SlideShare a Scribd company logo
1 of 6
Download to read offline
@infosectrain
COMPUTER
A DIGITAL HISTORY
www.infosectrain.com
VIRUSES
VIRUS?
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
WHAT IS A
A computer virus is like a digital intruder that
can sneak into your device and cause mischief.
It is a type of malicious software designed to
replicate itself and spread to other computers,
often disrupting normal computer operations.
VIRUS?
BRAIN VIRUS
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
EARLY INSTANCES OF COMPUTER
1986
Among the first PC viruses, targeting
IBM PC systems.
CREEPER VIRUS
1970
One of the earliest computer viruses that
affected the mainframe computer.
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
C
R
E
D
I
T
C
A
R
D
PERSONAL
DATA
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
MELISSA VIRUS
1999
Spread through email attachments
and targeted Microsoft Word
documents, causing disruptions
to email servers
VIRUS?
NOTABLE HISTORICAL
OUTBREAKS
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
ILOVEYOU VIRUS
2000
Rapidly spread via email, causing
significant damage to computer
systems globally.
RANSOMWARE
WANNACRY
2017
Exploited Windows vulnerabilities,
encrypting data and demanding
ransom payments, causing
global disruption.
FOUND THIS USEFUL?
Get More Insights Through Our FREE
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE SHARE FOLLOW

More Related Content

Similar to Computer Viruses a Digital History.

NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYShah Rashedul LastHaque
ย 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxMubashiraP5
ย 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
ย 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfMahmud Hasan Tanvir
ย 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_virusesLihtnes1
ย 
Social impacts of it
Social impacts of it Social impacts of it
Social impacts of it Amit Jaglan
ย 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesactanimation
ย 
Virus
VirusVirus
Virussushant292
ย 
Computer viruses
Computer virusesComputer viruses
Computer virusesshopnil786
ย 
Research paper powerpoint presentation for public viewing
Research paper powerpoint presentation for public viewingResearch paper powerpoint presentation for public viewing
Research paper powerpoint presentation for public viewingKnuckles McGuire
ย 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksSrikanth VNV
ย 
Computer crimes
Computer crimesComputer crimes
Computer crimesMuniba Bukhari
ย 
What is a Malware.pdf
What is a Malware.pdfWhat is a Malware.pdf
What is a Malware.pdfinfosec train
ย 
History of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurHistory of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurMohsin Dahar
ย 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar pptvipinkumar940
ย 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdarBashdar Rahman
ย 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptxEdwinGervacio2
ย 
Virus09
Virus09Virus09
Virus09defler
ย 

Similar to Computer Viruses a Digital History. (20)

NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
ย 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
ย 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
ย 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
ย 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
ย 
Social impacts of it
Social impacts of it Social impacts of it
Social impacts of it
ย 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
ย 
Virus
VirusVirus
Virus
ย 
Computer viruses
Computer virusesComputer viruses
Computer viruses
ย 
Research paper powerpoint presentation for public viewing
Research paper powerpoint presentation for public viewingResearch paper powerpoint presentation for public viewing
Research paper powerpoint presentation for public viewing
ย 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
ย 
Computer crimes
Computer crimesComputer crimes
Computer crimes
ย 
Computer viruses
Computer virusesComputer viruses
Computer viruses
ย 
What is a Malware.pdf
What is a Malware.pdfWhat is a Malware.pdf
What is a Malware.pdf
ย 
History of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpurHistory of computer virus by mohsin ali dahar khairpur
History of computer virus by mohsin ali dahar khairpur
ย 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
ย 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
ย 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
ย 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
ย 
Virus09
Virus09Virus09
Virus09
ย 

More from InfosecTrain Education

Discover the Dark Web: How to Stay Safe .pdf
Discover the Dark Web: How to Stay Safe .pdfDiscover the Dark Web: How to Stay Safe .pdf
Discover the Dark Web: How to Stay Safe .pdfInfosecTrain Education
ย 
Decoding Ransomware: Understanding the Various Types and Their Impacts.pdf
Decoding Ransomware: Understanding the Various Types and Their Impacts.pdfDecoding Ransomware: Understanding the Various Types and Their Impacts.pdf
Decoding Ransomware: Understanding the Various Types and Their Impacts.pdfInfosecTrain Education
ย 
Data Defense Squad-Tools for Security.pdf
Data Defense Squad-Tools for Security.pdfData Defense Squad-Tools for Security.pdf
Data Defense Squad-Tools for Security.pdfInfosecTrain Education
ย 
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.pdf
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.pdf๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.pdf
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.pdfInfosecTrain Education
ย 
Guarding Against Digital Intruders Spyware & Malware Awareness
Guarding Against Digital Intruders Spyware & Malware AwarenessGuarding Against Digital Intruders Spyware & Malware Awareness
Guarding Against Digital Intruders Spyware & Malware AwarenessInfosecTrain Education
ย 
Differences Between Qualitative and Quantitative Risk Management
Differences Between Qualitative and Quantitative Risk ManagementDifferences Between Qualitative and Quantitative Risk Management
Differences Between Qualitative and Quantitative Risk ManagementInfosecTrain Education
ย 
๐„๐ง๐ก๐š๐ง๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐“๐ก๐ซ๐ž๐š๐ญ ๐‡๐ฎ๐ง๐ญ๐ข๐ง๐  ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐“๐ก๐ž๐ฌ๐ž ๐๐ซ๐จ ๐“๐ข๐ฉ๐ฌ
๐„๐ง๐ก๐š๐ง๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐“๐ก๐ซ๐ž๐š๐ญ ๐‡๐ฎ๐ง๐ญ๐ข๐ง๐  ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐“๐ก๐ž๐ฌ๐ž ๐๐ซ๐จ ๐“๐ข๐ฉ๐ฌ๐„๐ง๐ก๐š๐ง๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐“๐ก๐ซ๐ž๐š๐ญ ๐‡๐ฎ๐ง๐ญ๐ข๐ง๐  ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐“๐ก๐ž๐ฌ๐ž ๐๐ซ๐จ ๐“๐ข๐ฉ๐ฌ
๐„๐ง๐ก๐š๐ง๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐“๐ก๐ซ๐ž๐š๐ญ ๐‡๐ฎ๐ง๐ญ๐ข๐ง๐  ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐“๐ก๐ž๐ฌ๐ž ๐๐ซ๐จ ๐“๐ข๐ฉ๐ฌInfosecTrain Education
ย 
All You Want to Know About CEH v12 Certification pdf
All You Want to Know About CEH v12 Certification pdfAll You Want to Know About CEH v12 Certification pdf
All You Want to Know About CEH v12 Certification pdfInfosecTrain Education
ย 
How to Implement Data Privacy in Your Organization
How to Implement Data Privacy in Your OrganizationHow to Implement Data Privacy in Your Organization
How to Implement Data Privacy in Your OrganizationInfosecTrain Education
ย 
Exploring Password Attacks: Understanding Different Types.pdf
Exploring Password Attacks: Understanding Different Types.pdfExploring Password Attacks: Understanding Different Types.pdf
Exploring Password Attacks: Understanding Different Types.pdfInfosecTrain Education
ย 
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...InfosecTrain Education
ย 
What is Enterprise Risk Management (ERM)
What is Enterprise Risk Management (ERM)What is Enterprise Risk Management (ERM)
What is Enterprise Risk Management (ERM)InfosecTrain Education
ย 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHInfosecTrain Education
ย 
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdfUnlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdfInfosecTrain Education
ย 
Common Security Attacks in the OSI Layer Model
Common Security Attacks in the OSI Layer ModelCommon Security Attacks in the OSI Layer Model
Common Security Attacks in the OSI Layer ModelInfosecTrain Education
ย 
TOP CHALLENGES IN OT SECURITY IN 2024.pdf
TOP CHALLENGES IN OT SECURITY IN 2024.pdfTOP CHALLENGES IN OT SECURITY IN 2024.pdf
TOP CHALLENGES IN OT SECURITY IN 2024.pdfInfosecTrain Education
ย 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseInfosecTrain Education
ย 
Unmasking the Cunning Ways Computer Viruses
Unmasking the Cunning Ways Computer VirusesUnmasking the Cunning Ways Computer Viruses
Unmasking the Cunning Ways Computer VirusesInfosecTrain Education
ย 
Navigating the Landscape of AI-Powered Cybersecurity Threats
Navigating the Landscape of AI-Powered Cybersecurity ThreatsNavigating the Landscape of AI-Powered Cybersecurity Threats
Navigating the Landscape of AI-Powered Cybersecurity ThreatsInfosecTrain Education
ย 
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...InfosecTrain Education
ย 

More from InfosecTrain Education (20)

Discover the Dark Web: How to Stay Safe .pdf
Discover the Dark Web: How to Stay Safe .pdfDiscover the Dark Web: How to Stay Safe .pdf
Discover the Dark Web: How to Stay Safe .pdf
ย 
Decoding Ransomware: Understanding the Various Types and Their Impacts.pdf
Decoding Ransomware: Understanding the Various Types and Their Impacts.pdfDecoding Ransomware: Understanding the Various Types and Their Impacts.pdf
Decoding Ransomware: Understanding the Various Types and Their Impacts.pdf
ย 
Data Defense Squad-Tools for Security.pdf
Data Defense Squad-Tools for Security.pdfData Defense Squad-Tools for Security.pdf
Data Defense Squad-Tools for Security.pdf
ย 
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.pdf
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.pdf๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.pdf
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.pdf
ย 
Guarding Against Digital Intruders Spyware & Malware Awareness
Guarding Against Digital Intruders Spyware & Malware AwarenessGuarding Against Digital Intruders Spyware & Malware Awareness
Guarding Against Digital Intruders Spyware & Malware Awareness
ย 
Differences Between Qualitative and Quantitative Risk Management
Differences Between Qualitative and Quantitative Risk ManagementDifferences Between Qualitative and Quantitative Risk Management
Differences Between Qualitative and Quantitative Risk Management
ย 
๐„๐ง๐ก๐š๐ง๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐“๐ก๐ซ๐ž๐š๐ญ ๐‡๐ฎ๐ง๐ญ๐ข๐ง๐  ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐“๐ก๐ž๐ฌ๐ž ๐๐ซ๐จ ๐“๐ข๐ฉ๐ฌ
๐„๐ง๐ก๐š๐ง๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐“๐ก๐ซ๐ž๐š๐ญ ๐‡๐ฎ๐ง๐ญ๐ข๐ง๐  ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐“๐ก๐ž๐ฌ๐ž ๐๐ซ๐จ ๐“๐ข๐ฉ๐ฌ๐„๐ง๐ก๐š๐ง๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐“๐ก๐ซ๐ž๐š๐ญ ๐‡๐ฎ๐ง๐ญ๐ข๐ง๐  ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐“๐ก๐ž๐ฌ๐ž ๐๐ซ๐จ ๐“๐ข๐ฉ๐ฌ
๐„๐ง๐ก๐š๐ง๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐“๐ก๐ซ๐ž๐š๐ญ ๐‡๐ฎ๐ง๐ญ๐ข๐ง๐  ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐“๐ก๐ž๐ฌ๐ž ๐๐ซ๐จ ๐“๐ข๐ฉ๐ฌ
ย 
All You Want to Know About CEH v12 Certification pdf
All You Want to Know About CEH v12 Certification pdfAll You Want to Know About CEH v12 Certification pdf
All You Want to Know About CEH v12 Certification pdf
ย 
How to Implement Data Privacy in Your Organization
How to Implement Data Privacy in Your OrganizationHow to Implement Data Privacy in Your Organization
How to Implement Data Privacy in Your Organization
ย 
Exploring Password Attacks: Understanding Different Types.pdf
Exploring Password Attacks: Understanding Different Types.pdfExploring Password Attacks: Understanding Different Types.pdf
Exploring Password Attacks: Understanding Different Types.pdf
ย 
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
ย 
What is Enterprise Risk Management (ERM)
What is Enterprise Risk Management (ERM)What is Enterprise Risk Management (ERM)
What is Enterprise Risk Management (ERM)
ย 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EH
ย 
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdfUnlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
ย 
Common Security Attacks in the OSI Layer Model
Common Security Attacks in the OSI Layer ModelCommon Security Attacks in the OSI Layer Model
Common Security Attacks in the OSI Layer Model
ย 
TOP CHALLENGES IN OT SECURITY IN 2024.pdf
TOP CHALLENGES IN OT SECURITY IN 2024.pdfTOP CHALLENGES IN OT SECURITY IN 2024.pdf
TOP CHALLENGES IN OT SECURITY IN 2024.pdf
ย 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training Course
ย 
Unmasking the Cunning Ways Computer Viruses
Unmasking the Cunning Ways Computer VirusesUnmasking the Cunning Ways Computer Viruses
Unmasking the Cunning Ways Computer Viruses
ย 
Navigating the Landscape of AI-Powered Cybersecurity Threats
Navigating the Landscape of AI-Powered Cybersecurity ThreatsNavigating the Landscape of AI-Powered Cybersecurity Threats
Navigating the Landscape of AI-Powered Cybersecurity Threats
ย 
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
ย 

Recently uploaded

Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
ย 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
ย 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
ย 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
ย 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
ย 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
ย 
Personalisation of Education by AI and Big Data - Lourdes Guร rdia
Personalisation of Education by AI and Big Data - Lourdes Guร rdiaPersonalisation of Education by AI and Big Data - Lourdes Guร rdia
Personalisation of Education by AI and Big Data - Lourdes Guร rdiaEADTU
ย 
24 ฤแป€ THAM KHแบขO KรŒ THI TUYแป‚N SINH Vร€O LแปšP 10 Mร”N TIแบพNG ANH Sแปž GIรO DแปคC HแบขI Dฦฏ...
24 ฤแป€ THAM KHแบขO KรŒ THI TUYแป‚N SINH Vร€O LแปšP 10 Mร”N TIแบพNG ANH Sแปž GIรO DแปคC HแบขI Dฦฏ...24 ฤแป€ THAM KHแบขO KรŒ THI TUYแป‚N SINH Vร€O LแปšP 10 Mร”N TIแบพNG ANH Sแปž GIรO DแปคC HแบขI Dฦฏ...
24 ฤแป€ THAM KHแบขO KรŒ THI TUYแป‚N SINH Vร€O LแปšP 10 Mร”N TIแบพNG ANH Sแปž GIรO DแปคC HแบขI Dฦฏ...Nguyen Thanh Tu Collection
ย 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
ย 
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...Nguyen Thanh Tu Collection
ย 
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ไธญ ๅคฎ็คพ
ย 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
ย 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
ย 
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...Nguyen Thanh Tu Collection
ย 
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝไธญ ๅคฎ็คพ
ย 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
ย 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
ย 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
ย 

Recently uploaded (20)

Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
ย 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
ย 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
ย 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
ย 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
ย 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
ย 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
ย 
Personalisation of Education by AI and Big Data - Lourdes Guร rdia
Personalisation of Education by AI and Big Data - Lourdes Guร rdiaPersonalisation of Education by AI and Big Data - Lourdes Guร rdia
Personalisation of Education by AI and Big Data - Lourdes Guร rdia
ย 
24 ฤแป€ THAM KHแบขO KรŒ THI TUYแป‚N SINH Vร€O LแปšP 10 Mร”N TIแบพNG ANH Sแปž GIรO DแปคC HแบขI Dฦฏ...
24 ฤแป€ THAM KHแบขO KรŒ THI TUYแป‚N SINH Vร€O LแปšP 10 Mร”N TIแบพNG ANH Sแปž GIรO DแปคC HแบขI Dฦฏ...24 ฤแป€ THAM KHแบขO KรŒ THI TUYแป‚N SINH Vร€O LแปšP 10 Mร”N TIแบพNG ANH Sแปž GIรO DแปคC HแบขI Dฦฏ...
24 ฤแป€ THAM KHแบขO KรŒ THI TUYแป‚N SINH Vร€O LแปšP 10 Mร”N TIแบพNG ANH Sแปž GIรO DแปคC HแบขI Dฦฏ...
ย 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
ย 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
ย 
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
ย 
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ย 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
ย 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
ย 
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
ย 
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ย 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
ย 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
ย 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
ย 

Computer Viruses a Digital History.