SlideShare a Scribd company logo
1 of 14
Welcome
to
Operating System (OS)
• Set of software that manages the hardware and
provides services to computer programs.
• Cycle Hardware<OS<Application<User.
• Real-time OS are for executing real-time applications
• It is predictable response to Events. Has two aspects:
a) Event Driven b) Time Sharing
• Distributed OS: Many appear as 1 computer
• Embedded OS: For embedded computer System.
Different Operating Systems
• Unix: All Console
• Linux: GUI of Linux
• Mac: As known
• Windows: As known
• Android: Mobile OS, Linux wrapped in Java
• AIX: Customized Unix by IBM
• HP-UX: Customized Unix by HP
• Solaris: Customized Unix by Sun Microsystems
Architecture (Kernel OS)
OSI Model For Networking
OSI vs Internet
Middleware
• Computer Software that provides services to
software applications beyond Operating System.
• It makes it easier for developer to perform
communication (I/O) so that they focus on
purpose of application.
• Communication & Mgmt of data ‘Dash in client-
server’
• Software layer that lies between OS &
Application.
Development Skills
• Languages: Assembly, C, C++, Java, .Net
• Difference between C & C++.
• OOPS
• Module Prog. & S/W architecture.
• Algorithm & its Optimization.
• Scripting: Perl, Shell, Tcl, Python.
Software Testing
• Black-Box Testing: Internal System design not considered but based on
Requirement and functionality. (Not so strong).
• White-Box Testing: Internal Logic, mainly codes (Strong).
• Unit Testing: Components & modules.
• Integration Testing: Bottom Up approach.
• Functional Testing: Output as per Req.
• System Testing: Entire system is tested as per requirement.
• End to End Testing: Similar to System, but involves real world testing
(database,network,hardware).
• Sanity Testing: Testing of Software versions.
• Regression Testing: Testing whole application if any change in module or
functionality.
• Acceptance Testing: System meeting customer requirements.
• Load Testing: Testing system under load.
• Stress Testing: System is stressed beyond its application.(data,query,connections).
• Performance Testing: How system performing under different loads.
• Usability Testing: Is customer understanding the system.
• Install/Uninstall testing: Recovery from
crash and hardware failure.
• Security Testing: Penetrating via hacking.
• Compatibility Testing: Working on all
platforms.
• Manual Testing: Strong/Values.
• Automation Testing: Test
cases,Scripting,Automation.
Security Concepts
• IPSec: Internet Security Protocol is a
protocol suite for securing IP by:
a) Authentication
b) Encrypting each IPv4 & v6 packet
• Works on Internet Layer or Upper Layer.
• SSL: Secure Socket Layer
• TLS: Transport Layer Security
• SSH: Secure Shell
IPSec Uses Following Protocols
• Authentication Header
• Encapsulating Security Payloads (ESP).
• Security Associations.
• Common Terms:
• Algorithm, Intergrity, Authentication, Keys,
Encapsulation,Encryption,Protocols.
Thanks
Any Questions?

More Related Content

What's hot

Unified Deployment: Including the Mainframe in Enterprise DevOps
Unified Deployment: Including the Mainframe in Enterprise DevOpsUnified Deployment: Including the Mainframe in Enterprise DevOps
Unified Deployment: Including the Mainframe in Enterprise DevOpsCompuware
 
Acquia presented at MassTLC event on automated testing
Acquia presented at MassTLC event on automated testingAcquia presented at MassTLC event on automated testing
Acquia presented at MassTLC event on automated testingMassTLC
 
Training Slides: 103 - Basics - Simple Tungsten Clustering Installation
Training Slides: 103 - Basics - Simple Tungsten Clustering InstallationTraining Slides: 103 - Basics - Simple Tungsten Clustering Installation
Training Slides: 103 - Basics - Simple Tungsten Clustering InstallationContinuent
 
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...EmbeddedFest
 
Migrate in One Step (05.15.2013)
Migrate in One Step (05.15.2013)Migrate in One Step (05.15.2013)
Migrate in One Step (05.15.2013)AppZero Inc
 
openSUSE Virtual Summit 2020 - openSUSE maintenance
openSUSE Virtual Summit 2020 - openSUSE maintenanceopenSUSE Virtual Summit 2020 - openSUSE maintenance
openSUSE Virtual Summit 2020 - openSUSE maintenanceMarina Latini
 
Engineering-Best-Practices
Engineering-Best-PracticesEngineering-Best-Practices
Engineering-Best-PracticesGaurav Kumkar
 
Continuous Integration - Mobile Practice
Continuous Integration - Mobile PracticeContinuous Integration - Mobile Practice
Continuous Integration - Mobile PracticeHARMAN Services
 
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...Designing a Highly Available Environment Using Methods of Modern IT Infrastru...
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...Perforce
 
Building large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor frameworkBuilding large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor frameworkVignesh Sukumar
 
Correlation Composer for HP OpenView Operations
Correlation Composer for HP OpenView OperationsCorrelation Composer for HP OpenView Operations
Correlation Composer for HP OpenView OperationsStefan Bergstein
 
A Byte of Software Deployment
A Byte of Software DeploymentA Byte of Software Deployment
A Byte of Software DeploymentGong Haibing
 
Will ServerLess kill containers and Operations
Will ServerLess kill containers and OperationsWill ServerLess kill containers and Operations
Will ServerLess kill containers and OperationsStephane Woillez
 
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deployments
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deploymentsJohan Arwidmark - Troubleshooting SCCM 2012 R2 OS deployments
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deploymentsNordic Infrastructure Conference
 
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast Compuware
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice ArchitectureEngin Yoeyen
 

What's hot (19)

Unified Deployment: Including the Mainframe in Enterprise DevOps
Unified Deployment: Including the Mainframe in Enterprise DevOpsUnified Deployment: Including the Mainframe in Enterprise DevOps
Unified Deployment: Including the Mainframe in Enterprise DevOps
 
Acquia presented at MassTLC event on automated testing
Acquia presented at MassTLC event on automated testingAcquia presented at MassTLC event on automated testing
Acquia presented at MassTLC event on automated testing
 
Training Slides: 103 - Basics - Simple Tungsten Clustering Installation
Training Slides: 103 - Basics - Simple Tungsten Clustering InstallationTraining Slides: 103 - Basics - Simple Tungsten Clustering Installation
Training Slides: 103 - Basics - Simple Tungsten Clustering Installation
 
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...
 
Migrate in One Step (05.15.2013)
Migrate in One Step (05.15.2013)Migrate in One Step (05.15.2013)
Migrate in One Step (05.15.2013)
 
openSUSE Virtual Summit 2020 - openSUSE maintenance
openSUSE Virtual Summit 2020 - openSUSE maintenanceopenSUSE Virtual Summit 2020 - openSUSE maintenance
openSUSE Virtual Summit 2020 - openSUSE maintenance
 
Engineering-Best-Practices
Engineering-Best-PracticesEngineering-Best-Practices
Engineering-Best-Practices
 
virtualization
virtualizationvirtualization
virtualization
 
Continuous Integration - Mobile Practice
Continuous Integration - Mobile PracticeContinuous Integration - Mobile Practice
Continuous Integration - Mobile Practice
 
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...Designing a Highly Available Environment Using Methods of Modern IT Infrastru...
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...
 
Building large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor frameworkBuilding large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor framework
 
Selenium Automation
Selenium AutomationSelenium Automation
Selenium Automation
 
Correlation Composer for HP OpenView Operations
Correlation Composer for HP OpenView OperationsCorrelation Composer for HP OpenView Operations
Correlation Composer for HP OpenView Operations
 
Erlang/Elixir and OTP
Erlang/Elixir and OTPErlang/Elixir and OTP
Erlang/Elixir and OTP
 
A Byte of Software Deployment
A Byte of Software DeploymentA Byte of Software Deployment
A Byte of Software Deployment
 
Will ServerLess kill containers and Operations
Will ServerLess kill containers and OperationsWill ServerLess kill containers and Operations
Will ServerLess kill containers and Operations
 
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deployments
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deploymentsJohan Arwidmark - Troubleshooting SCCM 2012 R2 OS deployments
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deployments
 
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice Architecture
 

Viewers also liked

الوحدة السابعة (1)
الوحدة السابعة (1)الوحدة السابعة (1)
الوحدة السابعة (1)Saif Eddin
 
מאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםמאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםZachi Berger, Ph.D. MBA
 
الوحدة التاسعة
الوحدة التاسعةالوحدة التاسعة
الوحدة التاسعةSaif Eddin
 
PERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGEPERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGEsoft-point
 
Vishwanath_M_CV_NL
Vishwanath_M_CV_NLVishwanath_M_CV_NL
Vishwanath_M_CV_NLVishwanath M
 
Resume Bhavesh Amin
Resume Bhavesh AminResume Bhavesh Amin
Resume Bhavesh AminBhavesh Amin
 
المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر dr yetkin bayer
 
Tools to ensure quality of information system
Tools to ensure quality of information system Tools to ensure quality of information system
Tools to ensure quality of information system soft-point
 
الوحدة الحادية عشرة
الوحدة الحادية عشرةالوحدة الحادية عشرة
الوحدة الحادية عشرةSaif Eddin
 
Qualitative operation of IT systems
Qualitative operation of IT systemsQualitative operation of IT systems
Qualitative operation of IT systemssoft-point
 
DB REPLICATION
DB REPLICATIONDB REPLICATION
DB REPLICATIONsoft-point
 
как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...soft-point
 

Viewers also liked (20)

Canvas Miami
Canvas MiamiCanvas Miami
Canvas Miami
 
الوحدة السابعة (1)
الوحدة السابعة (1)الوحدة السابعة (1)
الوحدة السابعة (1)
 
מאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםמאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגיים
 
الوحدة التاسعة
الوحدة التاسعةالوحدة التاسعة
الوحدة التاسعة
 
Referencing
ReferencingReferencing
Referencing
 
PERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGEPERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGE
 
Vishwanath_M_CV_NL
Vishwanath_M_CV_NLVishwanath_M_CV_NL
Vishwanath_M_CV_NL
 
Resume Bhavesh Amin
Resume Bhavesh AminResume Bhavesh Amin
Resume Bhavesh Amin
 
المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر
 
Imran CV
Imran CVImran CV
Imran CV
 
Tools to ensure quality of information system
Tools to ensure quality of information system Tools to ensure quality of information system
Tools to ensure quality of information system
 
NRI Services
NRI Services NRI Services
NRI Services
 
Keidan Presentation 2016 + video
Keidan Presentation 2016 + videoKeidan Presentation 2016 + video
Keidan Presentation 2016 + video
 
Maor Patent PCT
Maor Patent PCTMaor Patent PCT
Maor Patent PCT
 
الوحدة الحادية عشرة
الوحدة الحادية عشرةالوحدة الحادية عشرة
الوحدة الحادية عشرة
 
Qualitative operation of IT systems
Qualitative operation of IT systemsQualitative operation of IT systems
Qualitative operation of IT systems
 
DB REPLICATION
DB REPLICATIONDB REPLICATION
DB REPLICATION
 
как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...
 
PEEFEXPERT
PEEFEXPERTPEEFEXPERT
PEEFEXPERT
 
DATA EXCHANGE
DATA EXCHANGEDATA EXCHANGE
DATA EXCHANGE
 

Similar to Computer Fundamentals

IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best PracticesPrecisely
 
Lecture 4.pptx
Lecture 4.pptxLecture 4.pptx
Lecture 4.pptxsara591850
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1Lahav Savir
 
Towards Continuous Delivery in Mobile Apps
Towards Continuous Delivery in Mobile AppsTowards Continuous Delivery in Mobile Apps
Towards Continuous Delivery in Mobile AppsPhillip Wheatley
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeDenis Gundarev
 
1 artem mygaiev - testing open-source software in embedded devices
1   artem mygaiev - testing open-source software in embedded devices1   artem mygaiev - testing open-source software in embedded devices
1 artem mygaiev - testing open-source software in embedded devicesIevgenii Katsan
 
Open Audit
Open AuditOpen Audit
Open Auditncspa
 
Lecture 1-vs.pptx.......................
Lecture 1-vs.pptx.......................Lecture 1-vs.pptx.......................
Lecture 1-vs.pptx.......................HassamShahid2
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE PrashantChahal3
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5FRSecure
 
Computer system organization
Computer system organizationComputer system organization
Computer system organizationSyed Zaid Irshad
 
Chap1
Chap1Chap1
Chap1adisi
 
Operating system components
Operating system componentsOperating system components
Operating system componentsSyed Zaid Irshad
 
20140708 - Jeremy Edberg: How Netflix Delivers Software
20140708 - Jeremy Edberg: How Netflix Delivers Software20140708 - Jeremy Edberg: How Netflix Delivers Software
20140708 - Jeremy Edberg: How Netflix Delivers SoftwareDevOps Chicago
 
Digital literacy 1 b operating systems
Digital literacy 1 b operating systemsDigital literacy 1 b operating systems
Digital literacy 1 b operating systemsmrspetty19
 

Similar to Computer Fundamentals (20)

Introducing AWS Device Farm
Introducing AWS Device FarmIntroducing AWS Device Farm
Introducing AWS Device Farm
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best Practices
 
Lecture 4.pptx
Lecture 4.pptxLecture 4.pptx
Lecture 4.pptx
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1
 
Towards Continuous Delivery in Mobile Apps
Towards Continuous Delivery in Mobile AppsTowards Continuous Delivery in Mobile Apps
Towards Continuous Delivery in Mobile Apps
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
 
1 artem mygaiev - testing open-source software in embedded devices
1   artem mygaiev - testing open-source software in embedded devices1   artem mygaiev - testing open-source software in embedded devices
1 artem mygaiev - testing open-source software in embedded devices
 
Open Audit
Open AuditOpen Audit
Open Audit
 
Lecture 1-vs.pptx.......................
Lecture 1-vs.pptx.......................Lecture 1-vs.pptx.......................
Lecture 1-vs.pptx.......................
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
os_1.pdf
os_1.pdfos_1.pdf
os_1.pdf
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
Computer system organization
Computer system organizationComputer system organization
Computer system organization
 
Simics - Break the Rules of Product Development
Simics - Break the Rules of Product DevelopmentSimics - Break the Rules of Product Development
Simics - Break the Rules of Product Development
 
Chap1
Chap1Chap1
Chap1
 
Operating system components
Operating system componentsOperating system components
Operating system components
 
20140708 - Jeremy Edberg: How Netflix Delivers Software
20140708 - Jeremy Edberg: How Netflix Delivers Software20140708 - Jeremy Edberg: How Netflix Delivers Software
20140708 - Jeremy Edberg: How Netflix Delivers Software
 
Ch 2
Ch 2Ch 2
Ch 2
 
Digital literacy 1 b operating systems
Digital literacy 1 b operating systemsDigital literacy 1 b operating systems
Digital literacy 1 b operating systems
 

More from ashishsharma1506

More from ashishsharma1506 (6)

Referencing
ReferencingReferencing
Referencing
 
Technology Fundamentals
Technology FundamentalsTechnology Fundamentals
Technology Fundamentals
 
Networking & Security Fundamentals
Networking & Security FundamentalsNetworking & Security Fundamentals
Networking & Security Fundamentals
 
Technology Fundamentals
Technology FundamentalsTechnology Fundamentals
Technology Fundamentals
 
Networking & security
Networking & securityNetworking & security
Networking & security
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 

Recently uploaded

Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Public Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & CompanyPublic Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & CompanyPhiferCompany
 
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...PayScale, Inc.
 
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdfThe Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdfJasper Colin
 
Webinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary DataWebinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary DataPayScale, Inc.
 
Creative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for RecruitersCreative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for RecruitersHireQuotient
 
15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdf15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdfAlex Vate
 
Copy of Periodical - Employee Spotlight (8).pdf
Copy of Periodical - Employee Spotlight (8).pdfCopy of Periodical - Employee Spotlight (8).pdf
Copy of Periodical - Employee Spotlight (8).pdfmarketing659039
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...Sabuj Ahmed
 
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)twfkn8xj
 
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?hxwwranl
 
Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.ShrayasiRoy
 
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...makika9823
 
Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Dan Medlin
 
SQL Interview Questions and Answers for Business Analyst
SQL Interview Questions and Answers for Business AnalystSQL Interview Questions and Answers for Business Analyst
SQL Interview Questions and Answers for Business AnalystHireQuotient
 
Intern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfIntern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfmarketing659039
 

Recently uploaded (20)

Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Keshav Puram Delhi reach out to us at 🔝8264348440🔝
 
Public Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & CompanyPublic Relations jobs in New York City with Phifer & Company
Public Relations jobs in New York City with Phifer & Company
 
9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR
9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR
9953330565 Low Rate Call Girls In Vijay Nagar Delhi NCR
 
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
 
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdfThe Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
The Great American Payday Prepare for a (Relatively) Bumpy Ride.pdf
 
Webinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary DataWebinar - How to Choose and Use Salary Data
Webinar - How to Choose and Use Salary Data
 
Creative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for RecruitersCreative Director vs. Design Director: Key Differences for Recruiters
Creative Director vs. Design Director: Key Differences for Recruiters
 
15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdf15 Best Employee Retention Strategies.pdf
15 Best Employee Retention Strategies.pdf
 
Copy of Periodical - Employee Spotlight (8).pdf
Copy of Periodical - Employee Spotlight (8).pdfCopy of Periodical - Employee Spotlight (8).pdf
Copy of Periodical - Employee Spotlight (8).pdf
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
Call Girls in Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in  Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCRCall Girls in  Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in Subhash Nagar ⎝⎝9953056974⎝⎝ Escort Delhi NCR
 
Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...Unlocking Organizational Potential: The Essence of Human Resource Management ...
Unlocking Organizational Potential: The Essence of Human Resource Management ...
 
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
(圣安德鲁斯大学毕业证学位证成绩单-留学生补办)
 
Hot Sexy call girls in Preet Vihar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Preet Vihar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Preet Vihar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Preet Vihar🔝 9953056974 🔝 Delhi escort Service
 
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
如何办RRC学位证,红河学院毕业证成绩单文凭怎么辨别?
 
Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.Employee Engagement Trend Analysis.pptx.
Employee Engagement Trend Analysis.pptx.
 
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...
Escorts in Lucknow 9548273370 WhatsApp visit your hotel or office Independent...
 
Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024
 
SQL Interview Questions and Answers for Business Analyst
SQL Interview Questions and Answers for Business AnalystSQL Interview Questions and Answers for Business Analyst
SQL Interview Questions and Answers for Business Analyst
 
Intern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdfIntern Welcome LinkedIn Periodical (1).pdf
Intern Welcome LinkedIn Periodical (1).pdf
 

Computer Fundamentals

  • 2. Operating System (OS) • Set of software that manages the hardware and provides services to computer programs. • Cycle Hardware<OS<Application<User. • Real-time OS are for executing real-time applications • It is predictable response to Events. Has two aspects: a) Event Driven b) Time Sharing • Distributed OS: Many appear as 1 computer • Embedded OS: For embedded computer System.
  • 3. Different Operating Systems • Unix: All Console • Linux: GUI of Linux • Mac: As known • Windows: As known • Android: Mobile OS, Linux wrapped in Java • AIX: Customized Unix by IBM • HP-UX: Customized Unix by HP • Solaris: Customized Unix by Sun Microsystems
  • 5.
  • 6. OSI Model For Networking
  • 8. Middleware • Computer Software that provides services to software applications beyond Operating System. • It makes it easier for developer to perform communication (I/O) so that they focus on purpose of application. • Communication & Mgmt of data ‘Dash in client- server’ • Software layer that lies between OS & Application.
  • 9. Development Skills • Languages: Assembly, C, C++, Java, .Net • Difference between C & C++. • OOPS • Module Prog. & S/W architecture. • Algorithm & its Optimization. • Scripting: Perl, Shell, Tcl, Python.
  • 10. Software Testing • Black-Box Testing: Internal System design not considered but based on Requirement and functionality. (Not so strong). • White-Box Testing: Internal Logic, mainly codes (Strong). • Unit Testing: Components & modules. • Integration Testing: Bottom Up approach. • Functional Testing: Output as per Req. • System Testing: Entire system is tested as per requirement. • End to End Testing: Similar to System, but involves real world testing (database,network,hardware). • Sanity Testing: Testing of Software versions. • Regression Testing: Testing whole application if any change in module or functionality. • Acceptance Testing: System meeting customer requirements. • Load Testing: Testing system under load. • Stress Testing: System is stressed beyond its application.(data,query,connections). • Performance Testing: How system performing under different loads. • Usability Testing: Is customer understanding the system.
  • 11. • Install/Uninstall testing: Recovery from crash and hardware failure. • Security Testing: Penetrating via hacking. • Compatibility Testing: Working on all platforms. • Manual Testing: Strong/Values. • Automation Testing: Test cases,Scripting,Automation.
  • 12. Security Concepts • IPSec: Internet Security Protocol is a protocol suite for securing IP by: a) Authentication b) Encrypting each IPv4 & v6 packet • Works on Internet Layer or Upper Layer. • SSL: Secure Socket Layer • TLS: Transport Layer Security • SSH: Secure Shell
  • 13. IPSec Uses Following Protocols • Authentication Header • Encapsulating Security Payloads (ESP). • Security Associations. • Common Terms: • Algorithm, Intergrity, Authentication, Keys, Encapsulation,Encryption,Protocols.