SlideShare a Scribd company logo
1 of 38
Chapter 15
Computer
Careers and
Certification
Chapter 15 Objectives
Describe career opportunities available in
various segments of the computer industry
Describe career opportunities available in
various segments of the computer industry
Discuss functions of jobs available
in an IT department
Discuss functions of jobs available
in an IT department
Distinguish between trade schools
and colleges
Distinguish between trade schools
and colleges
Differentiate among various computer-
related majors for college students
Differentiate among various computer-
related majors for college students
Identify ways to stay current with changing
technology after graduation
Identify ways to stay current with changing
technology after graduation
List the benefits of certification for
employers, employees, and vendors
List the benefits of certification for
employers, employees, and vendors
Identify ways to prepare for certificationIdentify ways to prepare for certification
List the general areas of IT certificationList the general areas of IT certification
Next
Name some specific IT certifications in each
certification area
Name some specific IT certifications in each
certification area
The Computer Industry
What is the expected demand for computer professionals?
Nextp. 776 Fig. 15-1
 Currently 10.5 million computer workers with expected
increase of 2 to 3% annually
 The number of students majoring in computer-related
fields is declining
Careers in the Computer Industry
What are the primary areas where job opportunities
are found?
p. 778 Next
Computer
sales
Computer
education
and training field
General
business and
government
organizations
Computer
equipment
field
Computer
software
field
IT consulting
field
Computer
service and
repair field
Careers in the Computer Industry
What is an information technology (IT) department?
p. 778 Fig. 15-2 Next
 Department in
business or
government agency
that employs people
in computer-related
jobs
 Responsible for
keeping all computer
operations and
networks operating
smoothly
Working in an IT Department
What jobs are available in an IT department?
p. 780 - 781 Next
ManagementManagementManagementManagement
Chief InformationChief Information
Officer / VP of ITOfficer / VP of IT
Chief Security OfficerChief Security Officer
E-commerceE-commerce
administratoradministrator
Network administratorNetwork administrator
ApplicationApplication
programmerprogrammer
Software engineerSoftware engineer
Systems analystSystems analystComputer scientistComputer scientist
Systems programmerSystems programmerDatabase analystDatabase analyst
Technical writerTechnical writer
Web page authorWeb page author
Computer operatorComputer operator DataData
communications analystcommunications analyst
Corporate trainerCorporate trainer Help desk specialistHelp desk specialist
Computer forensicsComputer forensics
specialistspecialist
Computer technicianComputer technician Graphic designer /Graphic designer /
illustratorillustrator
Network securityNetwork security
specialistspecialistDatabase administratorDatabase administrator
Quality assuranceQuality assurance
specialistspecialist
Desktop publisherDesktop publisher
Security administratorSecurity administrator
SystemSystem
developmentdevelopment
andand
programmingprogramming
SystemSystem
developmentdevelopment
andand
programmingprogramming
TechnicalTechnical
servicesservices
TechnicalTechnical
servicesservices
OperationsOperationsOperationsOperations
TrainingTrainingTrainingTraining
Project leader / managerProject leader / manager
Web administrator /Web administrator /
WebmasterWebmaster
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click Computer Career Salaries
below Chapter 15
Careers in the Computer Industry
What is the computer equipment field?
p. 782 Fig. 15-4 Next
 Manufacturers and distributors of computers and
computer-related hardware
 Careers involve design, manufacture, and production
of computer equipment
Careers in the Computer Industry
What is the computer software field?
p. 782 - 783 Next
Computer
scientist
researches,
invents, and
develops solutions
to complex
software problems
Project
leader
analyzes
requirements,
designs solutions,
and oversees
software
development
process
Companies
that develop,
manufacture,
and support
software
Programmer
writes and tests
computer
programs
Software
engineer
designs
and develops
software
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click Computer Scientists
below Chapter 15
Careers in the Computer Industry
What is the computer service and repair field?
p. 783 Fig. 15-5 Next
 Provides preventative
maintenance, component
installation, and repair
services
 Computer technician—
installs, maintains, and
repairs hardware
Careers in the Computer Industry
What are career opportunities in computer sales?
p. 783 - 784 Fig. 15-6 Next
 Computer salespeople
need general
understanding of
computers and specific
knowledge of the
product they are selling
Careers in the Computer Industry
What are career opportunities in education and training?
p. 784 Fig. 15-7 Next
 Schools, colleges, universities, and private companies need
educators and trainers
 Corporate trainers teach employees how to use software, design
and develop systems, and program
Careers in the Computer Industry
What is an IT consultant?
p. 784 Next
Individual who draws upon expertise in specialized area of computers
ComputerComputer
selectionselection
SystemSystem
designdesign
Hardware andHardware and
softwaresoftware
configurationconfiguration
Network designNetwork design
and installationand installation
CommunicationsCommunications
WebWeb
developmentdevelopment
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click IT Consultants
below Chapter 15
Preparing for a Career in the Computer
Industry
What is a trade school?
p. 785 Next
Offers programs inOffers programs in
programming, Webprogramming, Web
development, graphicdevelopment, graphic
design, hardwaredesign, hardware
maintenance,maintenance,
networking,networking,
PC support,PC support,
andand
securitysecurity
Students can completeStudents can complete
trade school programstrade school programs
in shorter timein shorter time
than collegethan college
or universityor university
programsprograms
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click Trade Schools
below Chapter 15
Preparing for a Career in the Computer
Industry
What are the three broad disciplines in higher
education that produce the majority of entry-level
employees in the computer industry?
p. 786 Fig. 15-8 Next
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click College Computer Majors
below Chapter 15
Preparing for a Career in the Computer
Industry
What is computer information systems (CIS)?
p. 786 Next
 Programs that
emphasize technical
knowledge and skills
 Sometimes called
management
information systems
(MIS) or management
information
technology
Preparing for a Career in the Computer
Industry
What is computer science (CS)?
p. 786 Next
 Programs that stress
theoretical side of
programming and
operating systems
 Also called software
engineering
Preparing for a Career in the Computer
Industry
How do companies advertise computer-related job openings?
p. 788 Fig. 15-10 Next
 Some Web sites specialized in helping people find jobs
 Some allow job seekers to submit resumes online
Preparing for a Career in the Computer
Industry
What are some organizations for computer professionals?
p. 789 Fig. 15-11 Next
 Association for
Computing
Machinery (ACM)—
science-oriented
 Association of
Information
Technology
Professionals (AITP)—
programmers,
systems analysts,
and information
processing managers
Preparing for a Career in the Computer
Industry
What is a user group?
p. 790 Fig. 15-12 Next
 Collection of people with common computer
equipment or software interests
Preparing for a Career in the Computer
Industry
What is professional growth and continuing education?
p. 790 Fig. 15-13 Next
 Events such as workshops, seminars, conferences,
conventions, and trade shows
 CES—trade show
that brings together
hundreds of vendors
and more than
130,000 attendees
 Training in form of books,
video-based training,
computer-based training (CBT), Web-based
training (WBT), and instructor-led trainingClick to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click International Consumer
Electronics Show below
Chapter 15
Preparing for a Career in the Computer
Industry
How can you stay informed about the computer industry?
p. 791 Figs. 15-14–15-15 Next
 Computer industry publications
 News, blogs, and technical Web sites
Certification
What is certification?
p. 792 Next
 Process of verifying
technical knowledge in a
particular area
 Proficiency is
acknowledged with
certificate
Certification
What are the benefits of certification?
p. 792 Fig. 15-16 Next
 Enhances employee’s career, provides better standing
as industry professional, and higher salaries and
bonuses
Certification
What are benefits of vendor-sponsored certification?
p. 793 Fig. 15-17 Next
 Vendors provide access to technical information, advanced
training, and discounts on publications and tools
Certification
How does certification benefit customers, employers,
and industry?
p. 793 Next
Institute for Certification of
Computer Professionals (ICCP)
defines standards designed to raise
competence level for computer industry
Employers benefit from more
productive and knowledgeable workers
Certification is a form of
industry self-regulation
Customers receive better service from
employees with certification(s)
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click Institute for the
Certification of Computing
Professionals below Chapter 15
Certification
What are factors to consider in choosing a certification?
p. 794 Fig. 15-18 Next
Certification
What options are available to prepare for certification?
p. 794 Next
Self-studySelf-study
Online training classesOnline training classes Instructor-led trainingInstructor-led training
Web resourcesWeb resources
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click Instructor-Led Certification
Classes below Chapter 15
Certification
What are examinations like?
p. 795 Fig. 15-19 Next
 Taken using computers
 Some are multiple
choice, others are
skill based
 With
computerized
adaptive testing,
the tests analyze a
person’s responses
while taking the
test
A Guide to Certification
What are application software certifications?
p. 796 Next
Focus on knowledge ofFocus on knowledge of
application softwareapplication software
Sometimes calledSometimes called
end-user certificationsend-user certifications
MicrosoftMicrosoft
CertifiedCertified
DesktopDesktop
SupportSupport
TechnicianTechnician
(MCDST)(MCDST)
sponsored bysponsored by
MicrosoftMicrosoft
MicrosoftMicrosoft
OfficeOffice
SpecialistSpecialist
(MOS)(MOS)
sponsored bysponsored by
MicrosoftMicrosoft
AdobeAdobe
CertifiedCertified
ExpertExpert
sponsored bysponsored by
AdobeAdobe
SystemsSystems
MacromediaMacromedia
CertifiedCertified
ProfessionalProfessional
sponsored bysponsored by
MacromediaMacromedia
IBM CertifiedIBM Certified
ProfessionalProfessional
for Lotusfor Lotus
SoftwareSoftware
sponsored bysponsored by
IBMIBM
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click Microsoft Office Specialist
below Chapter 15
A Guide to Certification
What are operating system certifications?
p. 797 Next
Focus on particular skills—user,Focus on particular skills—user,
operator, system administrator,operator, system administrator,
and system engineerand system engineer
Differing levels of certificationDiffering levels of certification
Red HatRed Hat
CertifiedCertified
EngineerEngineer
(RHCE)(RHCE)
sponsored bysponsored by
Red HatRed Hat
MicrosoftMicrosoft
CertifiedCertified
ProfessionalProfessional
(MCP)(MCP)
sponsored bysponsored by
MicrosoftMicrosoft
Red HatRed Hat
CertifiedCertified
TechnicianTechnician
(RHCT)(RHCT)
sponsored bysponsored by
Red HatRed Hat
IBM CertifiedIBM Certified
SpecialistSpecialist
sponsored bysponsored by
IBMIBM
Sun CertifiedSun Certified
SystemSystem
AdministratorAdministrator
sponsored bysponsored by
SunSun
A Guide to Certification
What are programming certifications?
p. 797 Next
Recognition of programming trainingRecognition of programming training Broadens knowledge and skill baseBroadens knowledge and skill base
IBM CertifiedIBM Certified
SolutionSolution
DeveloperDeveloper
sponsored bysponsored by
IBMIBM
CertifiedCertified
SoftwareSoftware
DevelopmentDevelopment
ProfessionalProfessional
(CSDP)(CSDP)
sponsored bysponsored by
IEEEIEEE
ComputerComputer
SocietySociety
MicrosoftMicrosoft
CertifiedCertified
SolutionSolution
DeveloperDeveloper
(MCSD)(MCSD)
sponsored bysponsored by
MicrosoftMicrosoft
MicrosoftMicrosoft
CertifiedCertified
ApplicationApplication
DeveloperDeveloper
(MCAD)(MCAD)
sponsored bysponsored by
MicrosoftMicrosoft
Sun CertifiedSun Certified
JavaJava
DeveloperDeveloper
sponsored bysponsored by
SunSun
Sun CertifiedSun Certified
EnterpriseEnterprise
ArchitectArchitect
sponsored bysponsored by
SunSun
Sun CertifiedSun Certified
ProgrammerProgrammer
sponsored bysponsored by
SunSun
A Guide to Certification
What are hardware certifications?
p. 798 Next
Recognition of general knowledgeRecognition of general knowledge
of hardware and controllingof hardware and controlling
software needed to set up, maintain,software needed to set up, maintain,
and repair a computerand repair a computer
Can be narrowly orCan be narrowly or
broadly focusedbroadly focused
IBMIBM
eServereServer
CertifiedCertified
SpecialistSpecialist
sponsored bysponsored by
IBMIBM
A+A+
sponsored bysponsored by
ComputingComputing
TechnologyTechnology
IndustryIndustry
AssociationAssociation
(CompTIA)(CompTIA)
NACSENACSE
NetworkNetwork
TechnicianTechnician
(NNT)(NNT)
sponsored bysponsored by
NationalNational
Association ofAssociation of
CommunicationCommunication
SystemsSystems
EngineersEngineers
(NACSE)(NACSE)
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click A+ Certification
below Chapter 15
A Guide to Certification
What are networking certifications?
p. 798 Next
Awarded to professionals who demonstrate expertise in planning,Awarded to professionals who demonstrate expertise in planning,
installing, managing, and troubleshooting a networkinstalling, managing, and troubleshooting a network
CertifiedCertified
NovellNovell
EngineerEngineer
(CNE)(CNE)
sponsored bysponsored by
NovellNovell
CertifiedCertified
NovellNovell
AdministratorAdministrator
(CNA)(CNA)
sponsored bysponsored by
NovellNovell
CiscoCisco
CertifiedCertified
NetworkNetwork
ProfessionalProfessional
(CCNP)(CCNP)
sponsored bysponsored by
CiscoCisco
Sun CertifiedSun Certified
NetworkNetwork
AdministratorAdministrator
sponsored bysponsored by
SunSun
Network+Network+
sponsored bysponsored by
ComputingComputing
TechnologyTechnology
IndustryIndustry
AssociationAssociation
(CompTIA)(CompTIA)
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click Certified Novell
Administrator below Chapter 15
A Guide to Certification
What are computer forensics certifications?
p. 799 Next
Discovery, collection, and analysis ofDiscovery, collection, and analysis of
evidence found on computers andevidence found on computers and
networksnetworks
Certificate holds are consideredCertificate holds are considered
highly credible during computerhighly credible during computer
crimes casescrimes cases
CertifiedCertified
ForensicForensic
ComputerComputer
ExaminerExaminer
(CFCE)(CFCE)
sponsored bysponsored by
InternationalInternational
Association ofAssociation of
ComputerComputer
InvestigativeInvestigative
SpecialistsSpecialists
(IACIS)(IACIS)
CertifiedCertified
ElectronicElectronic
EvidenceEvidence
CollectionCollection
SpecialistSpecialist
(CEECS)(CEECS)
sponsored bysponsored by
InternationalInternational
Association ofAssociation of
ComputerComputer
InvestigativeInvestigative
SpecialistsSpecialists
(IACIS)(IACIS)
CertifiedCertified
ComputerComputer
ExaminerExaminer
(CCE)(CCE)
sponsored bysponsored by
InternationalInternational
Society ofSociety of
ForensicForensic
ComputerComputer
ExaminersExaminers
(ISFCE)(ISFCE)
A Guide to Certification
What are security certifications?
p. 799 Next
Measure a candidate’s ability to identify and control securityMeasure a candidate’s ability to identify and control security
risks to computer resourcesrisks to computer resources
SystemsSystems
SecuritySecurity
CertifiedCertified
PractitionerPractitioner
(SSCP)(SSCP)
sponsored bysponsored by
(ISC)(ISC)22
CertifiedCertified
InformationInformation
SecuritySecurity
ProfessionalProfessional
(CISSP)(CISSP)
sponsored bysponsored by
(ISC)(ISC)22
SecuritySecurity
CertifiedCertified
NetworkNetwork
ProfessionalProfessional
(SCNP)(SCNP)
sponsored bysponsored by
The SecurityThe Security
CertifiedCertified
ProgramProgram
SecuritySecurity
CertifiedCertified
NetworkNetwork
ArchitectArchitect
(SCNA)(SCNA)
sponsored bysponsored by
The SecurityThe Security
CertifiedCertified
ProgramProgram
A Guide to Certification
What are Internet certifications?
p. 800 Next
Require technical expertise inRequire technical expertise in
networking hardware andnetworking hardware and
configurationconfiguration
Include Web management, WebInclude Web management, Web
programming, and Webprogramming, and Web
development certificationsdevelopment certifications
CiscoCisco
CertifiedCertified
InternetworkInternetwork
ExpertExpert
(CCIE)(CCIE)
sponsored bysponsored by
CiscoCisco
CertifiedCertified
InternetInternet
WebmasterWebmaster
(CIW)(CIW)
sponsored bysponsored by
ProsoftProsoft
TrainingTraining
CertifiedCertified
WebWeb
ProfessionalProfessional
(CWP)(CWP)
sponsored bysponsored by
InternationalInternational
WebmastersWebmasters
AssociationAssociation
Click to view Web
Link, click Chapter 15,
Click Web Link from
left navigation, then
click Cisco Certified
Internetwork Expert below
Chapter 15
A Guide to Certification
What are database system certifications?
p. 800 Next
Awarded for knowledgeAwarded for knowledge
of a specific databaseof a specific database
management systemmanagement system
Test the various tasksTest the various tasks
a database managementa database management
staff must performstaff must perform
IBMIBM
CertifiedCertified
SolutionsSolutions
Expert–Expert–
InformixInformix
sponsored bysponsored by
IBMIBM
IBMIBM
CertifiedCertified
SolutionsSolutions
Expert–DB2Expert–DB2
sponsored bysponsored by
IBMIBM
MicrosoftMicrosoft
CertifiedCertified
DatabaseDatabase
AdministratorAdministrator
(MCDBA)(MCDBA)
sponsored bysponsored by
MicrosoftMicrosoft
SybaseSybase
CertifiedCertified
ProfessionalProfessional
sponsored bysponsored by
SybaseSybase
OracleOracle
CertifiedCertified
ProfessionalProfessional
sponsored bysponsored by
OracleOracle
Summary of Computer Careers and
Certification
Variety of available
computer-related careers
Variety of available
computer-related careers
Computer education at trade schools,
computer-related majors at colleges and
universities, job searches, career development
planning, professional organizations, and
professional growth
Computer education at trade schools,
computer-related majors at colleges and
universities, job searches, career development
planning, professional organizations, and
professional growth
Certification preparation,
examinations, and resources
Certification preparation,
examinations, and resources
Specific certificationsSpecific certifications
Chapter 15 Complete

More Related Content

What's hot

why Computer Science and It Career Job Opportunities
why Computer Science and It Career Job Opportunitieswhy Computer Science and It Career Job Opportunities
why Computer Science and It Career Job Opportunitiesparikshitkumar0695
 
Information Technology Careers
Information Technology CareersInformation Technology Careers
Information Technology CareersChad Warner
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICTKak Yong
 
Effective use of technology
Effective use of technology Effective use of technology
Effective use of technology murcha
 
Introduction to Computer Science
Introduction to Computer ScienceIntroduction to Computer Science
Introduction to Computer ScienceKalpit Jain
 
Career Opportunities in ICT
Career Opportunities in ICTCareer Opportunities in ICT
Career Opportunities in ICT3lykgala
 
Computer Science & Information Systems
Computer Science & Information SystemsComputer Science & Information Systems
Computer Science & Information SystemsLuis Borges Gouveia
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technologyAtifa Aqueel
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Power point final practical exam
Power point final practical examPower point final practical exam
Power point final practical examDenis Odhiambo
 
Introduction to visual basic programming
Introduction to visual basic programmingIntroduction to visual basic programming
Introduction to visual basic programmingRoger Argarin
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
why Computer Science and It Career Job Opportunities
why Computer Science and It Career Job Opportunitieswhy Computer Science and It Career Job Opportunities
why Computer Science and It Career Job Opportunities
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Information Technology Careers
Information Technology CareersInformation Technology Careers
Information Technology Careers
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Effective use of technology
Effective use of technology Effective use of technology
Effective use of technology
 
Introduction to Computer Science
Introduction to Computer ScienceIntroduction to Computer Science
Introduction to Computer Science
 
Career Opportunities in ICT
Career Opportunities in ICTCareer Opportunities in ICT
Career Opportunities in ICT
 
Computer Science & Information Systems
Computer Science & Information SystemsComputer Science & Information Systems
Computer Science & Information Systems
 
Cyber security
Cyber securityCyber security
Cyber security
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Scratch
ScratchScratch
Scratch
 
Cyber security
Cyber securityCyber security
Cyber security
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Power point final practical exam
Power point final practical examPower point final practical exam
Power point final practical exam
 
Introduction to visual basic programming
Introduction to visual basic programmingIntroduction to visual basic programming
Introduction to visual basic programming
 

Viewers also liked

Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Sachii Dosti
 
Café van Kherbache in beweging
Café van Kherbache in bewegingCafé van Kherbache in beweging
Café van Kherbache in bewegingThierry Debels
 
198_26_158406_1473292976_Veeam Management Pack VMSP v8
198_26_158406_1473292976_Veeam Management Pack VMSP v8198_26_158406_1473292976_Veeam Management Pack VMSP v8
198_26_158406_1473292976_Veeam Management Pack VMSP v8Heather Keel
 
Farooq Razzaque - Network Specialist
Farooq Razzaque - Network SpecialistFarooq Razzaque - Network Specialist
Farooq Razzaque - Network SpecialistFarooq Razzaque
 
Maltrato infantil en colombia
Maltrato infantil en colombiaMaltrato infantil en colombia
Maltrato infantil en colombiaalixovalleduran
 
クラウドでビックデータのスモールスタート
クラウドでビックデータのスモールスタートクラウドでビックデータのスモールスタート
クラウドでビックデータのスモールスタートYukihito Kataoka
 
わかる中級英文法 Grammar in Use Unit 93 関係節4 情報を追加する用法
わかる中級英文法 Grammar in Use Unit 93 関係節4 情報を追加する用法わかる中級英文法 Grammar in Use Unit 93 関係節4 情報を追加する用法
わかる中級英文法 Grammar in Use Unit 93 関係節4 情報を追加する用法iacer
 
Dreamforce '15のお話
Dreamforce '15のお話Dreamforce '15のお話
Dreamforce '15のお話tzm_freedom
 
わかる中級英文法 Grammar in Use Unit 102 比較1
わかる中級英文法 Grammar in Use Unit 102 比較1わかる中級英文法 Grammar in Use Unit 102 比較1
わかる中級英文法 Grammar in Use Unit 102 比較1iacer
 
what Identity-branding-
 what Identity-branding-  what Identity-branding-
what Identity-branding- Hideo Chikaike
 
第4回web技術勉強会 暗号技術編その2
第4回web技術勉強会 暗号技術編その2第4回web技術勉強会 暗号技術編その2
第4回web技術勉強会 暗号技術編その2tzm_freedom
 
わかる中級英文法 Grammar in Use Unit 80再帰代名詞
わかる中級英文法 Grammar in Use  Unit 80再帰代名詞わかる中級英文法 Grammar in Use  Unit 80再帰代名詞
わかる中級英文法 Grammar in Use Unit 80再帰代名詞iacer
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
メンテナブルPSD
メンテナブルPSDメンテナブルPSD
メンテナブルPSDHayato Mizuno
 
スタートアップのための初めてのCi(コーポレートアイデンティティ) mi編
スタートアップのための初めてのCi(コーポレートアイデンティティ) mi編スタートアップのための初めてのCi(コーポレートアイデンティティ) mi編
スタートアップのための初めてのCi(コーポレートアイデンティティ) mi編Hideo Chikaike
 
Emea nutanix overview presentation emea
Emea  nutanix overview presentation emeaEmea  nutanix overview presentation emea
Emea nutanix overview presentation emeaLan & Wan Solutions
 
わかる中級英文法 Grammar in Use Unit 62 (to, for, so that)
わかる中級英文法 Grammar in Use Unit 62  (to, for, so that)わかる中級英文法 Grammar in Use Unit 62  (to, for, so that)
わかる中級英文法 Grammar in Use Unit 62 (to, for, so that)iacer
 
{Ca} SDN NFV in wireless networks 2015 for LTE world Summit
{Ca} SDN NFV in wireless networks 2015 for LTE world Summit{Ca} SDN NFV in wireless networks 2015 for LTE world Summit
{Ca} SDN NFV in wireless networks 2015 for LTE world SummitPatrick Lopez
 

Viewers also liked (20)

Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 
Café van Kherbache in beweging
Café van Kherbache in bewegingCafé van Kherbache in beweging
Café van Kherbache in beweging
 
198_26_158406_1473292976_Veeam Management Pack VMSP v8
198_26_158406_1473292976_Veeam Management Pack VMSP v8198_26_158406_1473292976_Veeam Management Pack VMSP v8
198_26_158406_1473292976_Veeam Management Pack VMSP v8
 
Farooq Razzaque - Network Specialist
Farooq Razzaque - Network SpecialistFarooq Razzaque - Network Specialist
Farooq Razzaque - Network Specialist
 
Maltrato infantil en colombia
Maltrato infantil en colombiaMaltrato infantil en colombia
Maltrato infantil en colombia
 
クラウドでビックデータのスモールスタート
クラウドでビックデータのスモールスタートクラウドでビックデータのスモールスタート
クラウドでビックデータのスモールスタート
 
わかる中級英文法 Grammar in Use Unit 93 関係節4 情報を追加する用法
わかる中級英文法 Grammar in Use Unit 93 関係節4 情報を追加する用法わかる中級英文法 Grammar in Use Unit 93 関係節4 情報を追加する用法
わかる中級英文法 Grammar in Use Unit 93 関係節4 情報を追加する用法
 
Dreamforce '15のお話
Dreamforce '15のお話Dreamforce '15のお話
Dreamforce '15のお話
 
わかる中級英文法 Grammar in Use Unit 102 比較1
わかる中級英文法 Grammar in Use Unit 102 比較1わかる中級英文法 Grammar in Use Unit 102 比較1
わかる中級英文法 Grammar in Use Unit 102 比較1
 
Introduction to Security Fabric
Introduction to Security FabricIntroduction to Security Fabric
Introduction to Security Fabric
 
what Identity-branding-
 what Identity-branding-  what Identity-branding-
what Identity-branding-
 
第4回web技術勉強会 暗号技術編その2
第4回web技術勉強会 暗号技術編その2第4回web技術勉強会 暗号技術編その2
第4回web技術勉強会 暗号技術編その2
 
わかる中級英文法 Grammar in Use Unit 80再帰代名詞
わかる中級英文法 Grammar in Use  Unit 80再帰代名詞わかる中級英文法 Grammar in Use  Unit 80再帰代名詞
わかる中級英文法 Grammar in Use Unit 80再帰代名詞
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
メンテナブルPSD
メンテナブルPSDメンテナブルPSD
メンテナブルPSD
 
スタートアップのための初めてのCi(コーポレートアイデンティティ) mi編
スタートアップのための初めてのCi(コーポレートアイデンティティ) mi編スタートアップのための初めてのCi(コーポレートアイデンティティ) mi編
スタートアップのための初めてのCi(コーポレートアイデンティティ) mi編
 
CTAP
CTAPCTAP
CTAP
 
Emea nutanix overview presentation emea
Emea  nutanix overview presentation emeaEmea  nutanix overview presentation emea
Emea nutanix overview presentation emea
 
わかる中級英文法 Grammar in Use Unit 62 (to, for, so that)
わかる中級英文法 Grammar in Use Unit 62  (to, for, so that)わかる中級英文法 Grammar in Use Unit 62  (to, for, so that)
わかる中級英文法 Grammar in Use Unit 62 (to, for, so that)
 
{Ca} SDN NFV in wireless networks 2015 for LTE world Summit
{Ca} SDN NFV in wireless networks 2015 for LTE world Summit{Ca} SDN NFV in wireless networks 2015 for LTE world Summit
{Ca} SDN NFV in wireless networks 2015 for LTE world Summit
 

Similar to Computer career

Chapter15
Chapter15Chapter15
Chapter15Izaham
 
IT Career Development - An Introduction into the Industry
IT Career Development - An Introduction into the IndustryIT Career Development - An Introduction into the Industry
IT Career Development - An Introduction into the IndustryLawal Adekunle
 
香港六合彩
香港六合彩香港六合彩
香港六合彩weige
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal
 
Bachelor Of Information Technology Australia
Bachelor Of Information Technology Australia Bachelor Of Information Technology Australia
Bachelor Of Information Technology Australia viteduau
 
IT Global Certification
IT Global CertificationIT Global Certification
IT Global CertificationSuresh Patel
 
AIESEC UK IT Sub-Products 2013.14
AIESEC UK IT Sub-Products 2013.14AIESEC UK IT Sub-Products 2013.14
AIESEC UK IT Sub-Products 2013.14Nicola Wilson
 
The Internet of Flying Things - Part 2
The Internet of Flying Things - Part 2The Internet of Flying Things - Part 2
The Internet of Flying Things - Part 2Michael Denis
 
MTB_REPORT_WIPRO_0406
MTB_REPORT_WIPRO_0406MTB_REPORT_WIPRO_0406
MTB_REPORT_WIPRO_0406Elliot Tally
 
The 20 Best IT Jobs for 2013 and Beyond
The 20 Best IT Jobs for 2013 and BeyondThe 20 Best IT Jobs for 2013 and Beyond
The 20 Best IT Jobs for 2013 and BeyondMark Paszkowiak ☁
 
Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"Peter Coffee
 
Types of Computer Degrees
Types of Computer DegreesTypes of Computer Degrees
Types of Computer DegreesDavidM4
 
International Business Strategy Plan for a new or an emerging Start Up
International Business Strategy Plan for a new or an emerging Start Up International Business Strategy Plan for a new or an emerging Start Up
International Business Strategy Plan for a new or an emerging Start Up Chandandeep Singh
 
Business Plan Sample
Business Plan SampleBusiness Plan Sample
Business Plan SampleNitesh Verma
 
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application IntegrationGuidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application IntegrationBrianPetrini
 
Computer & network administration, cyber security it training course programs...
Computer & network administration, cyber security it training course programs...Computer & network administration, cyber security it training course programs...
Computer & network administration, cyber security it training course programs...CCI Training Center
 

Similar to Computer career (20)

Chapter15
Chapter15Chapter15
Chapter15
 
Computer Information Sciences Careers
Computer Information Sciences CareersComputer Information Sciences Careers
Computer Information Sciences Careers
 
IT Career Development - An Introduction into the Industry
IT Career Development - An Introduction into the IndustryIT Career Development - An Introduction into the Industry
IT Career Development - An Introduction into the Industry
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Bachelor Of Information Technology Australia
Bachelor Of Information Technology Australia Bachelor Of Information Technology Australia
Bachelor Of Information Technology Australia
 
IT Global Certification
IT Global CertificationIT Global Certification
IT Global Certification
 
AIESEC UK IT Sub-Products 2013.14
AIESEC UK IT Sub-Products 2013.14AIESEC UK IT Sub-Products 2013.14
AIESEC UK IT Sub-Products 2013.14
 
The Internet of Flying Things - Part 2
The Internet of Flying Things - Part 2The Internet of Flying Things - Part 2
The Internet of Flying Things - Part 2
 
MTB_REPORT_WIPRO_0406
MTB_REPORT_WIPRO_0406MTB_REPORT_WIPRO_0406
MTB_REPORT_WIPRO_0406
 
The 20 Best IT Jobs for 2013 and Beyond
The 20 Best IT Jobs for 2013 and BeyondThe 20 Best IT Jobs for 2013 and Beyond
The 20 Best IT Jobs for 2013 and Beyond
 
Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"
 
Types of Computer Degrees
Types of Computer DegreesTypes of Computer Degrees
Types of Computer Degrees
 
International Business Strategy Plan for a new or an emerging Start Up
International Business Strategy Plan for a new or an emerging Start Up International Business Strategy Plan for a new or an emerging Start Up
International Business Strategy Plan for a new or an emerging Start Up
 
Business proposalpdf2
Business proposalpdf2Business proposalpdf2
Business proposalpdf2
 
Getting ready for the cloud sukhbir jasuja
Getting ready for the cloud sukhbir jasujaGetting ready for the cloud sukhbir jasuja
Getting ready for the cloud sukhbir jasuja
 
Aditya Bhargava
Aditya BhargavaAditya Bhargava
Aditya Bhargava
 
Business Plan Sample
Business Plan SampleBusiness Plan Sample
Business Plan Sample
 
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application IntegrationGuidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
 
Computer & network administration, cyber security it training course programs...
Computer & network administration, cyber security it training course programs...Computer & network administration, cyber security it training course programs...
Computer & network administration, cyber security it training course programs...
 

More from Dhani Ahmad

Strategic planning
Strategic planningStrategic planning
Strategic planningDhani Ahmad
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planningDhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and recordsDhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behaviorDhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information managementDhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islamDhani Ahmad
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management iDhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 

More from Dhani Ahmad (20)

Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Information system
Information systemInformation system
Information system
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
The need for security
The need for securityThe need for security
The need for security
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy
Security policySecurity policy
Security policy
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Secure
SecureSecure
Secure
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Computer career

  • 2. Chapter 15 Objectives Describe career opportunities available in various segments of the computer industry Describe career opportunities available in various segments of the computer industry Discuss functions of jobs available in an IT department Discuss functions of jobs available in an IT department Distinguish between trade schools and colleges Distinguish between trade schools and colleges Differentiate among various computer- related majors for college students Differentiate among various computer- related majors for college students Identify ways to stay current with changing technology after graduation Identify ways to stay current with changing technology after graduation List the benefits of certification for employers, employees, and vendors List the benefits of certification for employers, employees, and vendors Identify ways to prepare for certificationIdentify ways to prepare for certification List the general areas of IT certificationList the general areas of IT certification Next Name some specific IT certifications in each certification area Name some specific IT certifications in each certification area
  • 3. The Computer Industry What is the expected demand for computer professionals? Nextp. 776 Fig. 15-1  Currently 10.5 million computer workers with expected increase of 2 to 3% annually  The number of students majoring in computer-related fields is declining
  • 4. Careers in the Computer Industry What are the primary areas where job opportunities are found? p. 778 Next Computer sales Computer education and training field General business and government organizations Computer equipment field Computer software field IT consulting field Computer service and repair field
  • 5. Careers in the Computer Industry What is an information technology (IT) department? p. 778 Fig. 15-2 Next  Department in business or government agency that employs people in computer-related jobs  Responsible for keeping all computer operations and networks operating smoothly
  • 6. Working in an IT Department What jobs are available in an IT department? p. 780 - 781 Next ManagementManagementManagementManagement Chief InformationChief Information Officer / VP of ITOfficer / VP of IT Chief Security OfficerChief Security Officer E-commerceE-commerce administratoradministrator Network administratorNetwork administrator ApplicationApplication programmerprogrammer Software engineerSoftware engineer Systems analystSystems analystComputer scientistComputer scientist Systems programmerSystems programmerDatabase analystDatabase analyst Technical writerTechnical writer Web page authorWeb page author Computer operatorComputer operator DataData communications analystcommunications analyst Corporate trainerCorporate trainer Help desk specialistHelp desk specialist Computer forensicsComputer forensics specialistspecialist Computer technicianComputer technician Graphic designer /Graphic designer / illustratorillustrator Network securityNetwork security specialistspecialistDatabase administratorDatabase administrator Quality assuranceQuality assurance specialistspecialist Desktop publisherDesktop publisher Security administratorSecurity administrator SystemSystem developmentdevelopment andand programmingprogramming SystemSystem developmentdevelopment andand programmingprogramming TechnicalTechnical servicesservices TechnicalTechnical servicesservices OperationsOperationsOperationsOperations TrainingTrainingTrainingTraining Project leader / managerProject leader / manager Web administrator /Web administrator / WebmasterWebmaster Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click Computer Career Salaries below Chapter 15
  • 7. Careers in the Computer Industry What is the computer equipment field? p. 782 Fig. 15-4 Next  Manufacturers and distributors of computers and computer-related hardware  Careers involve design, manufacture, and production of computer equipment
  • 8. Careers in the Computer Industry What is the computer software field? p. 782 - 783 Next Computer scientist researches, invents, and develops solutions to complex software problems Project leader analyzes requirements, designs solutions, and oversees software development process Companies that develop, manufacture, and support software Programmer writes and tests computer programs Software engineer designs and develops software Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click Computer Scientists below Chapter 15
  • 9. Careers in the Computer Industry What is the computer service and repair field? p. 783 Fig. 15-5 Next  Provides preventative maintenance, component installation, and repair services  Computer technician— installs, maintains, and repairs hardware
  • 10. Careers in the Computer Industry What are career opportunities in computer sales? p. 783 - 784 Fig. 15-6 Next  Computer salespeople need general understanding of computers and specific knowledge of the product they are selling
  • 11. Careers in the Computer Industry What are career opportunities in education and training? p. 784 Fig. 15-7 Next  Schools, colleges, universities, and private companies need educators and trainers  Corporate trainers teach employees how to use software, design and develop systems, and program
  • 12. Careers in the Computer Industry What is an IT consultant? p. 784 Next Individual who draws upon expertise in specialized area of computers ComputerComputer selectionselection SystemSystem designdesign Hardware andHardware and softwaresoftware configurationconfiguration Network designNetwork design and installationand installation CommunicationsCommunications WebWeb developmentdevelopment Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click IT Consultants below Chapter 15
  • 13. Preparing for a Career in the Computer Industry What is a trade school? p. 785 Next Offers programs inOffers programs in programming, Webprogramming, Web development, graphicdevelopment, graphic design, hardwaredesign, hardware maintenance,maintenance, networking,networking, PC support,PC support, andand securitysecurity Students can completeStudents can complete trade school programstrade school programs in shorter timein shorter time than collegethan college or universityor university programsprograms Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click Trade Schools below Chapter 15
  • 14. Preparing for a Career in the Computer Industry What are the three broad disciplines in higher education that produce the majority of entry-level employees in the computer industry? p. 786 Fig. 15-8 Next Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click College Computer Majors below Chapter 15
  • 15. Preparing for a Career in the Computer Industry What is computer information systems (CIS)? p. 786 Next  Programs that emphasize technical knowledge and skills  Sometimes called management information systems (MIS) or management information technology
  • 16. Preparing for a Career in the Computer Industry What is computer science (CS)? p. 786 Next  Programs that stress theoretical side of programming and operating systems  Also called software engineering
  • 17. Preparing for a Career in the Computer Industry How do companies advertise computer-related job openings? p. 788 Fig. 15-10 Next  Some Web sites specialized in helping people find jobs  Some allow job seekers to submit resumes online
  • 18. Preparing for a Career in the Computer Industry What are some organizations for computer professionals? p. 789 Fig. 15-11 Next  Association for Computing Machinery (ACM)— science-oriented  Association of Information Technology Professionals (AITP)— programmers, systems analysts, and information processing managers
  • 19. Preparing for a Career in the Computer Industry What is a user group? p. 790 Fig. 15-12 Next  Collection of people with common computer equipment or software interests
  • 20. Preparing for a Career in the Computer Industry What is professional growth and continuing education? p. 790 Fig. 15-13 Next  Events such as workshops, seminars, conferences, conventions, and trade shows  CES—trade show that brings together hundreds of vendors and more than 130,000 attendees  Training in form of books, video-based training, computer-based training (CBT), Web-based training (WBT), and instructor-led trainingClick to view Web Link, click Chapter 15, Click Web Link from left navigation, then click International Consumer Electronics Show below Chapter 15
  • 21. Preparing for a Career in the Computer Industry How can you stay informed about the computer industry? p. 791 Figs. 15-14–15-15 Next  Computer industry publications  News, blogs, and technical Web sites
  • 22. Certification What is certification? p. 792 Next  Process of verifying technical knowledge in a particular area  Proficiency is acknowledged with certificate
  • 23. Certification What are the benefits of certification? p. 792 Fig. 15-16 Next  Enhances employee’s career, provides better standing as industry professional, and higher salaries and bonuses
  • 24. Certification What are benefits of vendor-sponsored certification? p. 793 Fig. 15-17 Next  Vendors provide access to technical information, advanced training, and discounts on publications and tools
  • 25. Certification How does certification benefit customers, employers, and industry? p. 793 Next Institute for Certification of Computer Professionals (ICCP) defines standards designed to raise competence level for computer industry Employers benefit from more productive and knowledgeable workers Certification is a form of industry self-regulation Customers receive better service from employees with certification(s) Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click Institute for the Certification of Computing Professionals below Chapter 15
  • 26. Certification What are factors to consider in choosing a certification? p. 794 Fig. 15-18 Next
  • 27. Certification What options are available to prepare for certification? p. 794 Next Self-studySelf-study Online training classesOnline training classes Instructor-led trainingInstructor-led training Web resourcesWeb resources Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click Instructor-Led Certification Classes below Chapter 15
  • 28. Certification What are examinations like? p. 795 Fig. 15-19 Next  Taken using computers  Some are multiple choice, others are skill based  With computerized adaptive testing, the tests analyze a person’s responses while taking the test
  • 29. A Guide to Certification What are application software certifications? p. 796 Next Focus on knowledge ofFocus on knowledge of application softwareapplication software Sometimes calledSometimes called end-user certificationsend-user certifications MicrosoftMicrosoft CertifiedCertified DesktopDesktop SupportSupport TechnicianTechnician (MCDST)(MCDST) sponsored bysponsored by MicrosoftMicrosoft MicrosoftMicrosoft OfficeOffice SpecialistSpecialist (MOS)(MOS) sponsored bysponsored by MicrosoftMicrosoft AdobeAdobe CertifiedCertified ExpertExpert sponsored bysponsored by AdobeAdobe SystemsSystems MacromediaMacromedia CertifiedCertified ProfessionalProfessional sponsored bysponsored by MacromediaMacromedia IBM CertifiedIBM Certified ProfessionalProfessional for Lotusfor Lotus SoftwareSoftware sponsored bysponsored by IBMIBM Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click Microsoft Office Specialist below Chapter 15
  • 30. A Guide to Certification What are operating system certifications? p. 797 Next Focus on particular skills—user,Focus on particular skills—user, operator, system administrator,operator, system administrator, and system engineerand system engineer Differing levels of certificationDiffering levels of certification Red HatRed Hat CertifiedCertified EngineerEngineer (RHCE)(RHCE) sponsored bysponsored by Red HatRed Hat MicrosoftMicrosoft CertifiedCertified ProfessionalProfessional (MCP)(MCP) sponsored bysponsored by MicrosoftMicrosoft Red HatRed Hat CertifiedCertified TechnicianTechnician (RHCT)(RHCT) sponsored bysponsored by Red HatRed Hat IBM CertifiedIBM Certified SpecialistSpecialist sponsored bysponsored by IBMIBM Sun CertifiedSun Certified SystemSystem AdministratorAdministrator sponsored bysponsored by SunSun
  • 31. A Guide to Certification What are programming certifications? p. 797 Next Recognition of programming trainingRecognition of programming training Broadens knowledge and skill baseBroadens knowledge and skill base IBM CertifiedIBM Certified SolutionSolution DeveloperDeveloper sponsored bysponsored by IBMIBM CertifiedCertified SoftwareSoftware DevelopmentDevelopment ProfessionalProfessional (CSDP)(CSDP) sponsored bysponsored by IEEEIEEE ComputerComputer SocietySociety MicrosoftMicrosoft CertifiedCertified SolutionSolution DeveloperDeveloper (MCSD)(MCSD) sponsored bysponsored by MicrosoftMicrosoft MicrosoftMicrosoft CertifiedCertified ApplicationApplication DeveloperDeveloper (MCAD)(MCAD) sponsored bysponsored by MicrosoftMicrosoft Sun CertifiedSun Certified JavaJava DeveloperDeveloper sponsored bysponsored by SunSun Sun CertifiedSun Certified EnterpriseEnterprise ArchitectArchitect sponsored bysponsored by SunSun Sun CertifiedSun Certified ProgrammerProgrammer sponsored bysponsored by SunSun
  • 32. A Guide to Certification What are hardware certifications? p. 798 Next Recognition of general knowledgeRecognition of general knowledge of hardware and controllingof hardware and controlling software needed to set up, maintain,software needed to set up, maintain, and repair a computerand repair a computer Can be narrowly orCan be narrowly or broadly focusedbroadly focused IBMIBM eServereServer CertifiedCertified SpecialistSpecialist sponsored bysponsored by IBMIBM A+A+ sponsored bysponsored by ComputingComputing TechnologyTechnology IndustryIndustry AssociationAssociation (CompTIA)(CompTIA) NACSENACSE NetworkNetwork TechnicianTechnician (NNT)(NNT) sponsored bysponsored by NationalNational Association ofAssociation of CommunicationCommunication SystemsSystems EngineersEngineers (NACSE)(NACSE) Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click A+ Certification below Chapter 15
  • 33. A Guide to Certification What are networking certifications? p. 798 Next Awarded to professionals who demonstrate expertise in planning,Awarded to professionals who demonstrate expertise in planning, installing, managing, and troubleshooting a networkinstalling, managing, and troubleshooting a network CertifiedCertified NovellNovell EngineerEngineer (CNE)(CNE) sponsored bysponsored by NovellNovell CertifiedCertified NovellNovell AdministratorAdministrator (CNA)(CNA) sponsored bysponsored by NovellNovell CiscoCisco CertifiedCertified NetworkNetwork ProfessionalProfessional (CCNP)(CCNP) sponsored bysponsored by CiscoCisco Sun CertifiedSun Certified NetworkNetwork AdministratorAdministrator sponsored bysponsored by SunSun Network+Network+ sponsored bysponsored by ComputingComputing TechnologyTechnology IndustryIndustry AssociationAssociation (CompTIA)(CompTIA) Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click Certified Novell Administrator below Chapter 15
  • 34. A Guide to Certification What are computer forensics certifications? p. 799 Next Discovery, collection, and analysis ofDiscovery, collection, and analysis of evidence found on computers andevidence found on computers and networksnetworks Certificate holds are consideredCertificate holds are considered highly credible during computerhighly credible during computer crimes casescrimes cases CertifiedCertified ForensicForensic ComputerComputer ExaminerExaminer (CFCE)(CFCE) sponsored bysponsored by InternationalInternational Association ofAssociation of ComputerComputer InvestigativeInvestigative SpecialistsSpecialists (IACIS)(IACIS) CertifiedCertified ElectronicElectronic EvidenceEvidence CollectionCollection SpecialistSpecialist (CEECS)(CEECS) sponsored bysponsored by InternationalInternational Association ofAssociation of ComputerComputer InvestigativeInvestigative SpecialistsSpecialists (IACIS)(IACIS) CertifiedCertified ComputerComputer ExaminerExaminer (CCE)(CCE) sponsored bysponsored by InternationalInternational Society ofSociety of ForensicForensic ComputerComputer ExaminersExaminers (ISFCE)(ISFCE)
  • 35. A Guide to Certification What are security certifications? p. 799 Next Measure a candidate’s ability to identify and control securityMeasure a candidate’s ability to identify and control security risks to computer resourcesrisks to computer resources SystemsSystems SecuritySecurity CertifiedCertified PractitionerPractitioner (SSCP)(SSCP) sponsored bysponsored by (ISC)(ISC)22 CertifiedCertified InformationInformation SecuritySecurity ProfessionalProfessional (CISSP)(CISSP) sponsored bysponsored by (ISC)(ISC)22 SecuritySecurity CertifiedCertified NetworkNetwork ProfessionalProfessional (SCNP)(SCNP) sponsored bysponsored by The SecurityThe Security CertifiedCertified ProgramProgram SecuritySecurity CertifiedCertified NetworkNetwork ArchitectArchitect (SCNA)(SCNA) sponsored bysponsored by The SecurityThe Security CertifiedCertified ProgramProgram
  • 36. A Guide to Certification What are Internet certifications? p. 800 Next Require technical expertise inRequire technical expertise in networking hardware andnetworking hardware and configurationconfiguration Include Web management, WebInclude Web management, Web programming, and Webprogramming, and Web development certificationsdevelopment certifications CiscoCisco CertifiedCertified InternetworkInternetwork ExpertExpert (CCIE)(CCIE) sponsored bysponsored by CiscoCisco CertifiedCertified InternetInternet WebmasterWebmaster (CIW)(CIW) sponsored bysponsored by ProsoftProsoft TrainingTraining CertifiedCertified WebWeb ProfessionalProfessional (CWP)(CWP) sponsored bysponsored by InternationalInternational WebmastersWebmasters AssociationAssociation Click to view Web Link, click Chapter 15, Click Web Link from left navigation, then click Cisco Certified Internetwork Expert below Chapter 15
  • 37. A Guide to Certification What are database system certifications? p. 800 Next Awarded for knowledgeAwarded for knowledge of a specific databaseof a specific database management systemmanagement system Test the various tasksTest the various tasks a database managementa database management staff must performstaff must perform IBMIBM CertifiedCertified SolutionsSolutions Expert–Expert– InformixInformix sponsored bysponsored by IBMIBM IBMIBM CertifiedCertified SolutionsSolutions Expert–DB2Expert–DB2 sponsored bysponsored by IBMIBM MicrosoftMicrosoft CertifiedCertified DatabaseDatabase AdministratorAdministrator (MCDBA)(MCDBA) sponsored bysponsored by MicrosoftMicrosoft SybaseSybase CertifiedCertified ProfessionalProfessional sponsored bysponsored by SybaseSybase OracleOracle CertifiedCertified ProfessionalProfessional sponsored bysponsored by OracleOracle
  • 38. Summary of Computer Careers and Certification Variety of available computer-related careers Variety of available computer-related careers Computer education at trade schools, computer-related majors at colleges and universities, job searches, career development planning, professional organizations, and professional growth Computer education at trade schools, computer-related majors at colleges and universities, job searches, career development planning, professional organizations, and professional growth Certification preparation, examinations, and resources Certification preparation, examinations, and resources Specific certificationsSpecific certifications Chapter 15 Complete