0% found this document useful (0 votes)
66 views

Computer Applications

Theory for basics of computer

Uploaded by

Tushar Sahu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
66 views

Computer Applications

Theory for basics of computer

Uploaded by

Tushar Sahu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 16
Gy Computer Ape Veattons Se Tn _Qiytee Automaton ¢ — " Co Ure mach > BWlee Auromahen TYyers to | Veusi ous og “3 Steve, & Saytwone Used to chi ey Corrente, Collers Mamiputare Oyaice Ingormahon needed dew aecomplishug baate trate. ] ~~ The bacebone 4 Ogee Automahon Is 4 LAN, Uk Uhich allows Useng to Pramaget data, mal even Vorces across the Niw: > BUN oggice Funchons , Hncly dng Typing, Filing Copying 5 Fax , Retord management » Foul \nto His Coigony: ~ Compuke, applicahims In, Oggi Automeborn cut Gy DaG Storage a Mamiputakon 2 Word Process Lortwane , Prenentaten Saghoares Wow ¢ > esny or editing bextany Ave + 9 Spread sheer applicahiont Provide Useg lth the Copacty to engage In the cary Pa niputobing Q ofp Of numbaig : +o % Imoge apptiablns oattow He Captuie & “ns 4 Uisuol Teneges, (ny Date ianedemece | Of Stored dala & Ingor maton Stmplitg ing the taneacnet 3 Porog oam Sehedules , Tekles Systems oe Re rrierta Systems 5 lack Mameg emenk Coa Some OY the feotunes Uhich empower burtnen to have an P4e on att busimen Psocemen ait Out Ama honte- ce (1) Dok. Exchange ¢., rots Exshomge Video ory > Blechronic medil!, Voice moat , Paesimile axe Examples Oy Uechonic ranspes applicabens % This woutd allow Your emp loyees fo Collaboxate in Rest Time 2 Enhame thes Produc vite. 2 Mya Smashyty & Brreesy HR Use Arkgi cio Tastettgene (tyy Acouxae 2 FO eeu Hime fo hive 2 Seweenis pron. 9 Once the bugs ase. Memoued Gem a Program os Guahes Systeme am applicahen , t ‘Com hetp You tn Getting two, Aecunney dn clog fo clos business Processes. 2 Tmplementn am aduvamced busunen Automaton cox the Prt csi City Q eer. CY Save Tme & Resources = _Atsousie By Saptwasie wredu ~ Computers Teehnotog ies 2 Niw Communi tahons Axe not Conghicted by Geographic! Lhe ‘rethions Te, Saver. both Time & money Spewt Op teaueting x a ~ Dat git & @. eliminafe thé ‘need og Pres enu! : erving hasd Copies & hence, Saving Paros Dafuse a8 Welt: a wn) Red vced Costs 2 9» Since ev busines Process is NOW atomabed, You conte need +0 Invest muth om hising New resources for img Cane o4 Hose tart, UsShich Com be Uy executed nee, am Mga tee automaton Sy ster. Cdbiees Using Uideotex Com dlectronicalty publish Stenclasd | 0 pes atu Prvced use Mamuots» Sates Hhestahuie 9” fn —hotse Newsletter Othe I ion > , 9» Oygtee Entey Auto mahon adlowe employ ees to Come th & Ou | He ayyice Using, a es OT Bio meBuc System fngkod Of empleying a team Se cusuthy Shed + “Disadvambeges 5 Toto} nsveskment! Costs: ora: IS 3 | Sriuser to Moamege Veyygied cutomehen cfg ents fer rmequied Udhich organ Jon ees net have : 9 VomeHmes business” may “euutomate the ! uo Prveme Mase 2 Reduces Team 'om Custernes (nkesachon #° ey, + Computer Applicahess fn Date Aratysin * Dota Anetysts fs @ Process Y Inspecting , Cleansing , Trantgorming g Mod eng claly | Usith the gow y Cis cov ex ing Usy wt Ingormatin , > Ingorming Conclusion 2 Suppesting dedcion -m 4g om ating - Date An ne ate fools Meatee th ecates, dor Usess to Pimess Rimaniputete clata, Anety ze the relation “Ships & Corr abens b/w daty Se, & Ch Obsy hetps to Vlertity Patterns 2 brends dew In Fexpretots Some oy the Beta Prey sin Foolk Ques @ R S_Prog ramming : Te isthe Lang vsge ee ges StatsH coy Computeken » dara Anetysin A Qrephicod Weprenentahon Oy doa. Tt is Us tlety used tn Polts, Dota Minang Susvegs. > Wet —desis ned Publi caHon - 4 b Plo Gn be Produad, Indlucing meithe matical Syrobets & Formulae Whew necded. 3 ® Python sel Als ahipas, machin Langusge Udhich Cam bbe Used +0 | handle big hota & Peyoom Complex Mathematics . > Te hes @ Limpte Syntax Limulax fe 8 | @® marcas 2: he teva Hugh Pry owm ane | tongenge | Bata Explorohtn & Ulsuoti goon | ~ Tt Com aloo be Used dew Modeling ,Slmalato | - Perote © 4Cing, > Appticabon deuvclopment Usea Gut, "uanien Can, be Used gen Dots Ancigin; 9 Te AUows you to Solve many technical Compat | ~ eng Problems esp. those Udtth Mmotrix & Vector > Formutation In a drattion cy me. ® SkyTRee . Ze ts a ' big deta Prnelyties too) thot empowers ota RclenHst +0 bud more Accuxose Models Faster + > Te QUpens Accunote Predichve Machine leaving modas thar cow cay to Use. 3 Tt allows dota Sdentists to Visuotize & | Unde Stand the Logie behind Mt Ceeisions. © Talend ; “Ze ts 4 big dlata:! too) that Simpligies 2 cutomates big ota’ Integration, | re euto us & mraste ota mramege gent & Cheers © Ploety Ze! ts am Prnaly Hes tool that lets Users to Creo Chauh & Clasthboads bo ik Shee ontine: AX] : 3 Gm eaddly tein omy doa into eye —Cakhig is 2 Ingowmatve graphics: @ Lumigy + ode fs big data gusion , Analyst, 2 Ulsuotiganen Plakjerm Tt helps Usexs to din cove Connechons & Explore rrelabonShips tn theiy ata Via Que y Ainady re Optons. > Dota Analysis Process Consists gy gollowsng Pheses G) Date Requixemenr Speci cation Cpotlay suvey) Ch) Pata CotleKon (Daretased Cu} Dota Proumlva CSpread Sheer JeraHsheot App.) Qu} Date Clea € “3 on | gteHsteel Cah (yy): Dots Praolysin CUisuctizas Moles), a v NG imp ules hou In’) Cyber Seca % Computer App iveatons in Cyber ear > Cyber Secwity Is Agfined as Technetogies 2 Processes Constructed +o Protect Com pulaus , Computan hesedeseinie , Sajtware , Hetwosts 2 dol dem Unauthorized | access , Vulnes abi lites Sepeied through foreinek by Cy ben Crlminab, Hewonsr Gree 2 hackeus- 9 Ghiete Veen Pa, % Cybex Come Ch Cybex Steahing 3 "Intructeng Into tndtuisuate Peuent Lye +o Cause distress > anxleky 2 Peon: ary Tntett ectuot Property That 9 Innovakhon, Rew Research »Method, models 1 Parriutes! ase Intetleche) Property UNG, We Ob mse gy Ther. % This Can be Protecded udu hewing Patents , Trademasrs , Copy wig he On Videos & Muste ag welt (i) Salam! Atak 3 Cybex Ceminale And Hares Steoy ea In Vv Severe bamrg crecounk. QW) @-mad Rombs Sen Lute amount drom ina Sg eNorMmous, amount ] ermatls to a Fig clef peso, 5 Pradulent Otrempt mede +H wo. Cophisie (VY Phi'shin h emaip | Persona! 2 dinancot Teyeamanon (wt) “Tdentity That > Peis pretends to be Someone Clee & dou Crime Like aera ‘Lapermakior| Ive Name, Pears, Credit Cor no,, Acc. ne. Ct) Spooping 3 Teehntque to have Unautherigel 5 to Compulens acces! View Wm) Worms , Trojan Horse , ems = Computer Virus Unes fsey uaith a maticlous Uatdth Udhen Tuns han Preg var ov execulable Files he Comput « ' Existena Qy Wem tn System atone Com aypew te Go net need the Peg cernane oy. Sy stern beg Ruppert} ue ottachad File Trojan Horce , at givst Glance Seems Usa Sq bur Acruoklay Clamage Compules; Uthen inshaued & Alon Create’ bacrdoor for Matidous Uses to Conteol pou Computes Temot ety « Cx) Dos & Dds ? Denial 4 Service CDS) ahaue an GtHempb to, mare Computer , Sever \ Unaveaitable to fs authey Srey exs i Or Nework wWesounces Uses + \ \ » 8 Dist Sbuted, Dental 4 Senvice PYyos 9 Dos GHack, thet Rrepegetes from mose thane One Inyected System f Ca ber Seeustity thro ugh Comput Appiicohios ' ® It Includes Authenioto, © Access Conte) : AuthowzaHen , & ARudir. Authedt atin methods & tokens Include Passwort, Blomeble Anatysin , Electronic Keys > ee. ! designed dew the etecton 9 Key Stroke logger Saroae 2 Alao Incorporate the abi ly to delle Oe aHeast mmobuise Hidden Keystone logon Seftuoast, om Your Computer. = Pubue Compatens, on Usage » Finamctal nsthitulms one Ferg eb : y keg leg as. anlar ety ® SIem ® Anti key Loggers ¢ Type gy Sayhvore Speelgi cathy Sher Sec usury, Lryoo mak on, A Event Marae Sqyrwore | Produchs.2) Serica Combine Secwaby fet la tot dat Inger mation Mlegras tener 8 Been Guent Date ) Sand Box = Te Tels vey Secusaty mechanism gor Separating ve prvamains > Usuobly In am ost to iG ate System Failures fen Spreasing: 3 Sandbox! ts “Brag uenty Uded to tect Unveils Peegzams thar od Ae QA Uimug | Ow Othey Malicious Code Or Say puocout Voter Bite — © @ @ & Intrusion Oetechon System ¢ Tt is q device On Sq twore Applicahon thar maniters GF O opeal , : Nekwosk OF Systeme ger Malicious oct ul ty ox ; Slg not based derecho be Two Tyee g ar i CRetogmi'ging bad paiten’) Anomely boned cletechon It welles! m Machine Leamung © Oetectig goad etic) Pieewall 2 A Nw Secusity Sy tiem thar Monitors 2 Conbols incoming 2 Oukgoing N [wo Prajyie bared om predehumimed Secusehy mules. oe Typically ectablishes @ baseiiex bl a Trusted Inteynaf Nf and Untwsted ex Fennel Nl. Enewg phen Spon Te Is a Sqroase tab Uses, Cry eel ‘fo prevent Unauthorg access +o tq itot Tegowmalon « \ a Example y Ener phen’ Seyhvore One 4 Emad iy) HTTPS re Secunily , Secene" He Ant Vierus i Sepa Computer Pregram Used to preven, doce aT emove Malware. | av % “CEReaRS epeIanee go, oxi) EEG). , > Sorin} Nekoow ies ig the use OY Internet Booed Sous} media gites +o Stay Connected uit Prteuts Family , Collengues , Cuttomens , om Clients ly > leagues » > | 9 Any Sort of Computes | mediated Communtablen Com be Cotted Sociol Sap tocwe Since Comm. te Inhenentiy Godot “ex any fe Group ware ( Simple Forums; Pasjech M1 ermunt', S exe). Educoonaf loeb | °) oo j Sexurtces Cums) 33 Compulir Games, et. : | js Forms oy Soda! Nehworting 0 Shaning 9 Links 2 Reads: > Souist Rooter Sites he Q Website that abLows you to Store. bootmasks OA Q Femoke Sesvey Q to Shase Usith OMe. 9% Hybrid Systems Miike NewsVine! allow to read, Ciseuss. 2 Vote ger news’ Steves. > Sedey Navigatens Systems Thar (ork Users build truly of ued renources 4 Share them Uke Amazon Shoppiy app- @ > Loewy Shops 2 Venu Com aduetise Upcomteg Quen Sheva caita} Ovtiacts ¢ crs: 2S Plerwie Ch Logrvares Lee Fltery, Pb, Tastegzan , Youtube Q - * % Gorpie clamzvoms helps to Creote » Olistribult, 2 Qrade assignment te 9 Papuless woay: Te dc Use to Streqmiine the Process od aaah Ailes bl reaches & Sudan - 3 Oncline Collaborate Writing tools Such as eciik Conkenr e Uoikipediq “allow Uses to add 2 Usex Com aloo Creo mew Pome: On \ine ® Socio citatons & Reference Mareger : Thee as Many TY erene management Sop hwaxa that Can mare the Process % maneaing you eee almost Ygostless . | Uy Reeworrs satlows Usexs to g enaxal & Former bibiliegwaphiet 2 Manuscrpls tn hunchreds CY OP Styles: (1) Menaletey >» OMows’ User to Genesote CiteKons 2 bibl! og saphies Ma ms) Woewd, Libre gis TES great! few Collaberratue dest: ® Soda Shopping ; a Sech Sy stern Opens, Reviews, Recommendation, Composd son « 2 Bmazon ,Flipkout ete oun Cmtine Shopplug Sites 2 otlow Hsas to Compare | ©) Socta ntw Conshwetion + > Sofia networting Sqptwane mre im : plements Socup Walia eather ° Cations 4 es: Pocussed Socioy! ‘Nt foo Soytwoome Ure Lineal, vol Kipedia. ete ' (tee Genera Pumpose Sociol, Nivw Soy roue Farboor, Tuot tHene ) ) ?B Myoov tn type Sept Loebsiges, Govt. Gor the Sigg estion y Hue Puble 2 to Keep tus Public Upcoted on tray Achat ® Baan Mnance Plieahions ¢ Soctot niw Cres new OPeabunites ger Flobet rane: | >) The. Use an Usstuot Cussrency Systems hn Side |; @® Mesiot Appttcabons ¢ | 2 Por Peopte Suygering from Ue ~eiteating cise Core Usebsites Such ag .Pahents Like Me Qbger theb Membas to Connect Usith Othe clealing sth th. © Crowd Sous et Appt cohons : 7 —— e =—* 9 Crorod? oustting Sociol Medig Ploug dems Combines Group °4 Pry esstonal “Preelances» Such ay \ designers 2 -hetp them Cainaniate L estion. Iousiness Ownens Interested In Ther “vay > rat + Compute Appiiatins fo Bose Pubishieg > Publishing is the business Qy meting bgforeratia Auellable to He Public “Such as Likererusre | ww tegeomation both olig ite & Ne aightet_madia 3 Publishing Includes Fott owing Stages % levetop| — mek 2) Dequisition “(Copy | Editing Gu) Producten (wy Pasa ng WwW) Manteting (uth Distsibuton cl) Cop Editing Process 4 reviewing & Cone tring Rtn mabeuint +0 Improve Aecusay > ead obi ly & gitmess dew dts usipose + > Pag in ation Ie Prose: ‘Such as Page meaten , the Quask Xpress, Adobe Indesign Udleh gives Cony eclatore move (Conkeet One) He Cowshucnen 2 Wewisions | gy Hodis Coutent. | Cu) Pcquaaivon + 9 Exbeiner hos Lenpligied tue Process gy Pest Checking & Ovlme Prag rams Sudh a Faceboot | oe Twitter have olen expedited! He Prous | igor mesion qubouns ADesktop Publishing Sena alan TevoluHonidy th. Convenient Peake |p a Image Sejecnon 2 Searen {Engine Oph mizaken Tape eye ans. ‘wheeze Ineveaned tHe is! belly [4 Search Renutt L RSpecasitly’ When Ceciening Gor Keywords inHedte \ ®@ Poblishing : . Comp wher appli cohins in publishing vir New peo gscol Chamges to the Pusu'shuma Trdushy, South oy @ -books,, Pant On demamd 2 Accessible Pubtiching . 2 C= book 3 A Rook Publicohion made Avarlable in digit Corny Can be Pod In Q-reader deviun, Computers, tolls Prdvom tage BY e-books ose Its lowe Pres , Increased Com cat & Laige Seeckom % Htler. Bleeronite! Bookm auey Make myrun ung earier AMow waders to! amnota Page. Fos Program Code mple on ' ” 3 meee epic ° Ceint on Bemiamd > Le isha, PrinHng Feehnotegy a Business’ prvcese jth Ushich book Copies Ose Hot Printed Until ‘the Compomy wedeves AN Onder , ; > Tt Coutd be possi ble ust the begionig cr ag ttat Repting beog tr was nok economicay to pene Singte) Copies With gy Ser mn 2 Mam acodemie Publishers, inchu: Unluast Presses , Usee Poo Sanvien Fo met feum lange block lists CLists ¢ Y Olctes, Pupti cohen), f, Accessible Publis hing D Te ts am approach to Publighu & book design Ushure by books 2 other Texts axe made aveitl obte in Blhainahve Pormats designed Fo col or Deplace He Trend tog Pru: 3 Alteinatve Parrnots Such o4 Large Ponts, Spedatiged onk Por Cextaim Kinds % Reade dinabiline, , Broke, Audtoboots » Daisy (Digit Accessibte Tiny ormahon System) digites souk boots. @ WW) Monkees © Increasing no. & Users ome using Niche... MoH keting Gnbing FO SOL mare Books 9 Niche mankehing fs the Subser gy Mesncer on Which a Specie Producr ts gocusses: fared | Price ramse , Produchon quolthy 3 dlamographics thot ts intencted to faxger. 2 Smash words ow Amazon's Creotespace dhe drree Senurees to hove tein ger Uoatd usicle Late. booK Avalj able

You might also like