Theory & techniques for easily finding information online. A short course taken for people not familiar with advanced internet usage. If followed properly can make the most of technology and the Internet.
This document provides a 10-lesson introduction to computers. [Lesson 1 defines computers and their basic components and common uses. Lesson 2 discusses computer hardware, including the monitor, tower, keyboard, mouse and other peripherals. Lesson 3 demonstrates computer ports and buttons.] The remaining lessons cover operating systems, software, internet connectivity, online safety, cloud computing, mobile devices and cleaning computers. The document aims to build basic understanding of computers for new users.
The document provides an introduction to computers including definitions of key terms like hardware, software, operating systems, applications and networks. It describes the typical components of a computer system including input/output devices, storage, processors and memory. It outlines different categories of computers like desktops, laptops, tablets, servers and embedded devices. It gives examples of how computers are used in various settings like homes, small businesses, enterprises, and across society in areas like education, healthcare, government and more.
This document discusses the classification of computers based on their purpose, size, and data handling capabilities. It describes different types of computers including general purpose computers, specific purpose computers, analog computers, digital computers, hybrid computers, microcomputers, minicomputers, mainframe computers, and supercomputers. It provides examples of the world's fastest supercomputers and lists the top 10 computer manufacturers as of 2019.
The document defines and describes the key components of computers. It discusses that a computer is an electronic device that processes data according to stored instructions to produce information. The main components include the input and output devices, storage, processor, memory, and software. It also covers different types of computers like personal computers, mobile devices, servers, and embedded systems.
This document discusses several topics related to information and communication technology (ICT), including:
1. The effects of software piracy, hacking, and computer viruses and how to protect yourself.
2. How ICT has both increased jobs in fields like IT and decreased jobs in areas like manufacturing and secretarial work.
3. Examples of microprocessor-controlled devices used for entertainment and around the home, and how these have impacted lifestyles.
4. Capabilities and limitations of ICT, internet use issues like phishing, reliability of online information, and encryption.
5. Potential health issues from prolonged ICT use like repetitive strain injury.
6. Safety concerns regarding overloading electrical sockets, trailing
The document discusses the positive and negative effects of technology on various aspects of life. It describes how technology has improved communication, business/trade, education, and medicine by allowing people to connect across long distances more easily and access information online. However, it also notes that overuse of technology can negatively impact social skills, education, privacy/security, and physical health. It then provides definitions and explanations of key computer concepts like input, processing, output, storage, and the basic components of a computer system including people, procedures, hardware, software, data, and communication.
You may have heard people talking about using an application or an app. But what exactly does that mean? An application (or app) is a type of software that allows you to perform specific tasks. Applications for desktop or laptop computers are sometimes called desktop applications, and those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it. Much of the time, you will have more than one application open at the same time, and this is known as multitasking.
Click here for more!! https://ph.seekweb.com/ws?
This document provides an introduction to computing and describes different types of computers. It outlines the course, including assignments and marking schemes. Computers are defined as machines that can perform computations based on instructions. They are not intelligent on their own and require human programming. Various computer types are described for individual and organizational use, including desktops, notebooks, tablets, servers, mainframes, and supercomputers. Supercomputers are the most powerful and are used for complex simulations in fields like weather forecasting and automotive safety testing. Students are directed to readings to supplement the course material.
This document provides a 10-lesson introduction to computers. [Lesson 1 defines computers and their basic components and common uses. Lesson 2 discusses computer hardware, including the monitor, tower, keyboard, mouse and other peripherals. Lesson 3 demonstrates computer ports and buttons.] The remaining lessons cover operating systems, software, internet connectivity, online safety, cloud computing, mobile devices and cleaning computers. The document aims to build basic understanding of computers for new users.
The document provides an introduction to computers including definitions of key terms like hardware, software, operating systems, applications and networks. It describes the typical components of a computer system including input/output devices, storage, processors and memory. It outlines different categories of computers like desktops, laptops, tablets, servers and embedded devices. It gives examples of how computers are used in various settings like homes, small businesses, enterprises, and across society in areas like education, healthcare, government and more.
This document discusses the classification of computers based on their purpose, size, and data handling capabilities. It describes different types of computers including general purpose computers, specific purpose computers, analog computers, digital computers, hybrid computers, microcomputers, minicomputers, mainframe computers, and supercomputers. It provides examples of the world's fastest supercomputers and lists the top 10 computer manufacturers as of 2019.
The document defines and describes the key components of computers. It discusses that a computer is an electronic device that processes data according to stored instructions to produce information. The main components include the input and output devices, storage, processor, memory, and software. It also covers different types of computers like personal computers, mobile devices, servers, and embedded systems.
This document discusses several topics related to information and communication technology (ICT), including:
1. The effects of software piracy, hacking, and computer viruses and how to protect yourself.
2. How ICT has both increased jobs in fields like IT and decreased jobs in areas like manufacturing and secretarial work.
3. Examples of microprocessor-controlled devices used for entertainment and around the home, and how these have impacted lifestyles.
4. Capabilities and limitations of ICT, internet use issues like phishing, reliability of online information, and encryption.
5. Potential health issues from prolonged ICT use like repetitive strain injury.
6. Safety concerns regarding overloading electrical sockets, trailing
The document discusses the positive and negative effects of technology on various aspects of life. It describes how technology has improved communication, business/trade, education, and medicine by allowing people to connect across long distances more easily and access information online. However, it also notes that overuse of technology can negatively impact social skills, education, privacy/security, and physical health. It then provides definitions and explanations of key computer concepts like input, processing, output, storage, and the basic components of a computer system including people, procedures, hardware, software, data, and communication.
You may have heard people talking about using an application or an app. But what exactly does that mean? An application (or app) is a type of software that allows you to perform specific tasks. Applications for desktop or laptop computers are sometimes called desktop applications, and those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it. Much of the time, you will have more than one application open at the same time, and this is known as multitasking.
Click here for more!! https://ph.seekweb.com/ws?
This document provides an introduction to computing and describes different types of computers. It outlines the course, including assignments and marking schemes. Computers are defined as machines that can perform computations based on instructions. They are not intelligent on their own and require human programming. Various computer types are described for individual and organizational use, including desktops, notebooks, tablets, servers, mainframes, and supercomputers. Supercomputers are the most powerful and are used for complex simulations in fields like weather forecasting and automotive safety testing. Students are directed to readings to supplement the course material.
The document provides an overview of key concepts from Chapter 1 of Discovering Computers 2011: Living in a Digital World including defining computers and their components, networks and the internet, different categories of computers, and applications of computers in society. It discusses the basic components of a computer including hardware such as input/output devices and the system unit, as well as software. The document also summarizes different types of computer users and how computers are used in areas like education, finance, and manufacturing.
Computers can be categorized in several ways such as by their intended user (individual, group, or no people), processing power, price, hardware, and software. Six common types of computers for individual use are desktops, workstations, notebooks, tablets, handhelds, and smartphones. Computers are important in today's society for communication, business, education, entertainment, finances, and uses in various sectors like homes, schools, small businesses, industry, government, and healthcare.
This document provides an introduction to computers, including defining what a computer is, its components, types of software, categories of computers, and applications of computers in society. A computer is an electronic device that processes data into information. The main components are the central processing unit, memory, storage, input/output devices, and communications devices. There are various categories of computers including personal computers, mobile devices, servers, and embedded computers. Computers provide advantages like speed and storage but also disadvantages such as health risks and impacts on privacy and the environment.
The document discusses software copyright, describing how copyright law protects the creators of original software by prohibiting copying, sharing, or distributing the software without permission. It notes that creating software can involve significant time and effort, so copyright protects this work. The document also provides examples of how to identify genuine licensed software versus pirated copies.
The document discusses the fundamentals of computers. It defines a computer as an electronic device that converts data into information. Modern computers are digital, using two digits (0 and 1) to represent data, while older analog computers represented data through a range of values. The document outlines different types of computers including desktops, workstations, notebooks, tablets, handheld devices, smartphones, servers, and mainframes. It discusses how computers are used in various sectors of society such as education, business, healthcare, government, and industries. The document also covers the components of a computer system including hardware, software, data, and users. It defines the types of system software and application software.
Computer application appreciation unit iAndreaTugwell
This document provides an overview of computers including their history, components, functions, advantages, disadvantages and impact on society. It discusses the three generations of computers from the first generation in 1937 using vacuum tubes to today's third generation using integrated circuits. The functions of computers including input, output, storage, and processing are described. Advantages include speed, accuracy and cost effectiveness while disadvantages include viruses, online crimes and reduced job opportunities. The widespread adoption of computers has changed how we shop, communicate and access information.
The document discusses the fundamentals of computers including their components, categories, uses, and role in society. It describes the basic parts of a computer as an input, output, processor, and storage. Computers come in many sizes from personal to supercomputers and are used by individuals, businesses, schools, and more. The internet connects computers globally and is used for communication, information, commerce, and entertainment.
A computer is an electronic device that can store, retrieve, and process data. Computers come in many forms including desktops, laptops, tablets, servers, phones, game consoles, and TVs. They all contain hardware components and run software programs. The main types of personal computers are PCs, which typically run Windows, and Macs, which are made by Apple and run Mac OS. This document provided an overview of computers, hardware vs. software, common computer types, and the differences between PCs and Macs.
The document provides an overview of topics to be covered in a lesson about living in the Information Technology Era. The objectives include defining ICT and tracing technology evolution, differentiating device types, and describing the relationships between data, information, and key Internet concepts. It also covers digital security risks, operating systems versus applications, and how society uses technology in various fields. The lesson defines key terms and discusses the history and components of computers, including inputs, outputs, storage, and the system unit.
This document discusses how computers can be used to develop society. It outlines several uses of computers including for personal use, education, entertainment, healthcare, agriculture, and more. It then describes some proposed future home devices like room-mounted computers, emotional containers, and interactive tables. It also discusses uses of computers for activities like banking, shopping, education, and entertainment. Finally, it outlines how computers are used in healthcare, agriculture, and some agricultural software that has been developed.
This document provides an overview of the objectives and content covered in the CSC134 course on computer and information processing. The key topics covered include:
1) An introduction to computers and their components, including the system unit, storage, input/output devices, and how data is processed.
2) Different categories of computers like personal computers, mobile devices, servers, and their uses.
3) Computer software, including system software, application software, and programming.
4) How computers are used in various fields like education, healthcare, manufacturing, and by different types of users.
5) Networks and the internet, and how people and organizations utilize these technologies.
6) The impact
Malicious software like viruses, worms, Trojan horses, and spyware can threaten computer systems and data. Viruses infect files and replicate without permission, while worms spread independently without infecting files. Trojan horses appear harmless but have hidden functions, and spyware secretly collects user information. Antivirus software detects and removes viruses through regular definition updates. Data backup and recovery tools are important for recovering from data loss due to hardware failure, software issues, or disasters. Encryption works like locking data in boxes with keys to ensure security during transmission. Firewalls control network traffic to only allow authorized communication. Social networking enables sharing of interests online through sites that facilitate community creation.
This document provides an overview of computer applications in management. It discusses the role of computers and how they have impacted every sphere of human activity. It then covers the personal benefits of learning about computers, such as improved employment prospects and greater self-sufficiency. The document also examines how information technology has influenced business organizations by enabling faster response times, communication, and decision-making. It provides examples of how IT has been applied to key management areas like accounting, finance, marketing, production, and human resources. Finally, the document defines what a computer is and describes the components of a basic computer system.
The document discusses various topics related to connecting and communicating online, including:
1) It provides an overview of the evolution of the Internet from its origins as ARPANET in 1969 to connect scientists, to today's network of millions of connected devices.
2) It describes different types of broadband Internet connections including wired options like cable and DSL and wireless options like Wi-Fi and mobile broadband.
3) It explains key online concepts like IP addresses and domain names, how browsers work, the components of a web address, and effective search techniques.
The document provides an overview of information technology topics including:
- The definition and uses of information technology in education, health, money, entertainment, government, and jobs.
- The history and evolution of computers from mainframes to today's desktops, laptops, and microcontrollers.
- Key components of a computer including hardware, software, input/output, storage, and how to build your own PC.
- Trends in the future development of computers toward miniaturization, increased speed and affordability.
Now your search ends here... BATRA COMPUTER CENTRE provides you the best computer training in Ambala Cantt. We offer you training in courses like Basics of Computer, training in Programming Languages like C & C++, training in Web Designing , training in Web Develoopment, training in SEO and many more...
This document defines and describes various Information and Communication Technology (ICT) tools. It begins by defining ICT as technologies that support communication and the transmission of information, including computers, wireless networks, and software. It then explains that ICT in education enhances learning through technologies like computers, laptops, and interactive whiteboards. The document proceeds to describe different types of computers from personal computers to supercomputers. It also discusses digital cameras, interactive whiteboards, visualizers, and various mobile technologies like tablets, smartphones, and their applications like Skype and video conferencing.
Information Technology and Modern Gadgets: Introduction, Utilization of Various Gadgets, Advantages of modern gadgets, Disadvantages of modern gadgets, Top 10 gadgets in India with small description.
This document introduces computers and their basic components. It defines a computer as an electronic device that processes data. The four main parts of a computer system are hardware, software, data, and people. Hardware refers to the physical parts of the computer, software contains the computer's instructions, data is the raw facts manipulated by the computer, and people are the users. The document outlines the four types of computer hardware, two categories of software and their purposes, and four common types of computers and the jobs they perform best.
Basic introduction to mobile technology (e-readers vs. tablets, OS vs. Android, etc.) and links to getting started from the ground up with four mobile devices.
This is the Referral Institute Community Meeting presentation I did for the members, making them discover apps relevant for Business and life in general.
The document discusses go-to-market (GTM) strategy, which it defines as an action plan that specifies how a company will reach customers and achieve competitive advantage by delivering products and services in line with factors like pricing and distribution. It notes that GTM strategy provides a blueprint for connecting with potential customers and fulfilling brand promises. The document then covers why GTM is important, what determines an effective GTM strategy, common stages and approaches to GTM, and best practices for developing a GTM strategy.
The document provides an overview of key concepts from Chapter 1 of Discovering Computers 2011: Living in a Digital World including defining computers and their components, networks and the internet, different categories of computers, and applications of computers in society. It discusses the basic components of a computer including hardware such as input/output devices and the system unit, as well as software. The document also summarizes different types of computer users and how computers are used in areas like education, finance, and manufacturing.
Computers can be categorized in several ways such as by their intended user (individual, group, or no people), processing power, price, hardware, and software. Six common types of computers for individual use are desktops, workstations, notebooks, tablets, handhelds, and smartphones. Computers are important in today's society for communication, business, education, entertainment, finances, and uses in various sectors like homes, schools, small businesses, industry, government, and healthcare.
This document provides an introduction to computers, including defining what a computer is, its components, types of software, categories of computers, and applications of computers in society. A computer is an electronic device that processes data into information. The main components are the central processing unit, memory, storage, input/output devices, and communications devices. There are various categories of computers including personal computers, mobile devices, servers, and embedded computers. Computers provide advantages like speed and storage but also disadvantages such as health risks and impacts on privacy and the environment.
The document discusses software copyright, describing how copyright law protects the creators of original software by prohibiting copying, sharing, or distributing the software without permission. It notes that creating software can involve significant time and effort, so copyright protects this work. The document also provides examples of how to identify genuine licensed software versus pirated copies.
The document discusses the fundamentals of computers. It defines a computer as an electronic device that converts data into information. Modern computers are digital, using two digits (0 and 1) to represent data, while older analog computers represented data through a range of values. The document outlines different types of computers including desktops, workstations, notebooks, tablets, handheld devices, smartphones, servers, and mainframes. It discusses how computers are used in various sectors of society such as education, business, healthcare, government, and industries. The document also covers the components of a computer system including hardware, software, data, and users. It defines the types of system software and application software.
Computer application appreciation unit iAndreaTugwell
This document provides an overview of computers including their history, components, functions, advantages, disadvantages and impact on society. It discusses the three generations of computers from the first generation in 1937 using vacuum tubes to today's third generation using integrated circuits. The functions of computers including input, output, storage, and processing are described. Advantages include speed, accuracy and cost effectiveness while disadvantages include viruses, online crimes and reduced job opportunities. The widespread adoption of computers has changed how we shop, communicate and access information.
The document discusses the fundamentals of computers including their components, categories, uses, and role in society. It describes the basic parts of a computer as an input, output, processor, and storage. Computers come in many sizes from personal to supercomputers and are used by individuals, businesses, schools, and more. The internet connects computers globally and is used for communication, information, commerce, and entertainment.
A computer is an electronic device that can store, retrieve, and process data. Computers come in many forms including desktops, laptops, tablets, servers, phones, game consoles, and TVs. They all contain hardware components and run software programs. The main types of personal computers are PCs, which typically run Windows, and Macs, which are made by Apple and run Mac OS. This document provided an overview of computers, hardware vs. software, common computer types, and the differences between PCs and Macs.
The document provides an overview of topics to be covered in a lesson about living in the Information Technology Era. The objectives include defining ICT and tracing technology evolution, differentiating device types, and describing the relationships between data, information, and key Internet concepts. It also covers digital security risks, operating systems versus applications, and how society uses technology in various fields. The lesson defines key terms and discusses the history and components of computers, including inputs, outputs, storage, and the system unit.
This document discusses how computers can be used to develop society. It outlines several uses of computers including for personal use, education, entertainment, healthcare, agriculture, and more. It then describes some proposed future home devices like room-mounted computers, emotional containers, and interactive tables. It also discusses uses of computers for activities like banking, shopping, education, and entertainment. Finally, it outlines how computers are used in healthcare, agriculture, and some agricultural software that has been developed.
This document provides an overview of the objectives and content covered in the CSC134 course on computer and information processing. The key topics covered include:
1) An introduction to computers and their components, including the system unit, storage, input/output devices, and how data is processed.
2) Different categories of computers like personal computers, mobile devices, servers, and their uses.
3) Computer software, including system software, application software, and programming.
4) How computers are used in various fields like education, healthcare, manufacturing, and by different types of users.
5) Networks and the internet, and how people and organizations utilize these technologies.
6) The impact
Malicious software like viruses, worms, Trojan horses, and spyware can threaten computer systems and data. Viruses infect files and replicate without permission, while worms spread independently without infecting files. Trojan horses appear harmless but have hidden functions, and spyware secretly collects user information. Antivirus software detects and removes viruses through regular definition updates. Data backup and recovery tools are important for recovering from data loss due to hardware failure, software issues, or disasters. Encryption works like locking data in boxes with keys to ensure security during transmission. Firewalls control network traffic to only allow authorized communication. Social networking enables sharing of interests online through sites that facilitate community creation.
This document provides an overview of computer applications in management. It discusses the role of computers and how they have impacted every sphere of human activity. It then covers the personal benefits of learning about computers, such as improved employment prospects and greater self-sufficiency. The document also examines how information technology has influenced business organizations by enabling faster response times, communication, and decision-making. It provides examples of how IT has been applied to key management areas like accounting, finance, marketing, production, and human resources. Finally, the document defines what a computer is and describes the components of a basic computer system.
The document discusses various topics related to connecting and communicating online, including:
1) It provides an overview of the evolution of the Internet from its origins as ARPANET in 1969 to connect scientists, to today's network of millions of connected devices.
2) It describes different types of broadband Internet connections including wired options like cable and DSL and wireless options like Wi-Fi and mobile broadband.
3) It explains key online concepts like IP addresses and domain names, how browsers work, the components of a web address, and effective search techniques.
The document provides an overview of information technology topics including:
- The definition and uses of information technology in education, health, money, entertainment, government, and jobs.
- The history and evolution of computers from mainframes to today's desktops, laptops, and microcontrollers.
- Key components of a computer including hardware, software, input/output, storage, and how to build your own PC.
- Trends in the future development of computers toward miniaturization, increased speed and affordability.
Now your search ends here... BATRA COMPUTER CENTRE provides you the best computer training in Ambala Cantt. We offer you training in courses like Basics of Computer, training in Programming Languages like C & C++, training in Web Designing , training in Web Develoopment, training in SEO and many more...
This document defines and describes various Information and Communication Technology (ICT) tools. It begins by defining ICT as technologies that support communication and the transmission of information, including computers, wireless networks, and software. It then explains that ICT in education enhances learning through technologies like computers, laptops, and interactive whiteboards. The document proceeds to describe different types of computers from personal computers to supercomputers. It also discusses digital cameras, interactive whiteboards, visualizers, and various mobile technologies like tablets, smartphones, and their applications like Skype and video conferencing.
Information Technology and Modern Gadgets: Introduction, Utilization of Various Gadgets, Advantages of modern gadgets, Disadvantages of modern gadgets, Top 10 gadgets in India with small description.
This document introduces computers and their basic components. It defines a computer as an electronic device that processes data. The four main parts of a computer system are hardware, software, data, and people. Hardware refers to the physical parts of the computer, software contains the computer's instructions, data is the raw facts manipulated by the computer, and people are the users. The document outlines the four types of computer hardware, two categories of software and their purposes, and four common types of computers and the jobs they perform best.
Basic introduction to mobile technology (e-readers vs. tablets, OS vs. Android, etc.) and links to getting started from the ground up with four mobile devices.
This is the Referral Institute Community Meeting presentation I did for the members, making them discover apps relevant for Business and life in general.
The document discusses go-to-market (GTM) strategy, which it defines as an action plan that specifies how a company will reach customers and achieve competitive advantage by delivering products and services in line with factors like pricing and distribution. It notes that GTM strategy provides a blueprint for connecting with potential customers and fulfilling brand promises. The document then covers why GTM is important, what determines an effective GTM strategy, common stages and approaches to GTM, and best practices for developing a GTM strategy.
This project report analyzes the market operations of business partners in the stock broking industry and their future prospects. The objective is to understand the strategies, services, and opportunities of competitors. Through a survey of 50 business partners, the report finds that while most brokers offer good product support and processing, marketing assistance is poor. It also finds opportunities in changing demographics, economic growth, and increasing investment. The conclusion is that Reliance Money has advantages in brand, price, and products, and the overall industry has a bright future with more investors and money movement. Suggestions include improved training, promotions, and streamlining documentation processes.
This document outlines the key steps to developing an effective go-to-market strategy. It discusses defining the market opportunity, building a budget model with clear goals, identifying the overall strategy for delivering the product or service, outlining specific tactics for the first year, and identifying and managing risks. Key elements include understanding market dynamics, setting revenue and margin targets, determining how the service will be delivered and why customers will buy it, defining required organizational changes and marketing activities, and establishing metrics to monitor strategy success over time.
Brand Activation through Events + Client Entertainment in the 21st Century Ev...Ruud Janssen, DES, CMM
Event Sports Entertainment Conference,
Glion, Montreux, Switzerland 18 November 2011
Brand activation and Client Entertainment in the 21st Century. How events grow business by thinking outside the Room. The value of meetings and events and their business impact.
Presentation by Ruud Janssen, MD TNOC.ch and curator TEDxBasel
Percept Ltd is an experiential marketing agency with over 120 team members across 10 cities in India. The agency specializes in brand activations, events, sports marketing, and entertainment. They have worked with major clients across banking, insurance, consumer durables, automobiles, FMCG, IT, and other industries. The document provides examples of various on-ground marketing campaigns and events the agency has executed, including mall activations, celebrations & decor, store activations, corporate events, float promotions, airport activations, and school programs.
This document provides an overview of Reliance Money and mutual funds in India. It discusses the history and growth of mutual funds in India, starting with the establishment of UTI in 1963. It profiles Reliance Money, a subsidiary of Reliance Capital that offers various financial products and services including investments in stocks, mutual funds, insurance policies, commodities, and structured products. The document also describes the types of mutual fund schemes available in India and the regulations governing the mutual fund industry.
SCSPL is a BTL specialist company that helps brands grow their market share through non-standard advertising techniques. Some of SCSPL's current clients include HDFC Bank, ICICI Bank, Axis Bank, and Tata Teleservices. SCSPL has experience conducting various BTL campaigns for its clients such as sticker campaigns on autos, printed canvases on rickshaws, branding traffic signage, danglers on vehicles, and no parking boards. The document provides examples of campaigns SCSPL has run for HDFC Bank, ICICI Bank, and Axis Bank in Bihar and Jharkhand.
This document provides information about Reliance Communications' market survey and product promotion project. It includes an introduction to Reliance Communications, their mission, vision, products, plans, research methodology used in the project, findings, and recommendations. The project aimed to help Reliance Communications develop marketing strategies by gaining insights into customer preferences and the competitive landscape.
The document is an internship report submitted by Md. Saidur Rahman Said on his internship at Jamuna Bank Limited. It discusses Jamuna Bank's advertisement and promotion strategies.
The report contains chapters on the organizational overview of Jamuna Bank, their products and services, their current advertisement and promotion strategies, the intern's job responsibilities and observations during the internship, research methodology used in the report, findings and conclusions.
The report evaluates Jamuna Bank's existing advertisement and promotion strategies and provides recommendations to improve their marketing efforts.
A study on investors’ awareness level on mutual fund & promotion of sip planProjects Kart
Here are the key tables from the document:
Table 2.1 - Shows total net asset in U.S. Dollars for mutual funds globally from 1980 to 2018.
Table 2.4 - Provides the latest AUM (assets under management) and ranking for top mutual funds in India.
Table 3.1 - Provides a snapshot of different types of mutual fund schemes.
Table 3.2 - Outlines the tax rules for mutual fund investors in India.
Table 3.3 - Defines the statistical measure R-squared.
Table 3.4 - Shows the returns that can be generated through SIP (Systematic Investment Plan) over different time periods.
Table 3.5 - Describ
Building the 10x better bank, by @joukpleiter & @jelmerdejong
Slides of the November 11, 2015 webinar 'Omni-channel banking & the digital transformation roadmap'.
In this webinar, Jouk Pleiter and Jelmer de Jong of Backbase will talk about building the 10-times-better bank.
The financial services market is going through many changes. New challengers have appeared and are looking for a slice of the market. In addition, customers are more demanding and more informed, expecting convenience and simplicity when it comes to financial services, particularly online and via mobile devices. People love digital services such as Netflix, Amazon, and Uber because they’re easy to use and deliver great customer experiences. They deliver 10 times more convenience and better customer experiences than the status quo, and are therefore winning the market. It’s only a matter of time before the 10-times-better bank is founded, a thought that's on the radar of every banker.
In this webinar, we outline the journey of creating the 10-times-better bank, providing a detailed analysis of how banks can begin their digital journey, with a strong focus on five main points:
1) new competitors in banking: the disrupters
2) customer experience: the key ingredients
3) omni-channel and the changing channel mix
4) mobile's impact on online sales and share of wallet
5) regaining control in the era of digitization
Marketing and how atl and btl activity relate to marketing mc presentationSyed Salman
This document discusses Above the Line (ATL) and Below the Line (BTL) marketing activities and how they relate to marketing. ATL activities include television, radio, print media and billboards which allow mass communication. BTL involves more targeted and personal approaches like direct mail, events, promotions, and product demos to directly reach consumers. Both ATL and BTL techniques are used to effectively target customers depending on the product.
Dokumen tersebut membahas tentang brand innovation dan activation. Terdapat beberapa poin penting yaitu definisi brand sebagai persepsi konsumen, pentingnya diferensiasi produk untuk menciptakan identitas brand, serta aktivasi brand yang bertujuan meningkatkan brand awareness dan membangun hubungan dengan pelanggan melalui berbagai kanal komunikasi.
This document outlines a brand promotion project for retailers and active retail outlet owners in metro and mini-metro areas. It proposes various in-store activation ideas like puzzles, spinning wheels, and quizzes to build brand awareness, interest, and demand among retailers. It also suggests outdoor activities like processions, installations, and wall paintings to generate brand recognition among customers. The goal is to engage retailers through interactive learning activities and establish brand loyalty among customers through demonstrations and visibility campaigns.
The document discusses going green and organic banking. It describes organic banking as using eco-friendly technology to process payments at a lower cost than traditional methods. This includes e-payroll, e-payment cards, e-wallets, and electronic accounts receivable networks that allow businesses to send and receive payments electronically domestically and abroad with significant savings.
This document provides an overview of basic sales promotion techniques. It defines sales promotion as a planned marketing activity that enhances a product or service's appeal and positively changes consumer behavior in return for an additional benefit. The document outlines various types of sales promotions like temporary price discounts, coupons, bonus packs, sampling, premiums, and sweepstakes. It also discusses the impact of promotions on consumers in economic, emotional and informational ways. Additionally, the benefits of promotions for timed purchasing, brand switching, and increased volume are presented, as well as some potential problems like lack of brand building and orienting managers to the short-term.
Categories of Computers in Information Technology.pdfrljruga
There are four main categories of computers: mainframe computers, supercomputers, minicomputers, and microcomputers or personal computers. Mainframe computers are large, powerful computers used by many users at the same time in large organizations. Supercomputers are the fastest and most powerful computers capable of processing over a quadrillion instructions per second. Minicomputers are medium-sized computers between mainframes and microcomputers, also used by many users. Microcomputers or personal computers can perform all computing tasks independently and include PCs, laptops, tablets, and other devices for individual use.
This document provides an introduction to computers, including their components, uses, and categories. It discusses how computers are used everywhere in daily life for tasks like searching information, editing photos, and sending messages. The key components of a computer are described as the input devices, output devices, system unit, storage devices, and communication devices. Examples of each type of component are also provided. The document outlines the advantages of computers as speed, reliability, storage, and communication capabilities. Potential disadvantages are also summarized as health risks, privacy violations, safety issues, and impacts on the workforce and environment. Finally, different categories of computers are defined, such as personal computers, mobile devices, servers, and supercomputers.
This document provides an overview of computers, including what they are, their basic components, and different types. It defines a computer as an electronic device that can store, process, and retrieve data. Computers have both hardware, the physical parts, and software, sets of instructions. There are many types of computers including desktops, laptops, tablets, servers, smartphones, wearables, and game consoles. The document also discusses the information processing cycle of input, processing, storage, and output, as well as common uses of computers like calculations, word processing, data storage, and communications.
clasification of digital computer and application of computersJelz JZ
This document classifies and describes various types of digital computers and their applications. It divides computers into categories such as personal computers, laptops, network computers, mini/microcomputers, PDAs, workstations, servers, mainframes, and supercomputers. It then provides details on personal computers, laptops, network computers, mini/microcomputers, PDAs, workstations, servers, and mainframes. Finally, it discusses the characteristics of computers and their various applications in areas like education, science, industry, entertainment, business, and government.
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
Information technology is changing nearly every aspect of modern life. It refers to any technology that helps produce, manipulate, store, communicate, or disseminate information. The document discusses how IT is affecting education, health, finance, government, jobs, and personal life. It also outlines the basic components of computers, including hardware, software, data storage, input/output, and how data is turned into useful information. The future of IT is focused on greater portability, personalization, collaboration, cloud computing and artificial intelligence as computers and communications continue to converge.
This chapter introduces computers and their basic components. It defines a computer as an electronic device that can accept data as input, process the data, produce output, and store results. The main components of a computer are the system unit, input devices, output devices, storage devices, and communication devices. Examples of input devices include keyboards, mice, and scanners, while common output devices are monitors and printers. The chapter also discusses computer networks, the internet, and how they allow sharing of resources. It introduces concepts such as websites, webpages, web applications, blogs, podcasts, and how they are categorized as Web 2.0 sites.
This document provides a classification of different types of digital computers and their applications. It classifies computers as personal computers, laptops, network computers, mini/microcomputers, PDAs, workstations, servers, mainframes, and supercomputers. It then describes each type and provides some key applications for personal computers, education, science, industry, entertainment, business, and government. These include uses like documentation, gaming, education, research, software development, e-commerce, banking, weather forecasting, and more. It also outlines the basic components of a computer including input, output, CPU and memory.
This document provides an overview of basic information technology concepts including what IT is, common uses of computers and IT, hardware and software components, networking, the internet, cloud computing, and careers in IT. Specifically, it defines IT as the development, maintenance and use of computer systems and networks for processing and distributing data. It lists several common uses of IT in education, business, healthcare, entertainment and government. It also describes basic hardware, software, networking and internet components. Finally, it outlines several common IT careers such as web developer, network administrator, data analyst and IT manager.
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptxNourhanTarek23
This document provides information about a computer science course, including the course outline, textbook, evaluation criteria, and lecture topics. It also provides an introduction to the world of computers by discussing how computers are used in daily life and the basic functions of computers, including input, processing, output, storage, and communication. It defines the key components of computer hardware and software. It describes different types of computer users and professionals. It outlines the six main categories of computers: embedded systems, mobile devices, personal computers, servers, mainframes, and supercomputers.
A computer is an electronic device that processes data through an input device, storage, and output device. It contains hardware components like a system unit, storage, input, and output devices. Computers provide advantages like speed, reliability, and consistency but also health risks and impact privacy and the environment. Networks connect computers through communication devices and the Internet is a worldwide collection of networks used for communication, research, shopping, banking, entertainment and more. Computer software includes operating systems, applications, and programs that tell the computer how to process data. There are different types of computers including personal computers, mobile devices, servers, mainframes, supercomputers, and embedded computers.
Fundamentals of computer and information system(unit 1)SURBHI SAROHA
This document provides an overview of fundamentals of computer and information systems. It defines a computer as an electronic device that can store, process, and arrange information to produce outputs. The document then discusses characteristics of computers like speed, accuracy, versatility, and reliability. It outlines advantages such as multitasking, speed, data storage capacity, and accuracy. Limitations including viruses, cybercrimes, environmental impacts, and health issues are also summarized. The document categorizes types of computers as supercomputers, mainframes, minicomputers, workstations, and personal computers. It concludes by listing applications of computers in fields like banking, education, industries, entertainment, hospitals, and data processing.
Lesson 2.0 definition, importance, and advantages of computersJoshua Hernandez
This document defines computers and discusses their importance. It provides a modern definition of a computer as a multipurpose device that accepts input, processes data, stores data, and produces output according to stored instructions. It then lists key characteristics of computers like speed, storage, and accuracy. The document also outlines advantages like speed and reliability, and disadvantages such as health risks and impacts on the environment and workforce. Finally, it discusses the importance of computers in providing knowledge and information.
The document provides an overview of computers and their uses in society. It defines what a computer is and describes the typical components of a computer system, including input/output devices, the system unit, storage devices, and communications devices. It then discusses different categories of computers like personal computers, mobile devices, servers, and supercomputers. The document also outlines common computer applications in fields like education, healthcare, science, publishing, and manufacturing.
This document provides an overview of key computer concepts including the five components of a computer, advantages and disadvantages of computer use, definitions of terms like data, information, and networks. It describes different categories of computers from personal to supercomputers and embedded systems. Various types of computer users are defined from home to enterprise levels. The document concludes by outlining many societal applications of computers in fields such as education, finance, government, healthcare, science, publishing, travel and manufacturing.
This document provides an introduction to computers, including their history, components, uses, and impact on society. It defines what a computer is and its basic functions of input, processing, output, storage, and communication. It also describes the major types of computers from embedded devices to supercomputers. Additionally, it explains computer networks and key Internet concepts like IP addresses, URLs, and email. Both the benefits of computers in our lives are discussed, such as access to information, as well as some risks like privacy issues and information integrity.
This document provides an overview of Chapter 1 of the course "Introduction to Computer Applications". It defines what a computer is and discusses the components of a computer including input, output, storage, and processing devices. It also covers different types of computers categorized by size and use such as personal computers, mobile devices, servers, and embedded computers. Examples are given for how computers are used in various applications in society.
The document provides information on various web technologies including Telnet, Usenet, WAIS, Bulletin Board Service, and Gopher. It also covers internet addressing using IP addresses and domains. Finally, it discusses HTML (Hypertext Markup Language), the basic building block for web pages, including tags, elements, attributes, and the basic HTML document structure with the <html>, <head>, and <body> sections.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Astute Business Solutions | Oracle Cloud Partner |
The World of Information
1. The new world of
Information
Theory & techniques for easily
finding information online
2. The computer: What does it do really?
•Data & Information processing
• The sciences concerned with gathering,
manipulating, storing, retrieving, and classifying
recorded information
• Carries out an Information Processing Cycle same a
your brain does
6. Disadvantages
of Information Technology
• Violation of Privacy: In many instances, where personal and confidential records stored on computers were
not protected properly, individuals have found their privacy violated and identities stolen
• Public Safety: Adults, teens, and children around the world are using computers to share publicly their photos,
videos, journals, music, and other personal information. Some of these unsuspecting, innocent computer users
have fallen victim to crimes committed by dangerous strangers
• Impact on Labor Force: Although computers have improved productivity and created an entire industry with
hundreds of thousands of new jobs, the skills of millions of employees have been replaced by computers. Thus,
it is crucial that workers keep their education up-to-date. A separate impact on the labor force is that some
companies are outsourcing jobs to foreign countries instead of keeping their homeland labor force employed
• Health Risks: Prolonged or improper computer use can lead to health injuries or disorders. Computer users can
protect themselves from health risks through proper workplace design, good posture while at the computer, and
appropriately spaced work breaks. Two behavioural health risks are computer addiction and technology
overload. Computer addiction occurs when someone becomes obsessed with using a computer. Individuals
suffering from technology overload feel
distressed when deprived of computers and mobile devices
• Impact on Environment: Computer manufacturing processes and computer waste are depleting natural
resources and polluting the environment. Green computing involves reducing the electricity consumed and
environmental waste generated when using a computer. Strategies that support green computing include
recycling, regulating manufacturing processes, extending the life of computers, and immediately donating or
properly disposing of replaced computers
7. Software:
• System Software
• Computer software designed to operate and control the computer hardware
and to provide a platform for running application software
• Application Software
• Application software, also known as an application, is computer software
designed to help the user to perform singular or multiple related specific tasks.
Examples include enterprise software, accounting software, office suites,
graphics software, and media players
• Software Installation
• Installation (or setup) of a program (including drivers, plugins, etc.) is the act
of putting the program onto a computer system so that it can be executed
• Software Development
• Software development (also known as application development, software
design, designing software, software application development, enterprise
application development, or platform development[1]) is the development of a
software product
9. Tablet PCs Smart Phones
eBook Readers
Mp3 Players
Types of computers: Digital Cameras
Mobile Devices
10. Gaming has become so advanced that a
surgeon in this picture uses a gaming
console to enhance her dexterity as the
console is very accurate and precise
Types of computers:
Gaming Consoles
11. Types of computers:
Ever wondered where is all your email
Servers, Mainframes stored? The answer is: In a huge computer
called a “datacenter” which could be the
& Supercomputers size of your house
12. Types of computers: Soon all your kitchen appliances will be
connected to the internet; in fact with
advances in home automation, you can
Embedded Computers already do this. Embedded computing, like
in your car, can be integrated with your
home too.
13. Computer Usage: Home User
•Personal Financial Management
•Web Access
•Email
•Entertainment
14. Computer Usage: Small Office/Home Office
• Web Access
• Spreadsheets
• Word Processing
21. Important Internet Terms
you should know..
Find them on Google yourself!
• Web, WWW v/s The Internet
• http:// , https://
• Browser
• HTML / XML
• URL