The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols.
Today computers are available in all organizations and therefore there is a need to share data and programs among various computers. With the advancement of data communication facilities the communication between computers has increased and thus it has extended the power of computer beyond the computer room. Now a user sitting at one place can communicate with computers of any remote site through communication channel.
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.
Today computers are available in all organizations and therefore there is a need to share data and programs among various computers. With the advancement of data communication facilities the communication between computers has increased and thus it has extended the power of computer beyond the computer room. Now a user sitting at one place can communicate with computers of any remote site through communication channel.
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.
This is all about internet and the things related to it like search engine, web browser, modem & URL etc. internet is the global network that connects people all over the world. it has different requirements to perform this function. All these aspects are explained in detail. internet is the requirement of this time. its uses are also discussed
This is all about internet and the things related to it like search engine, web browser, modem & URL etc. internet is the global network that connects people all over the world. it has different requirements to perform this function. All these aspects are explained in detail. internet is the requirement of this time. its uses are also discussed
Chapter 7 Networks and Communication Devices.docxrobertad6
Chapter 7
Networks and
Communication Devices
Key Topics
Basic Concepts & Terminology
Types of Networks
Network Media
Network Protocols
Network Hardware
2
Basic Concepts & Terminology
Network is a collection of objects or people which have some common attributes.
Computer Network is a collection of computers and other hardware devices which are connected together.
In a computer network, users can:
Share hardware (printers, scanners etc.)
Share software (Google, MyGUST, Office365 etc.)
Exchange Data (Dropbox, iCloud, OneDrive etc.)
Electronically Communicate with Others (text messaging, voice messaging, video messaging etc.)
3
Basic Concepts & Terminology
When devices are connected and ready to send/receive data, they are said to be Online.
When devices are not connected or not ready to send/receive data, they are said to be Offline.
When a device sends data, the action is also called Transmission.
When data is sent to a large number of devices, it is called Broadcast.
When data is copied to another device, the action is called Upload.
When data is copied from another device, the action is called Download.
4
Architecture is the way networks are designed to communicate
Client Server Networks
Client: PC or other
device on the network
that requests and
utilizes network
resources
Server: Computer
dedicated to
processing client
requests
5
Types of Networks – Architecture
Peer-to-Peer (P2P) networks have all computers at the same level
Internet peer-to-peer computing is performed via Internet
6
Types of Networks – Architecture
Local Area Network (LAN)
Small geographical area (office, campus, etc.)
Personal Area Network (PAN)
Connects personal devices for one individual,
such as his or her portable PC, mobile phone, and
portable printer
Wide Area Network (WAN)
Large geographical area (Internet)
Metropolitan Area Network (MAN)
Serves a metropolitan area
Municipal Wi-Fi projects
7
Types of Networks – Location
Intranet
Internal or Private to an organization
Is only accessible to members of the organization
SIS, Email, MyGUST are Intranet applications
Internet
Is a Public network
Is accessible to every one
GUST website is an Internet application
Extranet
Internal network providing some access to outsiders
Individuals outside the organization have limited access
Examples of Extranet?
8
Types of Networks – Accessibility
Types of Networks – Others
Virtual Private Network
Secure path over the Internet that
provide authorized users a secure
means of accessing a private network.
Sensor Networks
Contain sensors that respond to a stimulus and
generate an electrical signal that can be measured or interpreted.
Smart thermostats, lights, locks, gates are examples of sensor networks.
GUST ID is also used as part of sensor network which recognizes cards through RFID.
9
Network Media
Wired Media
The PC is physically cabled to the network
Common in schools, businesses, and government facilities
.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Internet ppt includes :history, introduction, defination, internet services, differences between web and internet, different types of web browser, web page., web browsers, protocol, electron mail, advantages and disadvantages of internet
1. What are the differences between a DBMS and RDBMS?
2. Explain the terms database and DBMS. Also, mention the different types of DBMS.
3. What are the advantages of DBMS?
4. Mention the different languages present in DBMS
5. What do you understand by query optimization?
6. Do we consider NULL values the same as that of blank space or zero?
7. What do you understand by aggregation and atomicity?
8. What are the different levels of abstraction in the DBMS?
9. What is an entity-relationship model?
10. What do you understand by the terms Entity, Entity Type, and Entity Set in DBMS?
11. What are relationships and mention different types of relationships in the DBMS
12. What is concurrency control?
13. What are the ACID properties in DBMS?
14. What is normalization and what are the different types of normalization?
15. What are the different types of keys in the database?
16. What do you understand by correlated subqueries in DBMS?
17. Explain Database partitioning and its importance.
18. What do you understand by functional dependency and transitive dependency in DBMS?
19. What is the difference between two and three-tier architectures?
20. Mention the differences between Unique Key and Primary Key
21. What is a checkpoint in DBMS and when does it occur?
22. Mention the differences between Trigger and Stored Procedures
23. What are the differences between Hash join, Merge join and Nested loops?
24. What do you understand by Proactive, Retroactive and Simultaneous Update?
25. What are indexes? Mention the differences between the clustered and non-clustered index
26. What do you understand by intension and extension?
27. What do you understand by cursor? Mention the different types of cursor A cursor is a database object which helps in manipulating data, row by row and represents a result set.
28. Explain the terms specialization and generalization
29. What do you understand by Data Independence?
30. What are the different integrity rules present in the DBMS?
31. What does Fill Factor concept mean with respect to indexes?
32. What is Index hunting and how does it help in improving query performance?
33. What are the differences between network and hierarchical database model?
34. Explain what is a deadlock and mention how it can be resolved?
35. What are the differences between an exclusive lock and a shared lock?
=>Concept of Governance
=>Risk and Control (GRC) as applicable to IT operational risk
=>Importance of documentation
=>DATA FLOW DIAGRAM for every application
=>Review of changes in the Data flow, reporting, etc.
=>Parameters for review
=>Importance of review on SLA compliance
=>Reporting to IT Strategy committee, Board etc.
Importance of Data - Where to find it, how to store, manipulate, and characterize it
Artificial Intelligence (AI)- Introduction to AI & ML Technologies/ Applications
Machine Learning (ML), Basic Machine Learning algorithms.
Applications of AI & ML in Marketing, Sales, Finance, Operations, Supply Chain
& Human Resources Data Governance
Legal and Ethical Issues
Robotic Process Automation (RPA)
Internet of Things (IoT)
Cloud Computing
What is Data ?
What is Information?
Data Models, Schema and Instances
Components of Database System
What is DBMS ?
Database Languages
Applications of DBMS
Introduction to Databases
Fundamentals of Data Modeling and Database Design
Database Normalization
Types of keys in database management system
Distributed Database
CASE (COMPUTER AIDED SOFTWARE ENGINEERING)
CASE and its Scope
CASE support in software life cycle documentation
project management
Internal Interface
Reverse Software Engineering
Architecture of CASE environment.
SOFTWARE RELIABILITY AND QUALITY ASSURANCE
Reliability issues
Reliability metrics
Reliability growth modeling
Software quality
ISO 9000 certification for software industry
SEI capability maturity model
comparison between ISO and SEI CMM
Software Testing
Different Types of Software Testing
Verification
Validation
Unit Testing
Beta Testing
Alpha Testing
Black Box Testing
White Box testing
Error
Bug
Software Design
Design principles
Problem partitioning
Abstraction
Top down and bottom up-design
Structured approach
Functional versus object oriented approach
Design specifications and verification
Monitoring and control
Cohesiveness
Coupling
Fourth generation techniques
Functional independence
Software Architecture
Transaction and Transform Mapping
SDLC
PDLC
Software Development Life Cycle
Program Development Life Cycle
Iterative model
Advantages of Iterative model
Disadvantages of Iterative model
When to use iterative model
Spiral Model
Advantages of Spiral model
Disadvantages of Spiral model
When to use Spiral model
Role of Management in Software Development
Software Lifecycle Models / Software Development Models
Types of Software development models
Waterfall Model
Features of Waterfall Model
Phase of Waterfall Model
Prototype Model
Advantages of Prototype Model
Disadvantages of Prototype model
V Model
Advantages of V-model
Disadvantages of V-model
When to use the V-model
Incremental Model
ITERATIVE AND INCREMENTAL DEVELOPMENT
INCREMENTAL MODEL LIFE CYCLE
When to use the Incremental model
Rapid Application Development RAD Model
phases in the rapid application development (RAD) model
Advantages of the RAD model
Disadvantages of RAD model
When to use RAD model
Agile Model
Advantages of Agile model
Disadvantages of Agile model
When to use Agile model
Introduction to software engineering
Software products
Why Software is Important?
Software costs
Features of Software?
Software Applications
Software—New Categories
Software Engineering
Importance of Software Engineering
Essential attributes / Characteristics of good software
Software Components
Software Process
Five Activities of a Generic Process framework
Relative Costs of Fixing Software Faults
Software Qualities
Software crisis
Software Development Stages/SDLC
What is Software Verification
Advantages of Software Verification
Advantages of Validation
Cloud Computing
Categories of Cloud Computing
SaaS
PaaS
IaaS
Threads of Cloud Computing
Insurance Challenges
Cloud Solutions
Security of the Insurance Industry
Cloud Solutions
Insurance Security in the Insurance Industry with respect to Indian market
Application Software
Applications Software
Software Types
Task-Oriented Productivity Software
Business Software
Application Software and Ethics
Computers and People
Software:
Systems and Application Software
Identify and briefly describe the functions of the two basic kinds of software
Outline the role of the operating system and identify the features of several popular operating systems
Discuss how application software can support personal, workgroup, and enterprise business objectives
Identify three basic approaches to developing application software and discuss the pros and cons of each
Outline the overall evolution and importance of programming languages and clearly differentiate among the generations of programming languages
Identify several key software issues and trends that have an impact on organizations and individuals
Programming Languages
A formal language for describing computation?
A “user interface” to a computer?
Syntax + semantics?
Compiler, or interpreter, or translator?
A tool to support a programming paradigm?
Number Codes and Registers
2’s complement numbers
Addition and subtraction
Binary coded decimal
Gray codes for binary numbers
ASCII characters
Moving towards hardware
Storing data
Processing data
More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU (20)
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
2. 2
The Internet
What is the Internet?
Worldwide collection of networks that connects
millions of computers
3. 3
History of the Internet
How did the Internet originate?
Became
functional
September 1969
ARPANET
Networking project by
Pentagon’s Advanced
Research Projects
Agency (ARPA)Goal:
To allow scientists
at different
locations to share
information
4. 4
History of the Internet
How has the Internet grown?
Today
More than 150 million host nodes
1969
Four host nodes
5. 5
History of the Internet
Who controls the Internet?
No one—cit is a public, cooperative, and
independent network
6. 6
High-speed
connection
High-speed
connection
Slow-speed
technology
Slow-speed
technology
How the Internet Works
How can you connect to the Internet?
Dial-up access
modem in your
computer uses a
standard telephone line
to connect to the Internet
Dial-up access
modem in your
computer uses a
standard telephone line
to connect to the Internet
Digital subscriber line (DSL),
cable telephone Internet
services (CATV), cable modem
provide connections using
regular copper telephone lines
Digital subscriber line (DSL),
cable telephone Internet
services (CATV), cable modem
provide connections using
regular copper telephone lines
Connection is always on—
whenever the computer
is running
Connection is always on—
whenever the computer
is running
Connection must be established
each time you log on.
Slow but inexpensive
Connection must be established
each time you log on.
Slow but inexpensive
7. 7
The World Wide Web
What is the World Wide Web (WWW)?
A worldwide collection of electronic documents
Each electronic document is called a Web page
Also called the Web
Can contain text, graphics, sound, video, and animation
A Web site is a collection of related Web pages
8. 8
The World Wide Web
What is a home page?
The first page that a Web site presents
Often provides connections to other Web pages
9. 9
The World Wide Web
What is a Web browser?
Microsoft
Internet
Explorer
Netscape
Mozilla
Program that allows you to view Web pages
10. 10
Menu BarMenu BarMenu BarMenu Bar
WorkspaceWorkspaceWorkspaceWorkspace
URL BarURL BarURL BarURL Bar
ToolbarToolbarToolbarToolbar
Status BarStatus BarStatus BarStatus Bar
Elements of a Web browser
11. 11
Internet Service Provider (ISP)
Internet Service Provider (ISP), is any company that
provides individuals and organizations with access to
or presence on the Internet.
E.g. Airtel, Sify, Tata, Reliance, VSNL, Idea etc.
12. 12
The World Wide Web
How can you establish a connection and start the
Web browser?
Step 2.
If necessary,
connect to the
Internet
Step 3.
Connection to the
Internet occurs, and a
home page displays
Step 1.
Click the Web browser
program name
13. 13
The World Wide Web
What is downloading?
The process of a computer receiving information
The transmission of information from a local computer
to a remote computer is called Uploading.
15. 15
The World Wide Web
What is a hyperlink (link)?
Item found elsewhere
on same Web page
Different Web page
at same Web site
Web page at a different
Web site
Built-in connection to another related
Web page location
16. 16
The World Wide Web
How can you recognize links?
A link can be text
or an image
Pointer changes to a small hand
when you point to
a link
Text links are
usually underlined
and in a different
color
17. 17
The World Wide Web
What is a search engine?
Program used to find
Web sites and Web
pages by entering
words or phrases
called search text
Also called a keyword
18. 18
The World Wide Web
What is a portal?
A Web site that offers a variety of services from one,
convenient location, usually for free
E. g. Yahoo
19. 19
The World Wide Web
What is multimedia?
Application integrating text with other media elements
Graphics
Animation
Audio
Video
20. 20
The World Wide Web
What is animation?
Appearance of motion created by
displaying a series of still images
in sequence
21. 21
The World Wide Web
What is audio?
Music, speech, or any other sound
Common Web audio file formats are
MP3, WAV, WMA (Windows Media
Audio), MPEG, RealAudio, and
QuickTime
22. 22
The World Wide Web
What is streaming audio?
Transfers data in a
continuous and even flow
Enables you to listen
to the sound as it
downloads to your
computer.
23. 23
Other Internet Services
What are some services found on the Internet?
4. Chat
(4)
(1)
1. E-mail
(2)
2. Web
(3)
3. Message board
(5)
5. File transfer
(6)
6. Instant messaging
24. 24
Other Internet Services
What is e-mail?
Short for electronic mail
The transmission of messages and files via a computer
network
Messages can consist of simple text or can contain attachments,
such as documents, graphics, or audio/video clips
Internet access providers usually provide an e-mail program
Some Web sites—such as MSN Hotmail and Yahoo!—provide
free e-mail services
25. 25
Other Internet Services
How do you send an e-mail message?
Step 1.
Start an e-mail
program
(Microsoft
Outlook, for
example)
Step 2.
Click the New Mail Message button
Step 3.
Enter the recipient’s
e-mail address, the
subject, and the
message
Step 4.
Click the Insert file button if
you want to attach a picture, for
example, and click Send
Step 5.
The recipient opens the
message
26. 26
Other Internet Services
What is an e-mail address?
Unique name that consists of a user name and domain
name that identifies the user
27. 27
Other Internet Services
What is a chat?
Real-time typed conversation
that takes place on a computer
Chat room is location on
server that permits users
to discuss topics of interest
28. 28
Other Internet Services
What is FTP?
File Transfer Protocol—Internet standard that allows
you to upload and download files with other computers
on the Internet
29. 29
Other Internet Services
What are newsgroups and message boards?
Newsgroup
Many Web sites use
message boards
because they are
easier to use
Online area where users discuss a particular subject
Message board
Type of discussion group
30. 30
Other Internet Services
What is a mailing list?
Group of e-mail
addresses given a single
name
When a message is sent
to the mailing list,
everyone on the list
receives the message
To add your name to a mailing list
you must subscribe to it; to remove
your name you must unsubscribe
31. 31
Other Internet Services
What is instant messaging (IM)?
A real-time Internet communications service that notifies you when
one or more people are online and allows you to exchange messages or
files
32. 32
Business to business (B2B)
Business providing goods and
services to other businesses
Consumer to consumer (C2C)
One consumer sells directly to another
Electronic Commerce
What is e-commerce?
Business to consumer (B2C)
Sale of goods to general public
Short for electronic commerce
Business transaction that occurs over
the Internet
33. LAN - Local Area Network
WLAN - Wireless Local Area Network
WAN - Wide Area Network
MAN - Metropolitan Area Network
SAN - Storage Area Network, System Area
Network, Server Area Network, or
sometimes Small Area Network
CAN - Campus Area Network, Controller Area
Network, or sometimes Cluster Area
Network
PAN - Personal Area Network
DAN - Desk Area Network
33
34. Dr. Kamal Gulati
Associate Professor |
University Quality Support Head |
Mentoring Programme Coordinator
[Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A]
Professional Certifications:
Certified Microsoft Innovative Educator
Data Science 101 Certification from Big Data University
R Language 101 Certification from Big Data University
SQL Certification from SOLOLEARN.com
Certified IBM Big Data 101 from Big Data University
R Program & Python Certified from DataCamp
Wiley Certified Big Data Analyst [WCBDA]
Certification on DBMS from IIT Mumbai
Certified Cisco Certified Network Associate [CCNA]
Certified Microsoft Certified Professional [MCP]
Certified Brainbench in Computer Fundamentals, Microsoft Access, MySQL 5.7 Administration &
Microsoft Project
35. Worked as Visiting Professor with Stratford University, USA for six months
from Jan’2016 to June’2016.
Also worked at Bahrain University in Kingdom of Bahrain Sr. I.T. Faculty
(Computer Science Department) for Period of 2 Years.
Have rich experience in the field of teaching and research in Computer Science
and Information Technology for almost 15+ years in Academia.
Having experience of working with both private and public institutions and
universities as the lecturer and self-instruction material writer for Information
Technology courses.
Had number of research papers published in national and international journals
and conference proceedings in IEEE and Scopus Index.
Also chaired various National and International Conferences of repute and
associated with various International Journals as Editorial Board Member for
International and National, Academic Adviser and Research Paper Reviewer.
My current area of interest: Big Data Analytics, R Software, Management
Information System, IT Project Management, Decision Support System,
Business Analytics, Database Management System, Data Networking and
Advanced Excel with Visual Basic Macros.
Country Visited: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for Teaching
and Research Purpose)
Profile of Dr. Kamal Gulati
36. Technical Program Committee for International Conference on Data, Engineering and Applications
2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal. http://www.ideaconference.in
Advisory Board Committee Member for International Conference on Energy, Communication,
Data Analytics and Soft Computing (ICECDS) which would be on 1-2 August 2017 at SKR
Engineering College, Poonamallee, Tamil Nadu, India. http://ecds.org.in
Advisory Committee Member for International Conference on Innovative Research in Engineering
and Science which would be on 16-17 June 2017 at Asian Institute of Technology Conference
Center Thailand. http://www.iresconf.org
Advisory Committee Member for International Conference on Cloud Computing and Internet of
everything which held on 10-11 Feb’2016 at Delhi-NCR. http://www.ccioet.org
Technical Committee member for InCITe-2016 (International Conference on Information
Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity University 2016
which held on 06-07 Oct, 2016. http://www.amity.edu/incite2016
Technical Speaker for Global perspective on IT business “The Changing Scenario” – Big Data on
International Students Conference New Delhi (ISCND) which held on 14-15 Oct, 2016
http://iscnd.com
Advisory Committee Member for International Conference on Sustainable Computing Techniques
in Engineering, Science and Management which has held on 09-10 Sep’2016 at Delhi-NCR.
http://www.scesm.org
Technical Program Committee Member for Program Committee Member for International
Conference on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017 http://rtict.org
Program Committee Member for International Conference on Recent Advancement in Computer
and Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017 http://www.icrac.co.in
Profile Contd….
37. Editorial Board member for the following International
Journals:
International Journal of Computer Science and Innovation
http://www.infinitysciences.org
International Journal of Latest Research in Engineering and Technology
http://www.ijlret.com
International Journal of Latest Trends in Engineering and Technology
http://www.ijltet.org
International Journal of Application or Innovation
in Engineering & Management http://www.ijaiem.org
International Journal for Management http://www.ijm-apm.com
ITM International Journal of Innovations in Science, Engineering &
Management www.iijisem.org
The International Journal of Emerging Engineering and Embedded
Systems http://www.ijeees.org
Conference Info http://conferenceinfo.org/tpc.php
International Journal of Computer Engineering in Research Trends
(IJCERT) http://www.ijcert.org
Expert Speaker for Program “Insurance Beyond Doubt” Presented by Oriental
Insurance Co Ltd. https://www.youtube.com/watch?v=GrvJkN_Zn3Q
Profile Contd….
38. BOOK, CHAPTER, and CASE STUDY Published
Published Book on “A Study of Changing Trends in E-CRM
of Indian Insurance Industry” Published by LAP Lambert
Academic Publishing, one of the top researchers and
renowned scientists of Germany with ISBN: 3330009543,
9783330009547. The Book available at Amazon.com.
Published Real Case Study on “IoT Security Considerations
for Higher Education” published on Business Cases -
RENVOI 2017 BOOK (The Case Centre, UK) with ISBN:
978-1-4828-8840-9, Page 63-70. The Book available at the
various online website: Amazon, AbeBooks, Chegg, Barnes
& Noble.
Published Chapter on "Role of eWorld in Insurance
Innovation" Published by Insurance Institute of India (III),
60 Years Diamond Jubilee, Compendium, Nov 2016 –
(Magazine) – One of the premium Insurance Institute of
India.