SlideShare a Scribd company logo
1 of 44
STANI MEMORIAL P.G. COLLEGE
PRACTICAL FILE
Elementary Computer Application
Submitted By: jaikishan godara Submitted To:
S.NO
.
TOPIC DATE ______
______
___
1 The architecture of computer
system
20th Jan
2 Hardware and software
20th Jan
3 Input and output devices 20th Jan
4 Computer memory 20th Jan
5 Mail Merge 20th Jan
6 Four function are explained 20th Jan
7 Spread sheet 20th Jan
8 M-commerce 20th Jan
9 History of internet 20th Jan
10 Eight function are explained 20th Jan
11 Thirty-five short keys are written 20th Jan
12 Computer network 20th Jan
1. Explain the architecture of a computer system?
Answer1.A computersystemisbasicallyamachinethat simplifiescomplicatedtasks. Itshouldmaximizeperformanceand reducecosts
aswellaspower consumption.ThedifferentcomponentsintheComputerSystemArchitectureareInputUnit,Output Unit,StorageUnit,
ArithmeticLogicUnit,ControlUnit,etc.
Adiagram that showstheflowofdata betweentheseunits isas follows −
THEINPUTDATATRAVELSFROMTHEINPUTUNITTOALU.SIMILARLY,THECOMPUTEDDATATRAVELSFROMALU
TOTHEOUTPUTUNIT.THEDATACONSTANTLYMOVESFROMTHESTORAGEUNITTOALUANDBACKAGAIN.THISIS
BECAUSESTOREDDATAISCOMPUTEDBEFOREBEINGSTOREDAGAIN.THECONTROLUNITCONTROLSALLTHE
OTHERUNITSASWELLASTHEIRDATA.
DETAILSABOUTALLTHECOMPUTERUNITSARE−
•INPUTUNIT:
THEINPUTUNITPROVIDESDATATOTHECOMPUTERSYSTEMFROMTHEOUTSIDE.SO,BASICALLY,ITLINKSTHE
EXTERNALENVIRONMENTWITHTHECOMPUTER.ITTAKESDATAFROMTHEINPUTDEVICES,CONVERTSITINTO
MACHINELANGUAGE,ANDLOADSITINTOTHECOMPUTERSYSTEM.KEYBOARD,MOUSE,ETC.ARETHEMOST
COMMONLYUSEDINPUTDEVICES.
•OUTPUTUNIT:
THEOUTPUTUNITPROVIDESTHERESULTSOFTHECOMPUTERPROCESSTOTHEUSERSI.E.ITLINKSTHE
COMPUTERWITHTHEEXTERNALENVIRONMENT.MOSTOFTHEOUTPUTDATAISINTHEFORMOFAUDIOORVIDEO.
THEDIFFERENTOUTPUTDEVICESAREMONITORS,PRINTERS,SPEAKERS,HEADPHONES,ETC.
•StorageUnit:
Storageunitcontainsmanycomputercomponentsthatareusedtostore data.Itistraditionallydividedinto
primarystorageandsecondarystorage.Primarystorageisalsoknownasthemainmemoryandisthe
memorydirectlyaccessiblebytheCPU.SecondaryorexternalstorageisnotdirectlyaccessiblebytheCPU.
Thedatafromsecondarystorageneeds tobebroughtintotheprimarystoragebefore theCPUcanuseit.
Secondarystoragecontainsalargeamountofdatapermanently.
•ArithmeticLogic:
UnitAllthecalculationsrelatedtothecomputersystemareperformedbythearithmeticlogicunit.Itcan
performoperationslikeaddition,subtraction,multiplication,division,etc.Thecontrolunittransfersdatafrom
storageunittoarithmeticlogicunitwhencalculationsneedtobeperformed.Thearithmeticlogicunitandthe
controlunittogetherformthecentralprocessingunit.
•ControlUnit:
Thisunitcontrolsalltheotherunitsofthecomputersystemandsoisknownasitscentralnervoussystem.It
transfers datathroughoutthecomputerasrequiredincludingfromthestorageunittothecentralprocessing
unitandviceversa.Thecontrolunitalsodictateshowthememory,input-outputdevices,arithmeticlogicunit,
etc.shouldbehave.
2. What do you mean by hardware and software? Write down the types of computer
software?
Answer2.ComputerHardware:
Hardwarerefers tothephysicalcomponentsof acomputer.ComputerHardwareisanypartofthe
computerthatwecantouchtheseparts.Thesearetheprimaryelectronicdevicesusedtobuildupthe
computer.ExamplesofhardwareinacomputeraretheProcessor, MemoryDevices,Monitor,Printer,
Keyboard,Mouse,andtheCentralProcessingUnit.
ComputerSoftware:
Softwareisacollectionofinstructions,procedures,documentationthatperforms different tasksona
computersystem.wecansayalsoComputerSoftwareisaprogrammingcodeexecutedonacomputer
processor. Thecodecanbemachine-levelcodeorthecodewrittenforanoperatingsystem.Examples
ofsoftware areMsWord,Excel,PowerPoint,GoogleChrome,Photoshop,MySQLetc.
Types of computer software:
3. Explain different input and output devices?
Answer3.InputDevices:
Adevicethat canbeusedto insertdata into acomputersystemiscalledas inputdevice.Itallowspeopleto supply
informationtocomputerswithout anyinputdevices,acomputerwouldonlybeadisplaydeviceandnotallowusersto
interactwithit, Examplesofinputdevicesincludekeyboards, mouse,scanners,digital camerasandLight pen,joysticks,
Touch-screen,OMR,OBR,OCR.
Keyboard:Most commonand verypopular input deviceis keyboard. Thekeyboardhelpsininputting thedata to the
computer.Thelayoutofthekeyboardislikethatoftraditional typewriter, althoughtherearesomeadditional keys
providedforperformingsomeadditional functions.
Mouse:
MouseismostpopularPointingdevice.Itisaveryfamouscursor-
controldevice.Itisasmallpalmsizeboxwithagroundballatitsbase
whichsenses themovementofmouseandsendscorrespondingsignals
toCPUonpressingthebuttons.
Generally,ithastwobuttonscalledleftandrightbuttonandscrollbaris
present atthemid.Mousecanbeusedtocontroltheposition ofcursoron
screen,butitcannotbeusedtoentertextintothecomputer.
Advantages
•Easytouse•Notveryexpensive•Movesthecursorfaster thanthearrowkeys
ofkeyboard.
Scanner:
Scannerisaninputdevicewhichworksmorelikeaphotocopymachine.Itis
usedwhensomeinformationisavailableonapaperanditistobetransferred
totheharddiscof thecomputerforfurthermanipulation.Scannercaptures
imagesfromthesourcewhicharethenconvertedintothedigitalformthatcan
bestoredon thedisc.Theseimagescanbeeditedbefore theyareprinted.
Joystick:
Joystickisalsoapointingdevicewhichisusedtomovecursorposition
onamonitorscreen.Itisastickhavingasphericalballatitsbothlower
andupperends.Thelowersphericalballmovesinasocket.The
Joystickcanbemovedinallfourdirections.
Thefunctionofjoystickissimilartothatof amouse.Itismainlyusedin
ComputerAidedDesigning (CAD)andplayingcomputergames.
MagneticInkCardReader(MICR)MICRinputdeviceisgenerallyusedinbanksbecauseofalargenumber
ofchequestobeprocessed everyday.Thebank’scodenumberandchequenumberareprintedonthe
chequeswithaspecialtypeofinkthatcontainsparticlesofmagneticmaterialthataremachinereadable.
ThisreadingprocessiscalledMagneticInkCharacterRecognition(MICR).ThemainadvantageofMICRis
thatitisfastandlesserror prone.
OpticalCharacterReader(OCR):
OCRisaninputdeviceusedtoreadaprintedtext.OCRscanstextopticallycharacterbycharacter,
convertsthemintoamachine-readablecodeandstores thetextonthesystemmemory.
BarCodeReaders:
BarCodeReaderisadeviceusedforreadingbarcodeddata(datainformoflightanddarklines).
Barcodeddataisgenerallyusedinlabellinggoods,numberingthebooksetc.Itmaybeahand-held
scannerormaybeembeddedinastationaryscanner.
OpticalMarkReader(OMR):
OMRisaspecialtypeofopticalscannerusedtorecognizethetypeof
markmadebypenorpencil.Itisusedwhereoneoutofafew
alternativesistobeselectedandmarked.Itisspeciallyusedfor
checkingtheanswersheets ofexaminationshavingmultiplechoice
questions.
Touchscreen:
Touchscreenisaninputdevice.Touchscreentechnologyisthedirect
manipulationtypegesture-basedtechnology.Directmanipulationis
theabilitytomanipulatedigitalworldinsideascreenwithouttheuseof
command-linecommands.
AdevicewhichworksontouchscreentechnologyiscoinedasTouch
screen.Atouchscreenisanelectronicvisualdisplaycapableof
‘detecting’andeffectively ‘locating’atouchoveritsdisplayarea.
OutputDevices:
Adevicewhichisusedtodisplayresultfromacomputeriscalledas
outputdevice.ItAllowspeopletoreceiveinformationfromcomputers.
Anoutputdeviceisanyperipheralthatreceives ordisplaysoutput
fromacomputer.Thepictureshowsaninkjetprinter,anoutputdevice
thatcanmakeahardcopyofanythingbeingdisplayedonamonitor.
Outputdeviceiselectronicequipmentconnectedtoacomputerand
usedtotransferdataoutofthecomputerintheformoftext,images,
soundsorprint.Examplesofoutputdevicesinclude:Digitizers,Plotters,
LCD,PlasmaDisplay,Printers,etc.
Digitizer:
Digitizerisaninputdevicewhichconvertsanaloginformationintoa
digitalform.Digitizercanconvertasignalfromthetelevision camera
intoaseries of numbersthatcouldbestoredinacomputer.Theycanbe
usedbythecomputertocreateapictureof whateverthecamerahad
beenpointedat
Plotters:
Aplotterisaprinterthatinterprets commandsfromacomputerto
makelinedrawingsonpaperwithoneormoreautomatedpens.Unlike
aregularprinter,theplottercandrawcontinuouspoint-to-pointlines
directlyfromvectorgraphicsfilesorcommands.
Thereareanumberof different typesofplotters:adrumplotterdraws
onpaperwrappedaroundadrumwhichturnstoproduceonedirection
oftheplot,whilethepensmovetoprovidetheotherdirection;aflatbed
plotterdrawsonpaperplacedonaflatsurface;andanelectrostatic
plotterdrawsonnegativelychargedpaperwithpositively charged
toner.
Plotterswerethefirsttypeofprinterthatcouldprintwithcolorand
rendergraphicsandfull-sizeengineeringdrawings.Asarule,plotters
aremuchmoreexpensivethanprinters.Theyaremostfrequentlyused
forCAE(computeraidedengineering)applications,suchasCAD
(computer-aideddesign)andCAM(computer-aidedmanufacturing).
Monitors:
MonitorcommonlycalledasVisualDisplayUnit(VDU)isthemainoutput
deviceofacomputer.Itformsimagesfromtinydots,calledpixelsthat
arearrangedinarectangularform.Thesharpnessoftheimage
dependsupontheno.ofthepixels.Therearetwokindsofviewing
screenusedfor monitors.
•Cathode-RayTube(CRT)
•LiquidCristalDisplay(LCD)
•PlasmaDisplay
Printers:
Printeristhemostimportantoutputdevice,whichisusedtoprint
informationonpaper.
Therearetwotypesofprinters
•ImpactPrinters•Non-ImpactPrintersImpactPrintersTheprinters
thatprintthecharactersbystrikingagainsttheribbonandontothe
paperarecalledimpactprinters.CharacteristicsofImpactPrintersare
following
•Verylowconsumablecosts
•Impactprintersareverynoisy
•Usefulforbulkprintingduetolowcost
•Thereisphysicalcontactwiththepapertoproduceanimage
Theseprintersareoftwotypes
•Characterprinters•LineprintersCharacterPrinters:Character
Printersareprinterswhichprintonecharacteratatime.
Theseareoffurthertwotypes
•DotMatrixPrinter(DMP)•DaisyWheel
4. What do you understand by computer memory? Explain
types of memory in computer?
Answer4. Computermemoryisagenerictermfor allof thedifferent typesofdatastoragetechnology
thatacomputermayuse,includingRAM,ROM,andflashmemory.
Thekeydifference between primaryandsecondarymemoryisspeedofaccess.
•PrimarymemoryincludesROMandRAM,andislocatedclosetotheCPUonthecomputermotherboard,
enablingtheCPUtoreaddatafromprimarymemoryveryquicklyindeed.Itisusedtostore datathatthe
CPUneedsimminentlysothatitdoes nothavetowaitforittobedelivered.
•Secondarymemorybycontrast,isusuallyphysicallylocatedwithinaseparatestoragedevice,suchas
aharddiskdriveorsolid-statedrive(SSD),whichisconnectedtothecomputersystemeitherdirectly
oroveranetwork.Thecostpergigabyteof secondarymemoryismuchlower,butthereadandwrite
speedsaresignificantlyslower.
Overseveralperiodsofcomputerevolution,awideof
arrayofcomputermemorytypeshasbeendeployed,
eachwithitsownstrengthsandweaknesses.
PrimaryMemoryTypes:RAMandROMTherearetwo
keytypesofprimarymemory:
1.RAM,orrandom-accessmemory
2.ROM,orread-onlymemoryLet’slookin-depthat
bothtypesofmemory.
1) RAM
ComputerMemoryTheacronymRAMstemsfromthefactthatdatastoredinrandomaccessmemorycanbeaccessed –
asthenamesuggests–inanyrandomorder.Or,putanotherway,anyrandombitofdatacanbeaccessedjustas
quicklyasanyotherbit.
ThemostimportantthingstounderstandaboutRAMarethatRAMmemoryisveryfast,itcanbewrittentoaswellas
read,itisvolatile(soalldatastoredinRAMmemoryislostwhenitloses power)and,finally,itisveryexpensive
comparedtoalltypesofsecondarymemoryintermsofcostpergigabyte.
ItisbecauseoftherelativehighcostofRAMcomparedtosecondarymemorytypesthatmostcomputersystemsuse
bothprimaryandsecondarymemory.DatathatisrequiredforimminentprocessingismovedtoRAMwhereitcanbe
accessedandmodifiedveryquickly,sothattheCPUisnotkeptwaiting.
Whenthedataisnolongerrequireditisshuntedouttoslowerbutcheapersecondarymemory,andtheRAMspacethat
hasbeenfreedupisfilledwiththenextchunkofdatathatisabouttobeused.
Typesof RAM•
DRAM:DRAMstandsforDynamicRAM,anditisthemostcommontypeofRAMusedincomputers.Theoldest
typeisknownassingledatarate(SDR)DRAM,butnewercomputersusefaster dualdatarate(DDR)DRAM.
DDRcomesinseveralversionsincludingDDR2,DDR3,andDDR4,whichoffer betterperformanceandare
moreenergy efficient thanDDR.Howeverdifferent versions areincompatible,soitisnotpossible tomix
DDR2withDDR3DRAMinacomputersystem.
DRAMconsists ofatransistorandacapacitorineachcell.
•SRAM:SRAMstandsforStaticRAM,anditisaparticulartypeofRAMwhichisfasterthanDRAM,butmore
expensiveandbulker,havingsixtransistorsineachcell.Forthosereasons SRAMisgenerallyonlyusedas
adatacachewithinaCPUitself orasRAMinveryhigh-endserversystems.AsmallSRAMcacheof themost
imminently-neededdatacanresultinsignificantspeedimprovementsinasystemThekeydifferences
betweenDRAMandSRAMisthatSRAMisfasterthanDRAM –perhapstwotothreetimesfaster–butmore
expensiveandbulkier.SRAMisusuallyavailableinmegabytes,whileDRAMispurchasedingigabytes.
DRAMuses moreenergythanSRAMbecauseitconstantlyneedstoberefreshed tomaintaindataintegrity,
whileSRAM–thoughvolatile–doesnotneedconstantrefreshing whenitispoweredup.
2)ROM:
ComputerMemoryROMstandsfor read-onlymemory,andthenamestemsfromthefactthatwhiledata
canbereadfromthistypeof computermemory,datacannotnormallybewrittentoit.
ItisaveryfasttypeofcomputermemorywhichisusuallyinstalledclosetotheCPUonthemotherboard.
ROMisatypeofnon-volatilememory,whichmeansthatthedatastoredinROMpersists inthememory
even whenitreceivesnopower–forexamplewhenthecomputeristurnedoff.Inthatsenseitissimilar
tosecondarymemory,whichisusedfor longtermstorage.
Whenacomputeristurnedon,theCPUcanbeginreadinginformationstoredinROMwithouttheneedfor
driversorothercomplexsoftwaretohelpitcommunicate.TheROMusuallycontains“bootstrapcode”
whichisthebasicsetof instructionsacomputerneedstocarryouttobecomeawareoftheoperating
systemstoredinsecondarymemory,andtoloadpartsoftheoperatingsystemintoprimarymemoryso
thatitcanstartupandbecomereadytouse.
ROMisalsousedinsimplerelectronicdevicestostorefirmwarewhichrunsassoon asthedeviceis
switchedon.
Typesof ROM:
ROMisavailableinseveraldifferent types,includingPROM,EPROM,andEEPROM.
•PROM
PROMstandsfor ProgrammableRead-OnlyMemory,anditisdifferent fromtrueROMinthatwhilea
ROMisprogrammed(i.e.hasdatawrittentoit)duringthemanufacturingprocess,aPROMis
manufacturedinanemptystateandthenprogrammedlaterusingaPROMprogrammerorburner.
•EPROM
EPROMstandsforErasableProgrammableRead-OnlyMemory,andasthenamesuggests,datastoredin
anEPROMcanbeerasedandtheEPROMreprogrammed.ErasinganEPROMinvolvesremovingitfrom
thecomputerandexposingittoultravioletlightbefore re-burningit.
•EEPROM
EEPROMstandsfor ElectricallyErasableProgrammableRead-OnlyMemory,andthedistinctionbetween
EPROMandEEPROMisthatthelattercanbeerasedandwrittentobythecomputersystemitisinstalled
in.Inthatsense EEPROMisnotstrictlyread-only.
However,inmanycasesthewriteprocessis slow,soitisnormallyonlydonetoupdateprogramcode
suchasfirmwareorBIOScodeonanoccasionalbasis
SecondaryMemoryTypes
Secondarymemorycomprisesmanydifferentstorage mediawhichcanbedirectly
attachedto a computersystem.
Theseinclude:
•harddisk drives
•solidstate drives (SSDs)
•Optical(CDorDVD)drives
•TapedrivesDifferencesbetweenRAMand ROM
ROM:
•Non-volatile
•Fastto read
•Usuallyused insmallquantities
•Cannotbewritten to quickly
•Usedto storeboot instructionsorfirmware
•Relativelyexpensivepermegabyte storedcomparedto RAM
RAM: •Volatile• Fastto readandwrite•Usedas systemmemoryto storedata
(includingprogramcode)that theCPUneedsto processimminently•Relativelycheap
permegabyte storedcomparedto ROM,but relativelyexpensivecomparedto
secondarymemory
Answer5.Mailmergeisa MicrosoftWordfeatureoftenused toproducea numberofsimilardocuments,includingelements
froma separatedata document(e.g.adatabase, spreadsheetorOutlookcontactsfile).
Thelistiscombinedwith standard text,usually toproducea letterorinvitetoa seriesofdifferentrecipients.
Therearefivestepsto themailmergeprocess:
1. Chooseyour documenttype -Withinthemailingstabclickthestart mailmergebutton andadropdown willappear. You
canchoosefromlabels,envelopes,emails,lettersora directory.
2. 2.Selectyour recipients-Hereyou canchooseto"typea newlist"whereyou entertherecipientsintoadatabase oneby
one,"useanexistinglist"suchas aspreadsheetto importthedata or"selectfromyour Outlook contacts".You canthenedit
therecipientdata shouldyou wish.
3. 3.Write&insertfields-Nowthatyour documentislinkedto your recipientdata you canaddtheindividual personalization
fields.Thisincludesaddress fields(usethe"address block"button) andgreetingline(e.g.dearSirorMadam, recipient's
firstnameetc).
4.
5. 4.Previewresults -Checkthat thefieldsyou've insertedarepullingthecorrectdata through(e.g.thetown fieldisn't
pullingthroughthecountyinformation)andpositioned correctlyonyour document.
6. 5.Finish&merge-Now that you'rehappywith your content,andthecorrectdata fieldsarebeingimported, you canfinish
andmergethedocumentandyour data to createthefinalproduct. Therearethreeoptions here:
5.Whatismailmerge?Explainstepsformailmerge?
6. Explain the following:
a. Page Layout :
: ThePageLayout Tabholdsalltheoptions that allowyouto arrangeyour documentpages justthewayyou wantthem.You cansetmargins,apply
themes,controlofpage orientation and size,add sectionsandlinebreaks, displaylinenumbers,andsetparagraph indentation andlines.
b. Header and footer:
Theheaderisa sectionofthedocumentthat appears inthetop margin, whilethefooteris asectionofthedocumentthat appears inthebottom
margin.Headersandfootersgenerallycontainadditional information suchaspage numbers,dates, anauthor's name,andfootnotes,whichcanhelp
keeplongerdocumentsorganizedandmakethemeasiertoread.Textenteredintheheaderorfooterwillappear oneachpage ofthedocument.
c. Slide Show:
APowerPointslideshow(PPT)isapresentation createdonsoftware fromMicrosoft that allowsusersto addaudio, visual and audio/visual featuresto
apresentation.Itisconsideredto bea multimediatechnologyandalsoactsasatool forcollaboration andcontentsharing. PowerPointis includedin
MicrosoftOffice,makingitoneofthemostwell-knownand widelyused brandsofpresentation software. APowerPointslideshowisalsoknownasa
PowerPointpresentation.
d. Macro:
Amacroisanautomated inputsequencethat imitates keystrokes ormouseactions.A macroistypicallyusedtoreplacea repetitiveseriesof
keyboard andmouseactions andusedofteninspreadsheetsandwordprocessingapplications likeMSExcelandMSWord.Thefileextensionofa
macrois commonly.MAC.Theconceptofmacrosisalsowell-knownamongMMORPG gamers(Massively Multiplayer OnlineRole-PlayingGames) and
SEO(SearchEngineOptimization) specialists.Intheworldofprogramming, macrosareprogrammingscriptsusedbydevelopers to re-usecode.The
termmacrostands for“macro-instruction”(longinstruction).
7. What is a spread sheet? Explain cell referencing in MS Excel?
Answer.
Spreadsheet:
Aspreadsheetisasoftwareprogramyouusetoeasilyperformmathematicalcalculationson
statisticaldataandtotallinglongcolumnsofnumbersordeterminingpercentagesand
averages.
Cellreferences:
Acellreference, alsoknownasacelladdress,isamechanismthatdefines acellona
worksheetbycombiningacolumnletterandarownumber.Wecanrefer toanycell(inExcel
formulas)intheworksheetbyusingthecellreferences.
Typesof CellReference inExcelWehavethreedifferent typesof CellReferences inExcel–
1. RelativeCellReference inExcel
2. 2.AbsoluteCellReference inExcel
3. 3.MixedCellReference inExcel
8. What is M-Commerce?
Answer 8:
M-commerceistheuseof handheld,wireless gadgetssuchasmobile
phones,tabletsandpersonal digitalassistantstoperformonline
commercialtransactions.
It'sacomponentofelectroniccommercethatworksonmobiledevices.
M-commerceenablesabusiness toreachmorecustomersonline.
Italsoprovidescustomerswithawiderangeofproductchoicesand
paymentoptionsfromdifferent vendors.
9. Write down the history of Internet?
Answer9:
TheInternetstartedoff withresearch intowhatwasthenknownaspacketswitchingasearlyasthe1960s.Packetswitchingwasthoughtof
abetterandfaster methodtotransferdatathanthehardwaresolutiontotheproblem,i.e.,thecircuitry.Thepacketswitchingtechnology
wasessential tothedevelopmentofARPANETbytheUnitedStatesMilitary.
ARPANETisconsideredthefirstknowngroupofinterconnectedcomputersakatheinternet.Thissystemwasusedtotransferconfidential
databetween theMilitary.ThisdatasharingtechnologywasthenopenedtoeducationalinstitutesintheUnitedStatestoallowthemto
accesstothegovernment’ssupercomputer,firstat56Kbit/s,thenat1.5Mbit/s,andthenat45Mbit/s.ComInternetservice providersbegan
toariseinthelate1980sandtheinternetwasfullycommercializedintheUSby1995.
10.Explain the following:
a. Firewall:
Firewallscanbeviewedasgatedbordersorgatewaysthatmanagethetravelof permittedandprohibitedwebactivityina
privatenetwork.Thetermcomesfromtheconceptof physicalwallsbeingbarrierstoslowthespreadoffire untilemergency
services canextinguish it.Comparably,networksecurityfirewallsareforwebtrafficmanagement—typicallyintendedto
slowthespreadof webthreats.
b. Security threats:
Cybersecurityprofessionals shouldhaveanin-depthunderstandingofthefollowingtypesofcybersecuritythreats.
1. Malware:
Malwareismalicioussoftware suchasspyware,ransomware,virusesandworms.Malwareisactivatedwhenauserclickson
amaliciouslinkorattachment,whichleadstoinstallingdangeroussoftware.Ciscoreportsthatmalware,onceactivated,can:
•Blockaccesstokeynetworkcomponents(ransomware)
•Installadditionalharmfulsoftware
•Covertlyobtaininformationbytransmittingdatafromtheharddrive(spyware)
•Disruptindividualparts,makingthesysteminoperable
2.Emotet:
TheCybersecurityandInfrastructureSecurityAgency(CISA)describes Emotetas“anadvanced,modularbankingTrojanthat
primarilyfunctionsasadownloaderordropperof otherbankingTrojans.Emotetcontinuestobeamongthemostcostlyand
destructivemalware.”
3.Denialof Service:
Adenialof service(DoS)isatypeofcyber-attackthatfloodsacomputerornetworksoitcan’trespondtorequests.AdistributedDoS
(DDoS)doesthesamething,buttheattackoriginatesfromacomputernetwork.Cyberattackersoften useafloodattacktodisruptthe
“handshake”processandcarryoutaDoS.Severalothertechniquesmaybeused,andsomecyberattackersusethetimethata
networkisdisabledtolaunchotherattacks.AbotnetisatypeofDDoSinwhichmillionsofsystemscanbeinfectedwithmalwareand
controlledbyahacker,accordingtoJeff Melnickof Netwrix,aninformationtechnologysecuritysoftwarecompany.Botnets,
sometimescalledzombiesystems,targetandoverwhelmatarget’sprocessingcapabilities.Botnetsareindifferent geographic
locationsandhardtotrace.
4.ManintheMiddle:
Aman-in-the-middle(MITM)attackoccurswhenhackersinsertthemselvesintoatwo-partytransaction.Afterinterruptingthe
traffic,theycanfilterandstealdata,accordingtoCisco.MITMattacksoften occurwhenavisitorusesanunsecuredpublicWi-Fi
network.Attackersinsertthemselvesbetween thevisitorandthenetwork,andthenusemalwaretoinstallsoftware andusedata
maliciously.
5.Phishing:
Phishingattacksusefakecommunication,suchasanemail,totrickthereceiverintoopeningitandcarryingout
theinstructionsinside, suchasprovidingacreditcardnumber.“Thegoalistostealsensitive datalikecreditcard
andlogininformationortoinstallmalwareonthevictim’smachine,”Ciscoreports.
6.SQLInjection:
AStructuredQueryLanguage(SQL)injectionisatypeofcyber-attackthatresultsfrominsertingmaliciouscode
intoaserverthatuses SQL.Wheninfected,theserverreleases information.Submittingthemaliciouscodecanbe
assimpleasenteringitintoavulnerablewebsite searchbox.
7.Password:
AttacksWiththerightpassword,acyberattackerhasaccesstoawealthofinformation.Socialengineeringisa
typeof passwordattackthatDataInsiderdefines as“astrategycyberattackerusethatrelies heavilyonhuman
interactionandoften involvestrickingpeopleintobreakingstandardsecuritypractices.”Othertypesofpassword
attacksincludeaccessingapassworddatabaseoroutrightguessing.
3.CyberLawandCyberSecurity:
Cybersecuritydenotes thetechnologiesandproceduresintendedtosafeguard
computers,networks,anddatafromunlawfuladmittance,weaknesses, andattacks
transportedthroughtheInternetbycyberdelinquents.ISO27001(ISO27001)isthe
internationalCybersecurityStandardthatdeliversamodelfor creating,applying,
functioning,monitoring,reviewing,preserving,andimprovinganInformationSecurity
ManagementSystem.
TheMinistryofCommunicationandInformationTechnologyunderthegovernmentof
IndiaprovidesastrategyoutlinecalledtheNationalCybersecurityPolicy.
Thepurposeofthisgovernmentbodyistoprotectthepublicandprivateinfrastructure
fromcyber-attacks.TheInformationTechnologyAct2000oranylegislationinthe
CountrydoesnotdescribeormentionthetermCyberCrime.Itcanbeglobally
consideredasthegloomierfaceof technology.
Theonlydifference betweenatraditionalcrimeandacyber-crimeisthatthecyber-
crimeinvolvesinacrimerelatedtocomputers.
4.Piracy:
Piracyrefers totheunauthorizedduplicationof copyrightedcontentthatis
thensoldatsubstantiallylowerpricesinthe'grey'market.Theeaseof
accesstotechnologyhasmeantthatovertheyears,piracyhasbecomemore
rampant.Forexample,CDwritersareavailableoff theshelfatverylow
prices,makingmusicpiracyasimpleaffair.
Copyright:
Copyrightisatypeofintellectualpropertythatprotectsoriginalworksof
authorshipassoon asanauthorfixes theworkinatangibleformof
expression. Incopyrightlaw,therearealotofdifferent typesofworks,
includingpaintings,photographs,illustrations,musicalcompositions,sound
recordings,computerprograms,books,poems,blogposts,movies,
architecturalworks,plays,andsomuchmore!
OpenSource:
Thetermopen sourcerefers tosomethingpeoplecanmodifyandshare
becauseitsdesignispubliclyaccessible.Exampleof opensourcesoftware
areLinux,Androidetc.
11. Write down the shortcut keys for the following purposes:
I. New Document = Ctrl + N
II. Open a document = Ctrl + O
III. Save a document = Ctrl + S
IV. Save as a document = F12
V. Print a document = Ctrl + P
VI. New Slide = Ctrl + M
VII. Hyperlink = Ctrl + K
VIII. Superscript = Ctrl + Shift + +
IX. Subscript = Ctrl + =
X. Cut = Ctrl + X
XI. Copy = Ctrl + C
XII. Paste = Ctrl + V
XIII. Undo = Ctrl + Z
XIV. Redo = Ctrl + Y
XV. Increase font size =Ctrl+ Shift+>
XVI. Decrease font size =Ctrl + Shift+<
XVII.Underline = Ctrl+ U
XVIII.Bold = Ctrl + B
XIX.Italic=Ctrl+I
XX. Find=Ctrl+F
XXI.Replace=Ctrl+H
XXII.Selectall=Ctrl+A
XXIII.Closecurrentdocument=Ctrl+W
XXIV.SpellingandGrammarinWord=F7
XXV.Thesaurus=Shift+F7
XXVI.Help=F1
XXVII.LeftAlignment=Ctrl+L
XXVIII.RightAlignment=Ctrl+R
XXIX.CentreAlignment=Ctrl+E
XXX.JustifyContent=Ctrl+J
XXXI.SlideShowfrombeginning=F5
XXXII.SlideshowofcurrentSlide=Shift+F5
XXXIII.InsertFunctioninExcel=Shift+F3
XXXIV.FilterinExcel=Ctrl+Shift+L
12.What do you mean by computer network?
Answer12. Acomputernetworkisagroupofcomputerslinkedtoeachotherthatenablesthecomputerto
communicatewithanothercomputerandsharetheirresources, data,andapplications.
Acomputernetworkcanbecategorizedbytheirsize.Acomputernetworkismainlyof fourtypes:
LAN(LocalAreaNetwork):
oLocalAreaNetworkisagroupofcomputersconnectedtoeachotherinasmallareasuchasbuilding,office. o
LANisusedfor connectingtwoormorepersonalcomputersthroughacommunicationmediumsuchastwisted
pair,coaxialcable,etc.oItislesscostlyasitisbuiltwithinexpensive hardwaresuchashubs,networkadapters,
andethernetcables.oThedataistransferred atanextremelyfasterrateinLocalAreaNetwork.oLocalArea
Networkprovideshighersecurity.
PAN(PersonalAreaNetwork):
oPersonalAreaNetworkisanetworkarrangedwithinanindividual
person,typicallywithinarangeof 10meters.
oPersonalAreaNetworkisusedforconnectingthecomputerdevices
ofpersonal useisknownasPersonalAreaNetwork.
oThomasZimmermanwasthefirstresearchscientist tobringtheidea
ofthePersonalAreaNetwork.oPersonalAreaNetworkcoversanarea
of30feet.
oPersonalcomputerdevicesthatareusedtodevelopthepersonal
areanetworkarethelaptop,mobilephones,mediaplayerandplay
stations.
TherearetwotypesofPersonal AreaNetwork:
oWiredPersonalAreaNetwork
oWireless PersonalAreaNetwork
Wireless PersonalAreaNetwork:
Wireless PersonalAreaNetworkisdevelopedbysimplyusingwireless technologiessuchasWIFI,Bluetooth.Itis
alowrangenetwork.WiredPersonal AreaNetwork:WiredPersonalAreaNetworkiscreatedbyusingtheUSB.
ExamplesofPersonal
AreaNetwork:
oBodyAreaNetwork:BodyAreaNetworkisanetworkthatmoveswithaperson.Forexample,amobilenetwork
moveswithaperson.Supposeaperson establishesanetworkconnectionandthencreatesaconnectionwith
anotherdevicetosharetheinformation.
oOffline Network:Anoffline networkcanbecreatedinsidethehome,soitisalsoknownasahomenetwork.A
homenetworkisdesignedtointegratethedevicessuchasprinters,computer,television buttheyarenot
connectedtotheinternet.
oSmallHomeOffice:Itisusedtoconnectavarietyofdevicestotheinternetandtoacorporatenetworkusinga
VPN
MAN(MetropolitanAreaNetwork)
oAmetropolitanareanetworkisanetworkthatcoversalarger
geographicareabyinterconnectingadifferent LANtoformalarger
network.
oGovernmentagenciesuseMANtoconnecttothecitizensandprivate
industries.
oInMAN,variousLANsareconnectedtoeachotherthroughatelephone
exchangeline.
oThemostwidelyusedprotocolsinMANareRS-232,FrameRelay,ATM,
ISDN,OC-3,ADSL,etc.
oIthasahigherrangethanLocalAreaNetwork(LAN)
UsesofMetropolitanAreaNetwork:
oMANisusedincommunicationbetween thebanksinacity.
oItcanbeusedinanAirlineReservation. oItcanbeusedinacollege
withinacity.
oItcanalsobeusedfor communicationinthemilitary
WAN(WideAreaNetwork):
oAWideAreaNetworkisanetworkthatextendsoveralarge
geographicalareasuchasstatesorcountries.
oAWideAreaNetworkisquitebiggernetworkthantheLAN.
oAWideAreaNetworkisnotlimitedtoasinglelocation,butitspans
overalargegeographicalareathroughatelephoneline,fibreoptic
cableorsatellitelinks.
oTheinternetisoneofthebiggestWANintheworld.oAWideArea
NetworkiswidelyusedinthefieldofBusiness,government,and
education.
ExamplesofWideAreaNetwork:
oMobileBroadband:
A4Gnetworkiswidelyusedacrossaregionorcountry.oLastmile:A
telecomcompanyisusedtoprovidetheinternetservices tothe
customersinhundredsofcitiesbyconnectingtheirhomewithfibre.
oPrivatenetwork:Abankprovidesaprivatenetworkthatconnectsthe
44offices. Thisnetworkismadebyusingthetelephoneleasedline
providedbythetelecomcompany.
Advantages of Wide Area Network:
Following are the advantages of the Wide Area Network:
o Geographical area: A Wide Area Network provides a large geographical area. Suppose if the
branch of our office is in a different city then we can connect with them through WAN. The
internet provides a leased line through which we can connect with another branch.
o Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to
buy the emails, files or back up servers.
o Get updated files: Software companies work on the live server. Therefore, the programmers
get the updated files within seconds.
o Exchange messages: In a WAN network, messages are transmitted fast. The web
application like Facebook, WhatsApp, Skype allows you to communicate with friends.
o Sharing of software and resources: In WAN network, we can share the software and other
resources like a hard drive, RAM. o Global business: We can do the business over the internet
globally.
o High bandwidth: If we use the leased lines for our company then this gives the high
bandwidth. The high bandwidth increases the data transfer rate which in turn increases the
productivity of our company.
Disadvantages of Wide Area Network:
The following are the disadvantages of the Wide Area
Network:
o Security issue: A WAN network has more security issues as
compared to LAN and MAN network as all the technologies
are combined together that creates the security problem.
o Needs Firewall & antivirus software: The data is transferred
on the internet which can be changed or hacked by the
hackers, so the firewall needs to be used. Some people can
inject the virus in our system so antivirus is needed to
protect from such a virus.
o High Setup cost: An installation cost of the WAN network
is high as it involves the purchasing of routers, switches.
o Troubleshooting problems: It covers a large area so fixing
the problem is difficult.
concon

More Related Content

Similar to computer file for elementry computer application's.pptx

Module2 computer system
Module2 computer systemModule2 computer system
Module2 computer systemShaharizan Hassan
 
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...Ryousei Takano
 
Dr.Balamurugan_Fundamentals_of_Computer.pptx
Dr.Balamurugan_Fundamentals_of_Computer.pptxDr.Balamurugan_Fundamentals_of_Computer.pptx
Dr.Balamurugan_Fundamentals_of_Computer.pptxBalamurugan M
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...IRJET Journal
 
Functional units
Functional unitsFunctional units
Functional unitsJeeva Nanthini
 
COA-Unit 1 Introduction.pptx
COA-Unit 1 Introduction.pptxCOA-Unit 1 Introduction.pptx
COA-Unit 1 Introduction.pptxOmGadekar2
 
Itb Chap 11
Itb Chap 11Itb Chap 11
Itb Chap 11lindy23
 
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling SystemIRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling System
IRJET- Smart Energy Meter Billing, Monitoring and Controlling SystemIRJET Journal
 
COA_UNIT-1new[1].pdf
COA_UNIT-1new[1].pdfCOA_UNIT-1new[1].pdf
COA_UNIT-1new[1].pdfAbinayaBhaskar1
 
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...Deployment of the Festo PA Workstation for Undergraduate Training on Industri...
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...theijes
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Higher Order Thinking - Question paper setting
Higher Order Thinking - Question paper settingHigher Order Thinking - Question paper setting
Higher Order Thinking - Question paper settingPradeep Kumar TS
 
MCSoC'13 Keynote Talk "Taming Big Data Streams"
MCSoC'13 Keynote Talk "Taming Big Data Streams"MCSoC'13 Keynote Talk "Taming Big Data Streams"
MCSoC'13 Keynote Talk "Taming Big Data Streams"Hideyuki Kawashima
 
Simulation and Modelling of 3-Floor Elevator System using PLC
Simulation and Modelling of 3-Floor Elevator System using PLCSimulation and Modelling of 3-Floor Elevator System using PLC
Simulation and Modelling of 3-Floor Elevator System using PLCIRJET Journal
 
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...IOSR Journals
 

Similar to computer file for elementry computer application's.pptx (20)

Module2 computer system
Module2 computer systemModule2 computer system
Module2 computer system
 
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
A Scalable and Distributed Electrical Power Monitoring System Utilizing Cloud...
 
Dr.Balamurugan_Fundamentals_of_Computer.pptx
Dr.Balamurugan_Fundamentals_of_Computer.pptxDr.Balamurugan_Fundamentals_of_Computer.pptx
Dr.Balamurugan_Fundamentals_of_Computer.pptx
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...
 
Functional units
Functional unitsFunctional units
Functional units
 
COA-Unit 1 Introduction.pptx
COA-Unit 1 Introduction.pptxCOA-Unit 1 Introduction.pptx
COA-Unit 1 Introduction.pptx
 
Itb Chap 11
Itb Chap 11Itb Chap 11
Itb Chap 11
 
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling SystemIRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling System
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
 
COA_UNIT-1new[1].pdf
COA_UNIT-1new[1].pdfCOA_UNIT-1new[1].pdf
COA_UNIT-1new[1].pdf
 
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...Deployment of the Festo PA Workstation for Undergraduate Training on Industri...
Deployment of the Festo PA Workstation for Undergraduate Training on Industri...
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Higher Order Thinking - Question paper setting
Higher Order Thinking - Question paper settingHigher Order Thinking - Question paper setting
Higher Order Thinking - Question paper setting
 
MCSoC'13 Keynote Talk "Taming Big Data Streams"
MCSoC'13 Keynote Talk "Taming Big Data Streams"MCSoC'13 Keynote Talk "Taming Big Data Streams"
MCSoC'13 Keynote Talk "Taming Big Data Streams"
 
Simulation and Modelling of 3-Floor Elevator System using PLC
Simulation and Modelling of 3-Floor Elevator System using PLCSimulation and Modelling of 3-Floor Elevator System using PLC
Simulation and Modelling of 3-Floor Elevator System using PLC
 
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...
IRJET- Arithmetic Logic Unit Design with Comparison Power Consumption on Diff...
 
Ntroduction to computer architecture and organization
Ntroduction to computer architecture and organizationNtroduction to computer architecture and organization
Ntroduction to computer architecture and organization
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
UNIT 1.docx
UNIT 1.docxUNIT 1.docx
UNIT 1.docx
 
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vĂĄzquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

computer file for elementry computer application's.pptx