The document provides an overview of principles of information technology. It discusses what IT is and its role in economic and social development. It also covers the rapid evolution of IT and benefits in areas like education, healthcare, and government efficiency. The document then discusses basic computer concepts including hardware components, data organization, number systems, and storage capacities. It covers computer generations from first to fifth generation and concludes with an introduction to networking, discussing different network types, transmission media, and examples of internet, intranet, and extranet networks.
This presentation represents an introduction to computer. I used every beginning lecture in my courses "Instructional Technology" and "Computer Fundamentals and its Applications".
This presentation represents an introduction to computer. I used every beginning lecture in my courses "Instructional Technology" and "Computer Fundamentals and its Applications".
CPU-Central Processing Unit (With History and Complete Detail)Adeel Rasheed
CPU is the heart and brain of a computer. It receives data as input.The Central Processing Unit (CPU) is simply the central processor or the processor where most calculation takes places.
CPU-Central Processing Unit (With History and Complete Detail)Adeel Rasheed
CPU is the heart and brain of a computer. It receives data as input.The Central Processing Unit (CPU) is simply the central processor or the processor where most calculation takes places.
BASIC OF COMPUTER.pptx regarding detailsMuskanMukhi1
This is basically a presentation of IT regarding the topic Basics of a Computer. So anybody can use it for Information Technology. A PowerPoint presentation on the basics of computers typically covers fundamental concepts such as hardware components (CPU, memory, storage devices), software (operating systems, applications), input and output devices (keyboard, mouse, monitor), and basic computer operations (booting, file management, software installation). It may also touch upon topics like computer networks, internet basics, and computer security. The presentation aims to provide a foundational understanding of computers to beginners, highlighting their essential components and functions in a clear and concise manner.The PowerPoint presentation on the basics of computers provides a comprehensive overview suitable for beginners. It covers fundamental concepts including hardware components like CPU, memory, and storage devices, alongside software such as operating systems and applications. Additionally, it explores input and output devices like keyboards, mice, and monitors, and delves into basic computer operations such as booting, file management, and software installation. The presentation also touches upon computer networks, internet basics, and computer security, offering a foundational understanding of these topics. With clear explanations and visual aids, the presentation aims to equip beginners with essential knowledge about computers and their functionalities in a concise and accessible manner.
It covers hardware components like the CPU, memory, and storage devices, as well as software including operating systems and applications. Furthermore, it explains input and output devices such as keyboards, mice, and monitors, and discusses basic computer operations like booting and file management. Additionally, the presentation touches on computer networks, internet fundamentals, and computer security, providing a well-rounded understanding of key aspects of computing. With clear explanations and visual aids, the presentation aims to demystify computers and empower beginners to navigate the digital world with confidence.
Fundamentals of Computers and Operating System(OS)TUHIN SAHA
This comprehensive PowerPoint presentation is designed to provide a foundational understanding of computers, their components, and their functions. It is ideal for students, educators, and anyone interested in gaining a solid grasp of the basics of computer science.
The presentation covers the following key topics:
1. What is a Computer?
- The presentation begins with a clear definition of a computer, detailing its basic functions as an electronic device that processes data. It highlights the computer's ability to perform arithmetic and logical operations.
2. What is an Operating System?
- This section introduces the operating system (OS) as the crucial software that manages hardware and software resources. A detailed block diagram illustrates the OS's components.
3. Components of a Computer:
- The presentation breaks down the primary components of a computer system, including the central processing unit (CPU), memory, input/output devices, and storage devices.
4. Different Generations of Computers:
- A historical perspective is provided on the evolution of computers, detailing the five generations from vacuum tubes to artificial intelligence.
5. Hardware and Software:
- An exploration of the difference between hardware (the physical components of a computer) and software (the programs and applications that run on the hardware). Examples of various hardware components.
6. Input and Output Devices:
- Detailed descriptions of common input devices (such as keyboards and mice) and output devices (such as monitors and printers). This section explains how these devices enable users to interact with the computer and receive feedback.
7. Storage and Memory Devices:
- The presentation covers different types of storage (like hard drives, SSDs, and optical discs) and memory (RAM and ROM).
This presentation serves as a foundational resource for anyone looking to gain a better understanding of computers and their operations. Whether you are a student, educator, or tech enthusiast, "Intro to Computers & OS: Key Concepts" offers valuable insights and a structured approach to learning about the integral components and functions of modern computing systems.
A computer is an electronic device, operating under the control of instructions stored in its own memory that can accept data (input), process the data according to specified rules, provide information (output), and store the information for future use
Computer is an electronic device which converts row data into meaningful information .It can perform many task.It work very fast and accuratc.A computer programmed device with a set of instnections of perform is spicilic task and generate result at a very high speed
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
2. What is Information Technology The use of computers and telecommunications to retrieve and store and transmit information
3. The role of IT It is accepted that telecommunication is a basic infrastructure necessary for economic and social development of a country. Information technology may be described as the support of the central nervous system of complex societies, transmitting and processing information and commands among the various parts of such societies. Internet plays a fundamental function in ICT role.
4. Rapid evolution of IT Predictions indicate the doubling of computing power every 18 –24 months and the doubling of communications power every 6 months. Both are accompanied by huge reductions in costs and massive increases in speed and quantity. In 2001 more information can be sent over a single cable in a second than in 1997 was sent over the entire Internet in a month.
5. Benefits from IT Benefits could be obtained in: Education Job training Health care Government efficiency
6. INTRODUCTION TO COMPUTERS A computer is an Automatic Electronic Data Processing System. Computers can process information automatically as they can store programs or instructions in the computer and execute them automatically. Charles Babbage is known as the father of computer. Computer Programs: A computer program is a set of instructions written in a particular computer language to perform a specific task by the computer system.
7. Basic Structure of a Computer Control Unit Output Input ALU Internal Storage Backing Storage
9. Hardware Components INPUT DEVICES The Mouse Used to ‘drive’ Microsoft Windows. The Keyboard The keyboard is still the commonest way of entering information into a computer. Tracker Balls An alternative to the traditional mouse and often used by graphic designers.
10. Scanners A scanner allows you to scan printed material and convert it into a file format that may be used within the PC. Touch Pads A device that lays on the desktop and responds to pressure. Light Pens Used to allow users to point to areas on a screen.
11. Joysticks Many games require a joystick for the proper playing of the game. OUTPUT DEVICES Monitor The computer screen is used for outputting information in an understandable format, Printers There are many different types of printers. In large organizations laser printers are most commonly used due to the fact that they can print very fast and give a very high quality output.
12. Plotters A plotter is an output device similar to a printer, but normally allows you to print larger images. Speakers Enhances the value of educational and presentation products. Speech synthesizers Gives you the ability to not only to display text on a monitor but also to read the text to you.
13. Optical Mark Reader (OMR) Mark: A mark in a particular position on the document will trigger off a response. It is a device used for the detection of ordinary pencil or pen marks. Optical Character Reader (OCR) Characters: A scanning device recognizes each character by amount of reflected light. These devices can read machine printed characters as well as defined, carefully formed handwritten characters.
14. Barcode Scanner – Barcode Reader The barcodes are recorded on the products by the manufactures and usually carry the item code. The barcode reader identifies the items code by analyzing the light and dark bars.
18. Carry out the actions specified by the instruction.First three steps are fetch phase, Fourth step is execution phase.
19. FUNCTIONAL UNITS The computer system is divided into three separate units for its operation. They are, 1) Arithmetic logical unit (ALU) 2) Control unit (CU) 3) Memory unit (MU) Arithmetic Logical Unit (ALU) After you enter data through the input device it is stored in the primary storage unit. The actual processing of the data and instruction are performed by Arithmetic Logical Unit.
20.
21. Memory Unit The memory unit stores data and information within a computer. Two types of storage devices: Fixed Data Storage: These types of storage devices are provided with the computer and they are in built devices. 2. Removable Data Storage: These types of storage devices are used when we want to increase the storage capacity as well as keep some data way which are not frequently used.
22. Backing Storage: There are many media for backing storage: Magnetic Disk Unit Magnetic Diskette Unit (Floppy Disk) Optical Disk Unit Magnetic Tape Unit Magnetic Tape Catridges and Cassettes Solid state storage Devices Mass Storage Devices and Media
23. Magnetic Disk Magnetic storage uses different patterns of magnetization on a magnetically coated surface to store information. Magnetic storage is non-volatile. Magnetic storage will take these forms: Floppy disk, used for off-line storage Hard disk drive, used for secondary storage
24. Magnetic Disk (Floppy disk): A floppy disk is a data storage medium that is composed of a disk of thin, flexible ("floppy") magnetic storage medium encased in a square or rectangularplastic shell.
25. Optical disk Optical storage, the typical optical disc, stores information in deformities on the surface of a circular disc and reads this information by illuminating the surface with a laser diode and observing the reflection. Optical disc storage is non-volatile. The deformities may be permanent (read only media ), formed once (write once media) or reversible (recordable or read/write media). The following forms are currently in common use: CD, CD-ROM, DVD: Read only storage CD-R, DVD-R (Digital Versatile Disk) Write once storage CD-RW, DVD-RW: Slow write, fast read storage
26. Magnetic tape Magnetic tape is a medium for magnetic recording, made of a thin magnetizable coating on a long, narrow strip of plastic. Most audio, video and computer data storage is this type. A device that stores computer data on magnetic tape is a tape drive. Magnetic tape Types: Tape cartridges Backup tape for microcomputer Capacities range from 120 MB to 5 GB Tape reels Minicomputer and mainframe 1/2 inch wide and 1/2 mile long
27. Solid State: Flash memory cards Mass storage: Mass storage refers to the storage of large amounts of data in a persisting and machine-readable fashion. Devices and/or systems that have been described as mass storage include tape libraries ,hard disk drives.
28. Storage Capacities Storage capacity of a computer depends on the no. of bytes that can be stored in its memory. It can be increased by adding enhancement boards. Cache Memory: Cache (pronounced cash) memory is extremely fast memory that is built into a computer’s central processing unit (CPU), or located next to it on a separate chip. The CPU uses cache memory to store instructions that are repeatedly required to run programs, improving overall system speed.
29. Random-access memory Random-access memory (RAM) is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order (i.e., at random). Volatility: Depending on its physical characteristics, main storage may be either volatile, in which case data is lost once the power is turned off or no-volatile where no such data loss occurs. Read Only Memory(ROM): It is also used frequently used to store data or instructions which the computer needs all the time from the moment it is switched on. Because data stored in ROM cannot be modified. it is mainly used to distribute software.
30. Other Types of ROM 1. Programmable read-only memory (PROM): A programmable read-only memory (PROM) or field programmable read-only memory (FPROM) or one-time programmable non-volatile memory (OTP NVM) is a form of digital memory where the setting of each bit is locked by a fuse or antifuse. Such PROMs are used to store programs permanently. These types of memories are frequently seen in video game consoles, mobile phones, etc.,
31. EPROM(Erasable Programmable Read Memory) Once programmed, an EPROM can be erased by exposing it to strong ultraviolet light from a mercury-vapor light source. EEPROM(Electrically Erasable Programmable Read-Only Memory) It is used in computers and other electronic devices to store small amounts of data that must be saved when power is removed.
32. Data Organization File: A file is collection of related logical records. Record: A record is a collection of fields. Field: A field is an item of data and is a collection of characters. Character: Character is a collection of bits. Computer File Concept: Two common ways of viewing files: Logical files Physical files
33. Number Systems Decimal Number system (0 – 9) Binary Number System (0 and 1) Octal Number System (0 – 7) Hexa Decimal Number System (0 – 15) Coding Systems: Each location of the main storage is made up of a tiny two state devices which can be used to represent a binary 1 or 0. A binary digits is also known as a bit. A group of 8 bits is known as a byte.
34. The units used to measure the size of the internal storage are as follows: 1. Kilo Byte = 1024 Bytes 2 Mega Byte= 1024 KB 3 Giga Byte = 1024 MB 4 TeraByte = 1024 GB
35. COMPUTER BASICS Types of Computers 1. Mini and Mainframe Computers Very powerful, used by large organisations such an banks to control the entire business operation. Very expensive!
36. 2. Personal Computers Cheap and easy to use. Often used as stand-alone computers or in a network. May be connected to large mainframe computers within big companies.
42. Uses of Computer PC at Home Common uses for the computer within the home Computer games Working from Home Banking from Home Connecting to the Web. Computers in Education CBT (Computer Based Training) Computer Based Training (CBT) offers a low cost solution to training needs where you need to train a large amount of people on a single subject. These programs are normally supplied on CD-ROM and combine text, graphics and sound.
43. Office Applications Automated Production Systems Many car factories are almost completely automated and the cars are assembled by computer-controlled robots. This automation is becoming increasingly common throughout industry. Design Systems Many products are designed using CAD (Computer Aided Design) programs to produce exact specifications and detailed drawings on the computer before producing models of new products.
44. Office Applications Stock Control Stock control is ideal for automation and in many companies it is now completely computerized. The stock control system keeps track of the number of items in stock and can automatically order replacement items when required. Accounts / Payroll In most large organizations the accounts are maintained by a computerized system.
45. Value of Backup The most important thing that you store on your computer is information. Often the contents of a hard disk can represent years of work. If the hard disk stops working one day you could lose all those years of work. For this reason it is VITAL that you take regular backups of the information that is stored on the computer. Use passwords. Understand the Importance of shutting down your computer properly Use a UPS (Un-interruptible Power Supply)
46. Computer Virus What are computer viruses? Viruses are small programs that hide themselves on your disks (both diskettes and your hard disk). Unless you use virus detection software the first time that you know that you have a virus is when it activates. Different viruses are activated in different ways.
47. How do viruses infect PCs? Viruses hide on a disk and when you access the disk (either a diskette or another hard disk over a network) the virus program will start and infect your computer. The worst thing about a computer virus is that they can spread from one computer to another, either via use of infected floppy disk, or over a computer network, including the Internet.
48. Generations of Computer FIRST GENERATION (1945-1956) First generation computers were characterized by the fact that operating instructions were made-to-order for the specific task for which the computer was to be used. Each computer had a different binary-coded program called a machine language that told it how to operate. This made the computer difficult to program and limited its versatility and speed. Other distinctive features of first generation computers were the use of vacuum tubes (responsible for their breathtaking size) and magnetic drums for data storage.
49. SECOND GENERATION (1956-1965) Throughout the early 1960's, there were a number of commercially successful second generation computers used in business, universities, and government from companies. These second generation computers were also of solid state design, and contained transistors in place of vacuum tubes. They also contained all the components we associate with the modern day computer: printers, tape storage, disk storage, memory, operating systems, and stored programs.
50. THIRD GENERATION (1965-1971) Though transistors were clearly an improvement over the vacuum tube, they still generated a great deal of heat, which damaged the computer's sensitive internal parts. The quartz rock eliminated this problem. developed the integrated circuit (IC) in 1958. The IC combined three electronic components onto a small silicon disc, which was made from quartz. As a result, computers became ever smaller as more components were squeezed onto the chip.
51. FOURTH GENERATION (1971-Present) In 1981, IBM introduced its personal computer (PC) for use in the home, office and schools. The number of personal computers in use more than doubled from 2 million in 1981 to 5.5 million in 1982. Ten years later, 65 million PCs were being used. Computers continued their trend toward a smaller size, working their way down from desktop to laptop computers
52. FIFTH GENERATION(Future) Many advances in the science of computer design and technology are coming together to enable the creation of fifth-generation computers. Two such engineering advances are parallel processing, which replaces von Neumann's single central processing unit design with a system harnessing the power of many CPUs to work as one. Computers today have some attributes of fifth generation computers. For example, expert systems assist doctors in making diagnoses by applying the problem-solving steps a doctor might use in assessing a patient's needs. It will take several more years of development
63. Shielded Twisted-Pair (STP) STP cables are similar to UTP cables, except there is a metal foil or braided-metal-mesh cover that encases each pair of insulated wires.
64. Coaxial Cables Outer metallic wrapping serves both as a shield against noise and as the second conductor that completes the circuit.
65. Fiber-Optic Cables An optical fiber consists of a core (denser (solid) material) and a cladding (less dense material).
79. LAN (Local Area Network) Small network, short distance A room, a floor, a building Limited by no. of computers and distance covered. Examples: Network inside the Student Computer Room.
97. Data Communication A Communications Model Source Generates data to be transmitted Transmitter Converts data into transmittable signals Transmission system Carries data Receiver Converts received signal into data Destination Takes incoming data
99. Software Classification Application Software System Software Application Software An application program is the type of program that you use once the operating system has been loaded. Examples include word-processing programs, spreadsheets and databases.
100. Word processing applications Microsoft Word Lotus Word Pro WordPerfect Spreadsheets Microsoft Excel Lotus 123 Database Microsoft Access Lotus Approach
102. System Software The operating system is a special type of program that loads automatically when you start your computer. The operating system allows you to use the advanced features of a modern computer without having to learn all the details of how the hardware works. Ex: Microsoft Windows XP, VISTA, 2007 etc.,
103. COMPUTER LANGUAGES Why we need computer Language? Because computer understands only the computer language, but computer understand our languages like English, etc., So we have to give instructions in one of the computer languages. That is programs (Instructions in Computer Language).
104. TYPES OF COMPUTER LANGUAGES Low Level Languages High Level Languages Data Base Languages
105. Low Level Languages Historically, Low level languages are developed first. The low level languages are machine depended. Low Level languages are of two types: Machine Languages Assembly Languages
106. Machine languages (machine dependent) Native tongue of a particular kind of computer. Each instruction is a binary string. The code is used to indicate the operations to be performed. Strings of numbers giving machine specific instructions Example : +1300042774 +1400593419 +1200274027
107. Assembly languages (machine dependent) English-like abbreviations representing elementary computer operations. Again specific to only one type of computer. Uses descriptive names for operations and data, e.g. , “LOAD value”, “ADD data”, “STORE value”. Assemblers will translate these to machine languages. but basically following the machine instructions. Example:LOAD BASEPAY ADD OVERPAY STORE GROSSPAY
108. High-level languages (machine independent) Codes similar to everyday English High-level languages: Write program instructions called statement that resemble a limited version of English. e.g., the statement “value = value1 + value2”. Portable, meaning it can be used on different types of computers without modifications. Compilers translate them to machine languages. Examples are FORTRAN, PASCAL, COBOL, C, C++, BASIC etc. Use mathematical notations (translated via compilers) Example: grossPay = a= a + b
109. DATA BASE LANGUAGES DBASE – III, IV FOXPRO ORACLE Data base languages are: Easy to use Much simpler Learning with less time
110. Facilities available in Data base Languages Creating data base Entering the data records Editing the data records Adding new records Deleting records Searching the records Displaying the records Preparing the reports Sorting