two day workshop on “NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS” organized by SHPT School of Library Science, SNDT Women's University Library, Mumbai in collaboration with State Eligibility Test Department, University of Pune on 5 – 6th December 2008.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
This chapter covers:
- Common networking and communications applications
- Networking concepts and terminology
- Technical issues related to networks, including general characteristics of data transmission, and types of transmission media in use today
- Explanation of the various communications protocols and networking standards
- Various types of hardware used with a computer network
A computer network is a interconnection of two or more computers that are able to exchange information’s. Two computers are said to be inter connected if they are capable of
exchanging information.
• Network Goals/Advantages of Networking
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
This chapter covers:
- Common networking and communications applications
- Networking concepts and terminology
- Technical issues related to networks, including general characteristics of data transmission, and types of transmission media in use today
- Explanation of the various communications protocols and networking standards
- Various types of hardware used with a computer network
A computer network is a interconnection of two or more computers that are able to exchange information’s. Two computers are said to be inter connected if they are capable of
exchanging information.
• Network Goals/Advantages of Networking
Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code . Common targets for web application attacks are content management systems Web application security is important to any business as it helps to keep web applications functioning smoothly and protect businesses from cyber vandalism, data theft, unethical competition, and other negative consequences . Web applications may face a number of attack types depending on the attacker’s goals, the nature of the targeted organization’s work. A web application (web app) is an application program that is stored on a remote server and delivered over the internet through a browser interface. Web services are web apps by definition and many, although not all, websites contain web apps.
This presentation is about:
Uses of Networking.
Various types of networking.
Applications used for networking.
Methods of network security.
Methods of communication -2G,3G,4G,Fiber Optics
Transmission Media.
Various types of protocols.
Cloud Computing
Protection against Viruses.
A computer network is a digital telecommunications network that allows network nodes to share resources. In computer networks, computer devices exchange data with each other using connections (data links) between nodes. These data links are established via network cables such as wire or fiber optics , or wireless media such as Wi-Fi .
Network computing devices that launch, route , and terminate data are called network nodes. [1] Nodes are often identified by network addresses and can include network hosts such as personal computers , phones , and servers , as well as network hardware such as routers and switches. Two such devices can be said to be interconnected when one can exchange information with the other, whether they are directly connected to each other or not. In most cases, application-specific communication protocols are layered (i.e., carry a payload ) over other general communication protocols . This formidable collection of information technology requires skilled network managers to keep all network systems running well.
Empowerment of Women in Digital ErapptxSarika Sawant
One day webinar on the occasion of International Women's Day organsied by Dept of Library & Info Sci & Dept of Women's Studies KArnataka State Women's University
Women librarians in traditional and modern attires in India: Nationwide scena...Sarika Sawant
Paper presented at: IFLA WLIC 2018 – KL, Malaysia – Transform Libraries Transform Societies. Session 142 - Librarian Fashion: What does the way we dress say about us?
Technologies that will change library scenario in futureSarika Sawant
National conference on " Emerging Trends and Technologies in LISc“ 6th March 2019 Department of Library and Information Science, Shivaji University,Kolhapur.
Knowledge from manuscript to virtual reality-its processing-a journeySarika Sawant
Poster Presentation: NAAC sponsored National conference on “Strategies for Implementing Best Practices in Teaching –Learning and Evaluation” on 2nd and 3rd March 2016
SNDT Women’s University Library & SHPT School of Library Science
Three-Days UGC Sponsored
NATIONAL CONFERENCE ON LIBRARIES IN THE CHANGING INFORMATION MARKETPLACE
24th to 26th February 2016
Availability of open access resources through Maharashtra university library ...Sarika Sawant
International Research Conference “LIBRARY: A TEMPLE OF LEARNING & KNOWLEDGE HOUSE” organized by Guru Nanak Institute of Management Studies,
Mumbai on 6th February 2016
Identified open access resources such as open access archives, open access books, open access journals, open access courseware, open access search engine and open source software and its actual usefulness in LIS teaching & learning process
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
How libraries can support authors with open access requirements for UKRI fund...
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
1. Dr. Sarika Sawant [email_address] SHPT School of Library Science, SNDT Women's University, Mumbai 400 020
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12. RAM ROM It is used to store data, instructions & results. The time taken to provide access to any location either for storing / retrieving data is sameor uniform. That is why it is called as a random access device. It contains a pre-written set of instructions provided by the manufacturer for the basic functioning of the computer, e.g. booting instructions. RAM is temporary / volatile in nature since the contents of RAM are lost, the moment the power is lost. ROM is permanent in nature since the contents of ROM are not lost, even when the power is lost"i.e. it is non-volatile. The user can read from & write into the memory of the computer. The user can only read. He cannot make any changes. It has larger memory capacity as compared to ROM. It has very small capacity memory as compared to RAM. The processing speed can be increased by expanding the RAM capacity. ROM cannot be expanded / erased. It does not effect the processing speed.
64. 11) Which of following is a library management softwares SOUL CDS/ISIS MS access C++ 12) Expert system consists of Number of experts working in the system Computerised information system Information system built using artificial intelligence Information system for experts 13) Full form of ERNET Economic Research Network Education and research network Experimental research network Expected Response network 14) Broadband connectivity does not Increase speed of data transfer Help in transferring audio visual signals Permit transfer through cable wires Transfer data through electrical wires 15) URL stand for Uniform Resource Location Uniform Resource Locator Universal research locator Universal Research Locator
65. 16) DSpace is Digital library software Library automation software Software for creating OPAC DBMS 17) DVD is a example of Film media Magnetic media Optical media Web media 18) Which of following is incorrect? A virtual library is A library without walls A networked entity Contains only digital information It is limited to bibliographic information 19) Which of following transmission media had wider bandwidth Twisted wires Coaxial wires Optical fibers Modems