstreaming the drivers and creating a new installation CD) if using a large number of SATA or SATA2 drives or RAID arrays.[28]Varies greatly by distribution. Most distributions intended for new or intermediate users provide simple graphical installers. General purpose oriented distributions offer a live CD or GUI installer (SuSE, Debian, Pardus, Pclinuxos, Mandriva, Ubuntu, Fedora etc.), others offer a menu-driven installer (Vector Linux, Slackware, Debian) while others, targeting more specialized groups, require source to be copied and compiled (Gentoo). The system can also be built completely from scratch, directly from source code (Linux from Scratch).[29][30][31]DriversThe Windows installation media usually contains enough drivers to make the OS functional. To this end, quot;
genericquot;
 drivers may be used to provide basic functionality. Drivers can later be upgraded from the manufacturer. Windows Update contains many updated drivers that can be installed after the base OS is in place. Drivers are almost always closed-source, maintained and published by the manufacturer of their respective devices. Recent version of 64-bit Windows force all drivers to be signed, giving Microsoft the sole ability to authorize drivers; this feature cannot be easily overridden by system administrators.[32][33]Linux kernels in most distributions include the majority of drivers available as modules, hardware is detected and drivers loaded at boot with usually little or no user interaction required. These drivers are generally written by someone working for the hardware manufacturer or by someone in the user community skilled in doing so; usually the drivers are included in the kernel (open-source), and therefore do not require additional media or any user interaction. A few hardware manufactures (Broadcom, Nvidia) have proprietary drivers which require manual installation. Prior to introduction of DKMS, third party kernel modules had to be manually updated when the kernel was upgraded.Installation via Live EnvironmentsMay be installed through the Windows Preinstallation Environment or BartPE. However, only the former is endorsed by Microsoft. Only Microsoft-certified System Builders (OEM companies) are allowed to use the WinPE disk for installation, by license. End-users are not allowed to use the WinPE installation environment.Almost all Linux distributions now have a live CD that may be used for testing, install or recovery.[34]Pre-installed softwareSome multimedia and home use software (IE, Media Player, Notepad, WordPad, Paint…) plus OEM bundled software. Windows Vista Includes IE7, Windows Mail, Windows Media Center, etc. depending on which edition is purchased. It does not include Office suites or advanced multimedia software. However, Microsoft has licensed decoders for a number of patented audio and video coding methods, including the mp3 audio format, and Windows is able to play a number of patented formats by default.All main distributions contain numerous programs: multimedia, graphics, internet, office suites, games, system utilities and alternative desktop environments. Some distributions specialise in education, games, or security. Most distributions give users the choice of which bundled programs to install, if any.Microsoft's methods of bundling software were deemed illegal in the case United States v. Microsoft.[35]Not pre-installed softwareA massive pool of both proprietary software (including shareware and freeware) and free software. Programs usually come with the required libraries and are normally installed easily. Most programs must be individually installed. Uninstallation can be of varying difficulty depending on which of many installer methods were used, components and registry entries may be left behind. Windows has a built-in installer program, and software that is to be installed has an installer quot;
wrapperquot;
 that interfaces with the Windows Installer to accomplish installation. Not all Windows software uses the install manager.A massive pool of free software and some proprietary software covering a wide range of use. A Microsoft employee wrote in an internal report in 1998 that quot;
Most of the primary apps that people require when they move to Linux are already available for free.quot;
[36] Using free Windows-compatibility layers like Wine, some Windows software can also be run, often to a lesser degree, on Linux. Third-party software is usually listed/integrated into a packaging system, which is built into the OS. Less popular programs, which are not in the distributions repositories, are often provided in a form (such as the DEB format or the RPM (Red Hat Package Manager) format) which can be installed easily by the package manager. If no precompiled package exists, programs can be more or less automatically built from the source code. Most software is installed non-interactively to a default configuration.Linux distributions can not lawfully include MP3 or MPEG-4 file decoders in a majority of countries, as it would violate the Patent Cooperation Treaty. There is nothing preventing a user from installing these decoders, however the user assumes all liability for installing said pieces of software. Media players (such as Rhythmbox)) for free alternative audio/video formats are available in Linux, but these players are unable to decode patented formats, such as MP3, without installing additional plugin(s).[37] In particular with the MP3 file format, many companies claim patents relevant to the format. See Patent issues with MP3 for more information.PartitioningExpanding NTFS partitions is possible without problems, and on Vista it is possible to shrink partitions as well. Dynamic Disks provide dynamic partitioning. Third party tools are available that have more features than the built-in partitioning tools.Most file systems support resizing partitions without losing data. LVM provide dynamic partitioning. All Linux distributions have bundled partitioning software such as fdisk or gpartedFile systemsNatively supported: NTFS, FAT, ISO 9660, UDF, and others; 3rd-party drivers available for ext2, ext3, reiserfs, HFS, and othersNatively supported: ext2, ext3, ext4, ReiserFS, FAT, ISO 9660, UDF, NFS, NTFS (incomplete), JFS, XFS and others; many additional filesystems (most notably NTFS using NTFS-3g, and ZFS) are available using FUSE. Archives and FTP sites also can be mounted as filesystems.Windows can read and write with Ext2 and Ext3 file systems with third-party drivers such as FS-driver or ext2fsd; and ReiserFS through rfstool and related programs.Boot LoaderMay boot to multiple versions of Windows through the Windows Boot Manager in Windows Vista and newer; or the earlier boot loader NTLDR in Windows Server 2003 and prior. Graphical configuration tools are available for both, such as EasyBCD for the Windows Boot Manager and MSConfig for NTLDR, which can chain load multiple non-NT environments, including Linux, by referring to volume boot records from those environments saved on the Windows partition.[38]May boot to multiple operating systems through numerous bootloaders such as LILO and GRUB. With these, it is possible to choose among multiple installed kernel images at boot time. Graphical configuration tools for GRUB are available including KGRUBEditor[39] (KDE) and GrubConf [40] (GNOME). GRUB can also accept arbitrary, one-time configurations at boot time via the GRUB prompt. GRUB and LILO also support booting to non-Unix operating systems via chain loading; for a Windows and Linux dual-boot system, it is often easiest to install Windows first and then Linux because Linux installers such as Ubuntu's installer will automatically detect and set up other operating systems for dual/multiple boot with Linux.[41]<br />Accessibility and usability<br />A study released in 2003 by Relevantive AG indicates that “The usability of Linux as a desktop system was judged to be nearly equal to that of Windows XP”.[43]<br />WindowsLinuxUser FocusMostly consistent. Inconsistencies appear primarily through backports—software ported from newer operating systems to older ones. For example, software ported from Vista to XP must follow the Vista guidelines, those of the newer system (IE7 and Windows Media Player 11 are examples of this).[citation needed] However, Microsoft continually pushes for consistency between releases with guidelines for interface design. The latest are Windows Vista User Experience guidelines.[44] Their focus is on consistency and usability, but with increased concern for safety in new versions. Third-party applications may or may not follow these guidelines, may have their own guidelines, or may not follow any rules for interface design.The quality of graphical design varies between desktop environments and distributions. The two biggest desktop environments (GNOME and KDE) have clearly defined interface guidelines, which tend to be followed consistently and clearly.[45][46] These provide consistency and a high grade of customizability in order to adapt to the needs of the user. Distributions such as Ubuntu, SuSE, Fedora or Mandriva take this one step further, combining well-functioning usability and safety. However, inconsistencies may appear, since GNOME-based programs, following different guidelines, look notably different from KDE programs. There are other environments/window managers, usually targeting professionals or minimalist users, featuring some very powerful programs with rudimentary, minimalist graphical front-ends, focusing much more on performance, small size and safety. WindowMaker and the Fluxbox/Openbox/Blackbox environments are such examples. Some other environments fit between the two models, giving both power, eye candy and simplicity (Enlightenment/E17, Xfce). Some graphical environments are targeted to mouse users only (Fluxbox), others to keyboard users only (Ratpoison), others to either. Certain graphical environments are also designed to be as resource-conservative as possible, so as to run on older machines.Consistency between versionsUser interaction with software is usually consistent between versions, releases, and editions.Consistency ranges from high to poor between distributions, versions, window managers/desktop environments, and programs. Software is generally highly user-customizable, and the user may keep the customizations between versions.Consistency between applicationsAll Microsoft software follows the same guidelines for GUI, although not all software developed for Windows by third parties follows these GUI guidelines. As stated above, backports tend to follow the guidelines from the newer operating system.Highly consistent within KDE and GNOME. However the vast amount of additional software that comes with a distribution is sourced from elsewhere; it may not follow the same GUI guidelines or it may cause inconsistencies (e.g. different look and feel between programs built with different widget toolkits).Though Windows' GDI and most widget toolkits in Linux allow for applications to be created with a custom look and feel, most applications on both platforms simply use the default look and feel. However, there are exceptions like FL Studio for Windows, and LMMS for Linux.CustomizationBy default, Windows only offers customization of size and color of the graphical elements, and it is typically not possible to change how the interface reacts to user input. A few third-party programs allow more extensive customization, like WindowBlinds or LiteStep, but extreme changes are usually out of reach. It is not possible to customize applications that do not use the default look-and-feel beyond the options the specific application offers.Linux offers several user interfaces to choose from. Different environments and window managers offer various levels of customizability, ranging from colors and size to user input, actions, and display.AccessibilityBoth Windows and Linux offer accessibility options,[47] such as high contrast displays and larger text/icon size, text to speech and magnifiers.<br />Stability<br />WindowsLinuxNotesGeneral stabilityWindows operating systems based on the NT kernel (including all currently supported versions of desktop Windows) are technically much more stable than some older versions (including Windows 3.1 and 95/98). Installing unsigned or beta drivers can lead to decreased system stability (see below).A Linux window manager, a key component of the X Window-based GUI system, can be highly stable or quite buggy,[citation needed] but the more common ones are stable. Mechanisms to terminate badly behaving applications exist at multiple levels, such as Ksysguard and the kill command. Because Linux can use a text based system if the graphics system fails,[24][25] the graphics system can be easily restarted following a crash without a whole system reboot.Instability can be caused by poorly written programs, aside from intrinsic OS stability, as Linux's graphics system is decoupled from the kernel and the system. Linux's graphics system can usually be restarted without affecting non-graphical programs and services running under other shells, and without restart.[48]Device driver stabilityDevice drivers are provided by Microsoft or written by the hardware manufacturer. Microsoft also runs a certification program, WHQL Testing, through which most drivers are digitally signed by Microsoft as compatible with the operating system, especially on 64-bit versions. This ensures a maximum level of stability.Some vendors contribute to free drivers (Intel, HP, etc.) or provide proprietary drivers (Nvidia, ATI, etc.). Unlike Windows, however, kernel developers and hobbyists write many or most device drivers; in these drivers, any developer is potentially able to fix stability issues and other bugs. Kernel developers do not support the use of drivers that are not open-source, since only the manufacturer can fix stability issues in closed-source drivers.[49]Crashes can be caused by hardware problems or poorly written device drivers. Both operating systems, utilizing aspects of monolithic kernel architecture, run drivers in the same address space as the kernel, leading to crashes or hangs resulting from buggy device drivers.DowntimeReboots are usually required after system and driver updates. Microsoft has its hotpatching[50] technology, designed to reduce downtimes.Linux itself needs to restart only for kernel updates.[51] However, a special utility can be used to load the new kernel and execute it without a hardware reset (kexec) and hence can stay up for years without a single hardware reboot, reducing downtime. For minor updates such as security fixes, Ksplice allows the linux kernel to be patched without a reboot. System libraries, services and applications can mostly be upgraded without restarting running software (old instances use the quot;
replacedquot;
 versions)RecoveryIn modern, NT-based versions of Windows, programs that crash may be forcibly ended through the task manager by pressing CTRL+SHIFT+ESC or CTRL+ALT+DEL. Should this fail, other third-party applications can also be used. However, if a badly behaving application hangs the entire GUI, it is difficult or impossible to recover without restarting the entire computer, since there is no text-based management console independent of the GUI to resort to.All processes except for init and processes in D or Z state may be terminated from the command line. If the GUI hangs, on most distributions, CTRL+ALT+F1 takes the user to the terminal, where the process can be killed, and the GUI restored. Applications can also be closed via the GUI. The optional SysRQ allows low-level system manipulation and crash recovery. The entire graphical subsystem can be restarted without the need for a whole system shutdown. Reboots are seldom required.[52][53] Additionally, Live CDs of Linux, if equipped with the correct tools, can work to repair a broken OS if the hard drive is mountable.[54]Unrecoverable errorsIf the kernel or a driver running in kernel mode encounters an error under circumstances whereby Windows cannot continue to operate safely, a quot;
bug checkquot;
 (colloquially known as a quot;
stop errorquot;
 or quot;
Blue Screen of Deathquot;
) is thrown. A memory dump is created and, depending on the configuration, the computer may then automatically restart. Additionally, automatic restart can be applied to services.The Unix equivalent of the Windows blue screen is known as a kernel panic. The kernel routines that handle panics are usually designed to output an error message to the console, create a memory dump, and then either halt the system or restart automatically.<br />Performance<br />WindowsLinuxNotesProcess SchedulingNT-based versions of Windows use a CPU scheduler based on a multilevel feedback queue, with 32 priority levels defined. The kernel may change the priority level of a thread depending on its I/O and CPU usage and whether it is interactive (i.e. accepts and responds to input from humans), raising the priority of interactive and I/O bounded processes and lowering that of CPU bound processes, to increase the responsiveness of interactive applications.[55] The scheduler was modified in Windows Vista to use the cycle counter register of modern processors to keep track of exactly how many CPU cycles a thread has executed, rather than just using an interval-timer interrupt routine.[56]Linux kernel 2.6 once used a scheduling algorithm favoring interactive processes. Here quot;
interactivequot;
 is defined as a process that has short bursts of CPU usage rather than long ones. It is said that a process without root privilege can take advantage of this to monopolize the CPU,[57] when the CPU time accounting precision is low. However, Completely Fair Scheduler, now the standard scheduler, addresses this problem.<br />Memory Management/ Disk PagingWindows NT family (including 2000, XP, Vista, Win7) most commonly employs a dynamically allocated pagefile for memory management. A pagefile is allocated on disk, for less frequently accessed objects in memory, leaving more RAM available to actively used objects. This scheme suffers from slow-downs due to disk fragmentation (if a variable size paging file is specified), which hampers the speed at which the objects can be brought back into memory when they are needed. Windows XP and later can defragment the pagefile, and on NTFS filesystems, intelligently allocate blocks to avoid this problem. Windows can be configured to place the pagefile on a separate disk or partition.[58] However, this is not default behavior, because if the pagefile is on a separate partition, then Windows cannot create a memory dump in the event of a Stop Error. On the NT family, executed programs become part of the paging system (to improve performance). Programs cannot normally access each others address space. It is possible to configure the OS to have no additional paging file.[clarification needed] The Windows 3.1/95/98/ME family does not have true virtual memory and uses a simpler swapping scheme easily leading to needless swaps and disc fragmentation. Programs on this family can access each other's address space. [59]Most hard drive installations of Linux utilize a quot;
swap partitionquot;
, where the disk space allocated for paging is separate from general data, and is used strictly for paging operations. This reduces slowdown due to disk fragmentation from general use. As with Windows, for best performance the swap partition should be placed on a hard drive separate from the primary one. Linux also allows to adjust quot;
swappinessquot;
 e.g. the amount of data it needs to buffer (this is not equivalent to adjusting the virtual memory size). Windows does not support such features.The ideal solution performance-wise is to have the pagefile on its own hard drive, which eliminates both fragmentation and I/O issues.<br />Q)  What are applications? How are they diferent from system software?<br />Ans)  Application software is computer software designed to help the user to perform a singular or multiple related specific tasks. Such programs are also called software applications, applications or apps. Typical examples are word processors, spreadsheets, media players and database applications.<br />Terminology<br />In [computer science], an application is a computer program designed to help people perform a certain type of work. An application thus differs from an operating system (which runs a computer), a utility (which performs maintenance or general-purpose chores), and a programming language (with which computer programs are created). Depending on the work for which it was designed, an application can manipulate text, numbers, graphics, or a combination of these elements.<br />The Application Software is a software that APPLIES to the real life application. For example: Microsoft Word is used to create documents similar to you create manually on paper. Accounting Softwares those are used for accounting which is simallarly done manually on Account Book.Thus, Application Software are easier to be understood by normal users because they directly deals with the normal real life applications.But the System Softwares are the softwares which deals with the system or hardware. For example: Disk Management Tools which are used to partition or format the disk.System Softwares are recommended to be used only by Advanced users who are having advance knowledge of the computer system.<br />In easier language, your car have some controls like stearing, accelerator, break etc. To drive a car you have to know about only these controlls. But the car is not directly controlled by breaks, accelerator and stearing. These all controls are connected with engine and other machines. And these machines controls the car. Working of these machines are not known by all the persons who drive the car. It is known by mechanics.We can say that stearing, break, accelerator are Application and engine and machines are the systems.<br />Q)  Discuss various phases of development of modern computing. How has this affected the way business is conducted?<br />Ans)<br />1. Introduction<br />For the past couple of years, the Chief Minister of Andhra Pradesh has used Information Technology (IT) as a quot;
mantraquot;
 to get his state to march forward. He has drawn considerable attention in India as well as the rest of the world and is today often referred to as the CEO of Andhra Pradesh. The new BJP-led government at Delhi, recognising the role that IT is playing in the world today in enabling countries to strengthen their technological leadership, and the considerable contributions that Indian professionals are making in this arena both in India and abroad, set up a high-powered IT task force, to break India’s shackles and make her quot;
a Global IT Superpower and a front-runner in the age of Information Revolutionquot;
.<br />The task force has moved fast and in a considerably short time have come up with two reports. The first report, IT Action Plan, consisting of 108 recommendations suggests quot;
revisions and additions to the existing policy and procedures for removing bottlenecks and achieving a pre-eminent status for Indiaquot;
. The second report, referred to as a Basic Background Report on IT Hardware Development, Production and Export calls for a paradigm shift in the IT hardware industry so that it quot;
can survive the future shock of fast changing prices, technological obsolescence and an ever-expanding horizon of highly innovative industryquot;
, creation of a proper investment climate, and streamlining of procedures for minimising uncertainty, grey market, avoidable licensing and purposeless inspection. The aim is to make India the quot;
number one provider of IT productsquot;
 in the world.<br />Do these IT reports constitute a first step in making India a global IT superpower? Can IT be used in India to transform the country by providing a new vision to the youth of the country, enabling them to stand up, no longer feeling inferior to others in the world? This article addresses such questions in the context of the IT task force reports. First, some salient features of the report are highlighted. This is followed by a brief analysis of the IT infrastructure today along with the efforts made by different groups and agencies over the last 10–15 years in overcoming the bottlenecks. Analysing our strengths, the article concludes by pointing to the directions that need to be taken to achieve our dream of transforming India.<br />2.0 The IT Task Force<br />2.1 The IT Action Plan Report<br />In spite of efforts by the Department of Telecommunications and others over the last fifteen years, the info-infrastructure in India is considered by most to be grossly inadequate. The hold that DoT, MTNL, and VSNL have over this sector is considered by many, especially in the Indian corporate sector, to be a serious bottleneck. There is a growing demand to open up, let in finance and technology, and where necessary, management too, in order to alleviate the present situation. The task force recommendation on info-infrastructure aims to
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management
Computers in management

Contenu connexe

Tendances

Integration of Social Media and Mobile Websites & Apps
Integration of Social Media and Mobile Websites & AppsIntegration of Social Media and Mobile Websites & Apps
Integration of Social Media and Mobile Websites & AppsHenri Makembe
 
Computer Memory
Computer MemoryComputer Memory
Computer Memorybabaradhe
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - BasicsIsha Joshi
 
Strategic information system
Strategic information system Strategic information system
Strategic information system Megha_pareek
 
Computer System
Computer SystemComputer System
Computer Systemhajjaz
 
Computer graphics notes
Computer graphics notesComputer graphics notes
Computer graphics notessmruti sarangi
 
Computer generation and language translator
Computer generation and language translatorComputer generation and language translator
Computer generation and language translatorShruti Pendharkar
 
Basics of Computer.ppt
Basics of Computer.pptBasics of Computer.ppt
Basics of Computer.pptNKarpagam1
 
Characteristics of computer
Characteristics of computerCharacteristics of computer
Characteristics of computerPriyaU5
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devicesPichano Kikon
 
Development of computer
Development of computerDevelopment of computer
Development of computerZiyad Siso
 
Information processing cycle
Information processing cycleInformation processing cycle
Information processing cycleCriselda Liscano
 
History Of Computer
History Of ComputerHistory Of Computer
History Of Computerguest420b9d
 
FORMAL & INFORMAL INFORMATION SYSTEM
FORMAL & INFORMAL  INFORMATION SYSTEMFORMAL & INFORMAL  INFORMATION SYSTEM
FORMAL & INFORMAL INFORMATION SYSTEMZahid Parvez
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1adpafit
 
Operating systems (For CBSE School Students)
Operating systems (For CBSE School Students)Operating systems (For CBSE School Students)
Operating systems (For CBSE School Students)Gaurav Aggarwal
 

Tendances (20)

Integration of Social Media and Mobile Websites & Apps
Integration of Social Media and Mobile Websites & AppsIntegration of Social Media and Mobile Websites & Apps
Integration of Social Media and Mobile Websites & Apps
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
1. the computer system
1. the computer system1. the computer system
1. the computer system
 
Information Technology for Managers - Basics
Information Technology for Managers - BasicsInformation Technology for Managers - Basics
Information Technology for Managers - Basics
 
Strategic information system
Strategic information system Strategic information system
Strategic information system
 
Input & output unit
Input & output unitInput & output unit
Input & output unit
 
Computer System
Computer SystemComputer System
Computer System
 
System analysis
System analysisSystem analysis
System analysis
 
Computer graphics notes
Computer graphics notesComputer graphics notes
Computer graphics notes
 
Computer generation and language translator
Computer generation and language translatorComputer generation and language translator
Computer generation and language translator
 
Basics of Computer.ppt
Basics of Computer.pptBasics of Computer.ppt
Basics of Computer.ppt
 
Data and Information
Data and InformationData and Information
Data and Information
 
Characteristics of computer
Characteristics of computerCharacteristics of computer
Characteristics of computer
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devices
 
Development of computer
Development of computerDevelopment of computer
Development of computer
 
Information processing cycle
Information processing cycleInformation processing cycle
Information processing cycle
 
History Of Computer
History Of ComputerHistory Of Computer
History Of Computer
 
FORMAL & INFORMAL INFORMATION SYSTEM
FORMAL & INFORMAL  INFORMATION SYSTEMFORMAL & INFORMAL  INFORMATION SYSTEM
FORMAL & INFORMAL INFORMATION SYSTEM
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
 
Operating systems (For CBSE School Students)
Operating systems (For CBSE School Students)Operating systems (For CBSE School Students)
Operating systems (For CBSE School Students)
 

En vedette

Role of computers in business organisation
Role of computers in business organisationRole of computers in business organisation
Role of computers in business organisationShruti Jain
 
BBA- I Computer Basics Course Module
BBA- I Computer Basics Course ModuleBBA- I Computer Basics Course Module
BBA- I Computer Basics Course Modulepcte
 
Computer Resource Management
Computer Resource ManagementComputer Resource Management
Computer Resource Managementanusachu .
 
Ch9 computer integrated manufacturing
Ch9 computer integrated manufacturingCh9 computer integrated manufacturing
Ch9 computer integrated manufacturingviswa375
 
Syllabus For Basic Computer Management
Syllabus For  Basic  Computer  ManagementSyllabus For  Basic  Computer  Management
Syllabus For Basic Computer Managementmerittman
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theoriesRavi Yasas
 
12.industrial safety engineering
12.industrial safety engineering12.industrial safety engineering
12.industrial safety engineeringkarthikmechgod
 
EMC NetWorker Module for Microsoft SQL Server Administrators ...
EMC NetWorker Module for Microsoft SQL Server Administrators ...EMC NetWorker Module for Microsoft SQL Server Administrators ...
EMC NetWorker Module for Microsoft SQL Server Administrators ...webhostingguy
 
Bixal PMP Study Group Chapter 1 - Dec. 3, 2014
Bixal PMP Study Group Chapter 1 - Dec. 3, 2014Bixal PMP Study Group Chapter 1 - Dec. 3, 2014
Bixal PMP Study Group Chapter 1 - Dec. 3, 2014Jason Luttrell
 
Computer harware complete notes
Computer harware complete notesComputer harware complete notes
Computer harware complete notesthetechnicalzone
 
A Study of Computer Applications in the Management of Aavin Dairy Cooperative...
A Study of Computer Applications in the Management of Aavin Dairy Cooperative...A Study of Computer Applications in the Management of Aavin Dairy Cooperative...
A Study of Computer Applications in the Management of Aavin Dairy Cooperative...Dr. Ramkumar Lakshminarayanan
 
Chapter 14 Dynamics of Behavior in Organizations
Chapter 14 Dynamics of Behavior in OrganizationsChapter 14 Dynamics of Behavior in Organizations
Chapter 14 Dynamics of Behavior in OrganizationsRayman Soe
 
Introduction To Computer Applications
Introduction To Computer ApplicationsIntroduction To Computer Applications
Introduction To Computer Applicationsjmaklary
 
CIM - Computer-integrated manufacturing
CIM - Computer-integrated manufacturing CIM - Computer-integrated manufacturing
CIM - Computer-integrated manufacturing trebamrest
 
Computer application in business
Computer application in businessComputer application in business
Computer application in businessUZAIR UDDIN SHAIKH
 

En vedette (20)

Role of computers in business organisation
Role of computers in business organisationRole of computers in business organisation
Role of computers in business organisation
 
Computer Management Short Version Ppt
Computer Management Short Version PptComputer Management Short Version Ppt
Computer Management Short Version Ppt
 
BBA- I Computer Basics Course Module
BBA- I Computer Basics Course ModuleBBA- I Computer Basics Course Module
BBA- I Computer Basics Course Module
 
Computer Resource Management
Computer Resource ManagementComputer Resource Management
Computer Resource Management
 
Ch9 computer integrated manufacturing
Ch9 computer integrated manufacturingCh9 computer integrated manufacturing
Ch9 computer integrated manufacturing
 
Syllabus For Basic Computer Management
Syllabus For  Basic  Computer  ManagementSyllabus For  Basic  Computer  Management
Syllabus For Basic Computer Management
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
 
12.industrial safety engineering
12.industrial safety engineering12.industrial safety engineering
12.industrial safety engineering
 
EMC NetWorker Module for Microsoft SQL Server Administrators ...
EMC NetWorker Module for Microsoft SQL Server Administrators ...EMC NetWorker Module for Microsoft SQL Server Administrators ...
EMC NetWorker Module for Microsoft SQL Server Administrators ...
 
CIM
CIMCIM
CIM
 
Bixal PMP Study Group Chapter 1 - Dec. 3, 2014
Bixal PMP Study Group Chapter 1 - Dec. 3, 2014Bixal PMP Study Group Chapter 1 - Dec. 3, 2014
Bixal PMP Study Group Chapter 1 - Dec. 3, 2014
 
Computer application in warehousing and inventory management
Computer application in warehousing and inventory managementComputer application in warehousing and inventory management
Computer application in warehousing and inventory management
 
Computer harware complete notes
Computer harware complete notesComputer harware complete notes
Computer harware complete notes
 
Original assignment
Original assignmentOriginal assignment
Original assignment
 
A Study of Computer Applications in the Management of Aavin Dairy Cooperative...
A Study of Computer Applications in the Management of Aavin Dairy Cooperative...A Study of Computer Applications in the Management of Aavin Dairy Cooperative...
A Study of Computer Applications in the Management of Aavin Dairy Cooperative...
 
Chapter 14 Dynamics of Behavior in Organizations
Chapter 14 Dynamics of Behavior in OrganizationsChapter 14 Dynamics of Behavior in Organizations
Chapter 14 Dynamics of Behavior in Organizations
 
Introduction To Computer Applications
Introduction To Computer ApplicationsIntroduction To Computer Applications
Introduction To Computer Applications
 
Pmp study: time
Pmp study: timePmp study: time
Pmp study: time
 
CIM - Computer-integrated manufacturing
CIM - Computer-integrated manufacturing CIM - Computer-integrated manufacturing
CIM - Computer-integrated manufacturing
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 

Similaire à Computers in management

Library Management System using oracle database
Library Management System using oracle databaseLibrary Management System using oracle database
Library Management System using oracle databaseSaikot Roy
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptxjack952975
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and designRobinsonObura
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentationanuj_rakheja
 
Issue Management System
Issue Management SystemIssue Management System
Issue Management SystemPratik Vipul
 
Software engineering : Layered Architecture
Software engineering : Layered ArchitectureSoftware engineering : Layered Architecture
Software engineering : Layered ArchitectureMuhammed Afsal Villan
 
Iterative Waterfall model
Iterative Waterfall modelIterative Waterfall model
Iterative Waterfall modelAnmol Purohit
 
Different Approaches To Sys Bldg
Different Approaches To Sys BldgDifferent Approaches To Sys Bldg
Different Approaches To Sys BldgUSeP
 
Dot Net performance monitoring
 Dot Net performance monitoring Dot Net performance monitoring
Dot Net performance monitoringKranthi Paidi
 
Mobile store management
Mobile store management Mobile store management
Mobile store management Rupendra Verma
 
A level-computing-9691-paper-1-notes
A level-computing-9691-paper-1-notesA level-computing-9691-paper-1-notes
A level-computing-9691-paper-1-noteshuzyrah
 
12th CBSE Computer Science Project
12th CBSE Computer Science Project12th CBSE Computer Science Project
12th CBSE Computer Science ProjectAshwin Francis
 

Similaire à Computers in management (20)

Library Management System using oracle database
Library Management System using oracle databaseLibrary Management System using oracle database
Library Management System using oracle database
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Brilient login system
Brilient login systemBrilient login system
Brilient login system
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptx
 
Sd Revision
Sd RevisionSd Revision
Sd Revision
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentation
 
software engineering
software engineeringsoftware engineering
software engineering
 
Issue Management System
Issue Management SystemIssue Management System
Issue Management System
 
ASSIGNMENT
ASSIGNMENT ASSIGNMENT
ASSIGNMENT
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
software engineering
 software engineering software engineering
software engineering
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Software engineering : Layered Architecture
Software engineering : Layered ArchitectureSoftware engineering : Layered Architecture
Software engineering : Layered Architecture
 
Iterative Waterfall model
Iterative Waterfall modelIterative Waterfall model
Iterative Waterfall model
 
Different Approaches To Sys Bldg
Different Approaches To Sys BldgDifferent Approaches To Sys Bldg
Different Approaches To Sys Bldg
 
Dot Net performance monitoring
 Dot Net performance monitoring Dot Net performance monitoring
Dot Net performance monitoring
 
Mobile store management
Mobile store management Mobile store management
Mobile store management
 
A level-computing-9691-paper-1-notes
A level-computing-9691-paper-1-notesA level-computing-9691-paper-1-notes
A level-computing-9691-paper-1-notes
 
12th CBSE Computer Science Project
12th CBSE Computer Science Project12th CBSE Computer Science Project
12th CBSE Computer Science Project
 

Plus de Kinshook Chaturvedi (20)

Working and functions_of_rbi[1]
Working and functions_of_rbi[1]Working and functions_of_rbi[1]
Working and functions_of_rbi[1]
 
Role of idfc_in_infrastucture_finance
Role of idfc_in_infrastucture_financeRole of idfc_in_infrastucture_finance
Role of idfc_in_infrastucture_finance
 
Mutual funds
Mutual fundsMutual funds
Mutual funds
 
Iifcl ppt
Iifcl pptIifcl ppt
Iifcl ppt
 
Basel ii norms.ppt
Basel ii norms.pptBasel ii norms.ppt
Basel ii norms.ppt
 
Retail banking pres
Retail banking presRetail banking pres
Retail banking pres
 
Presentation on lic of india
Presentation on lic of indiaPresentation on lic of india
Presentation on lic of india
 
Mfi dfi
Mfi dfiMfi dfi
Mfi dfi
 
Management of np as imt
Management of np as imtManagement of np as imt
Management of np as imt
 
Life insurance in india final raja
Life insurance in india final rajaLife insurance in india final raja
Life insurance in india final raja
 
Financial inclusion
Financial inclusionFinancial inclusion
Financial inclusion
 
Corporate banking v2
Corporate banking v2Corporate banking v2
Corporate banking v2
 
Corporate banking latest
Corporate banking latestCorporate banking latest
Corporate banking latest
 
Financial mgt exercises
Financial mgt exercisesFinancial mgt exercises
Financial mgt exercises
 
Csac10[1].p
Csac10[1].pCsac10[1].p
Csac10[1].p
 
Csac08[1].p
Csac08[1].pCsac08[1].p
Csac08[1].p
 
Csac05[1].p
Csac05[1].pCsac05[1].p
Csac05[1].p
 
Csac14[1].p
Csac14[1].pCsac14[1].p
Csac14[1].p
 
Csac06[1].p
Csac06[1].pCsac06[1].p
Csac06[1].p
 
Xyber001 16 12_09 (2)
Xyber001 16 12_09 (2)Xyber001 16 12_09 (2)
Xyber001 16 12_09 (2)
 

Dernier

Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Salesforce Education Cloud - A Complete Guide.pdf
Salesforce Education Cloud - A Complete Guide.pdfSalesforce Education Cloud - A Complete Guide.pdf
Salesforce Education Cloud - A Complete Guide.pdfHarryJohnson78
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 

Dernier (20)

Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Salesforce Education Cloud - A Complete Guide.pdf
Salesforce Education Cloud - A Complete Guide.pdfSalesforce Education Cloud - A Complete Guide.pdf
Salesforce Education Cloud - A Complete Guide.pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 

Computers in management

  • 1.
  • 2.