Uses misuses and risk of software.
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Historical social & economic context of computingBurhan Ahmed
Historical social & economic context of computing.
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Historical social & economic context of computingBurhan Ahmed
Historical social & economic context of computing.
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
This lecture include introduction to software contracts. Before starting development companies prepare agreement document to deal with conflicts afterwards.
Digital forensics is the scientific examination and analysis of data held on or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law.
These Notes from the class of BS EDUCATION 1st Semester (Spring) Session 2023-2027 Teacher :Ch Naveed Afzal
semester started in march 2023 and end in july 2023
This lecture include introduction to software contracts. Before starting development companies prepare agreement document to deal with conflicts afterwards.
Digital forensics is the scientific examination and analysis of data held on or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law.
These Notes from the class of BS EDUCATION 1st Semester (Spring) Session 2023-2027 Teacher :Ch Naveed Afzal
semester started in march 2023 and end in july 2023
This is a documentation about software licences, legal requirements, processes involved, benefits of registering software, and implications of installing software.
This document is part of my IT coursework*
In this blog, you will gain a full understanding of the benefits of custom software, what to look for when hiring a custom software development company, the risks and costs, what to expect in the entire software development lifecycle, and how to ensure the success.
Read full article here: https://www.vrinsofts.com/an-ultimate-guide-to-custom-software-development/
What Is an App? Types of Apps and Examples
Apps are a significant part of the technology-driven world we live in and can enhance a person's life, enjoyment and productivity. Apps are also regularly used by companies both large and small to streamline production and increase ease of work. In this article, we discuss what an app is, the different types of apps and examples of common apps used today.
Click for more!!
https://www.indeed.com/career-advice/career-development/what-is-an-app
TLE-ICT COMPUTER SYSTEMS SERVICING DIAGNOSING COMPUTER SYSTEMizarahmendoza
Application software refers to computer programs designed to perform specific tasks or functions for end-users. Unlike system software, which manages computer hardware and provides a platform for running application software, application software is directly used by individuals or organizations to fulfill their needs.
Examples of application software include:
Word processors like Microsoft Word, Google Docs, or LibreOffice Writer for creating documents.
Spreadsheet software like Microsoft Excel, Google Sheets, or LibreOffice Calc for organizing and analyzing data.
Presentation software like Microsoft PowerPoint, Google Slides, or LibreOffice Impress for creating slideshows.
Web browsers like Google Chrome, Mozilla Firefox, or Microsoft Edge for accessing the internet.
Email clients like Microsoft Outlook, Gmail, or Mozilla Thunderbird for managing emails.
Graphics software like Adobe Photoshop, GIMP, or CorelDRAW for editing images.
Multimedia players like VLC media player, Windows Media Player, or iTunes for playing audio and video files.
Database management systems like Microsoft Access, MySQL, or Oracle for storing and managing data.
Accounting software like QuickBooks, Xero, or FreshBooks for managing financial transactions.
Project management software like Trello, Asana, or Microsoft Project for planning and organizing tasks and projects.
These are just a few examples, as application software covers a wide range of programs catering to various needs and industries.
Application software refers to computer programs or software applications designed to perform specific tasks or functions for users. This type of software is distinct from system software, which includes operating systems, device drivers, utilities, and other essential software that enables the computer to function.
Application software serves a wide range of purposes and can be categorized into various types based on their functions and usage. Some common categories of application software include:
Productivity Software: These are applications that help users create, edit, manage, and share documents, presentations, spreadsheets, and other types of files. Examples include Microsoft Office (Word, Excel, PowerPoint), Google Workspace (Docs, Sheets, Slides), and LibreOffice.
Communication Software: These applications facilitate communication between individuals or groups. They include email clients, instant messaging applications, video conferencing software, and collaborative tools. Examples include Microsoft Outlook, Gmail, Skype, Slack, and Zoom.
Web Browsers: Web browsers are software applications that allow users to access and interact with content on the World Wide Web. Examples include Google Chrome, Mozilla Firefox, Microsoft Edge, and Safari.
Media Players and Editors: These applications are used for playing and editing multimedia files such as audio, video, and images. Examples include VLC Media Player, Windows Media Player, Adobe Photoshop, and Adobe Premiere Pro.
You may have heard people talking about using an application or an app. But what exactly does that mean? An application (or app) is a type of software that allows you to perform specific tasks. Applications for desktop or laptop computers are sometimes called desktop applications, and those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it. Much of the time, you will have more than one application open at the same time, and this is known as multitasking.
Click here for more!! https://ph.seekweb.com/ws?
Don't know why software development is much more valuable than programming? Each software developer can program, but not every programmer can develop a software.
Learn fundamental principles of software development you should know when hiring/managing IT specialists from our latest presentation.
Wireless communications is a type of data communication that is performed and delivered wirelessly. This is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
A virtual function a member function which is declared within a base class and is re-defined(Overriden) by a derived class. When you refer to a derived class object using a pointer or a reference to the base class, you can call a virtual function for that object and execute the derived class's version of the function.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
A computer is a machine that can be programmed to manipulate symbols. Its principal characteristics are: It responds to a specific set of instructions in a well-defined manner. It can execute a prerecorded list of instructions (a program). It can quickly store and retrieve large amounts of data.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
A tree is a nonlinear data structure, compared to arrays, linked lists, stacks and queues which are linear data structures. A tree can be empty with no nodes or a tree is a structure consisting of one node called the root and zero or one or more sub-trees.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Network topology refers to the physical or logical layout of a network. It defines the way different nodes are placed and interconnected with each other.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductBurhan Ahmed
The Quran describes Muhammad (S.A.W) as being 'on exalted quality of character' (68:4) and refers to him as 'an excellent example' (33:21) which ultimately means that the religious and moral examples, set by Muhammad, are to be followed and cultivated by the Muslims in order to construct a morally good character.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
A software house is a company that primarily provides software products. ... The common definition is that the company is mainly invested in developing and distributing software products.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
A social interaction is an exchange between two or more individuals and is a building block of society. Social interaction can be studied between groups of two (dyads), three (triads) or larger social groups. By interacting with one another, people design rules, institutions and systems within which they seek to live.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
An individual who is looked up to and revered by someone else. A role model is someone who other individuals aspire to be like, either in the present or in the future. A role model may be someone who you know and interact with on a regular basis, or may be someone who you've never met, such as a celebrity.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Rights- Things to which you are entitled or allowed and freedoms that are guaranteed. Each person is a moral and rational being who deserves to be treated with dignity. Duty is something you must do by virtue of your position and is a legal or moral obligation.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Planning involves defining the organization's goals, establishing an overall strategy for achieving those goals, and developing plans for organizational work activities. ... reducing uncertainty, minimizing waste and redundancy, and establishing the goals or standards used in controlling.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
A peripheral device is defined as a computer device, such as a keyboard or printer, that is not part of the essential computer (i.e., the memory and microprocessor). These auxiliary devices are intended to be connected to the computer and used.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Parallel computing and its applicationsBurhan Ahmed
Parallel computing is a type of computing architecture in which several processors execute or process an application or computation simultaneously. Parallel computing helps in performing large computations by dividing the workload between more than one processor, all of which work through the computation at the same time. Most supercomputers employ parallel computing principles to operate. Parallel computing is also known as parallel processing.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
In computer programming, operator overloading, sometimes termed operator ad hoc polymorphism, is a specific case of polymorphism, where different operators have different implementations depending on their arguments. Operator overloading is generally defined by a programming language, a programmer, or both.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Normalization is the process of reorganizing data in a database so that it meets two basic requirements:
(1) There is no redundancy of data (all data is stored in only one place),
(2) data dependencies are logical (all related data items are stored together).
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Strategic management is the continuous planning, monitoring, analysis and assessment of all that is necessary for an organization to meet its goals and objectives. ... The strategic management process involves analyzing cross-functional business decisions prior to implementing them.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Letter writing is the exchange of written or printed messages. Distinctions are commonly drawn between personal letters (sent between family members, friends, or acquaintances) and business letters (formal exchanges with businesses or government organizations).
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Job Analysis is the process of determining and recording all the pertinent information about a specific job, including the tasks involved, the knowledge and skill set required to perform the job, the responsibilities attached to the job and the abilities required to perform the job successfully.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
The genetic characters transmitted from parent to offspring, taken collectively.
Something, as a quality, characteristic, or other immaterial possession, received from progenitors or predecessors as if by succession.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. SOFTWARE:
Definition:
Software is the set of instruction that enable the user to
communicate with computer and perform its task . with out
software hardware is nothing.
Example:
without browser you cannot surf internet. In this way with
out operating system you cannot run browser and do any thing
on computer.
3. TYPESOF SOFTWARE:
Two types of software:
System software:
system software is a program that is designs to
run hardware and application programs like mac , windows , etc.
Application software
Application software is designs to help
the user to complete its task.in other words the applications
software are the application that run on computer .
4. USESOF SOFTWARE
Software's are commonly uses in every field of life because of the
increase of the use of computer in every field.
• Business
• Medical field
• Home
• Education
• Industries
• Communication
5. BUSINESS:
Almost every business uses computer to
complete its daily tasks . from making contacts with clients, input
records and generating reports and allow business more
mannered way as tradition like paper work.
Marketing:
Computer allows business to make websites,
stunning ads and a complete marketing operations . marketing
videos editing and creating marketing ads in-home with special
software's.
6. ATHOME:
At home computer are used for variety of purposes .
Computer in home providing training , technical reports, internet
for students , families in participating and for calculating monthly
expenses.
Education:
Computer is used in education in teacher learning,
testing and evaluation ,guidance purpose and school
administration.
7. MISSUSESOF SOFTWARE'S:
Computer are also used for beneficial as well as illegal and
destroy purpose . with the help of it people committing farads ,
stealing data and cause damage other records etc.
Uses of software in hacking purpose and disobey privacy policies
of other .
A license agreement is the establish a legal agreement between
customer and the man or company that develop the software . if
a person is use this software with out purchasing is misuse of
software.
8. EXAMPLE:
If a person buy software from un authorized
site and then he want to activate it . It not activate because the
license is used by the previous user from which he purchase .
and software id not registered because license is not
transferable.
9. RISKSOF SOFTWARE:
Risk:
Risk is future uncertain events with a probability( ناکما ) of
occurrence and a potential for loss.
Product risk is the possibility that the system or software might
fail to satisfy or fulfill some reasonable expectation of the
customer, user, or stakeholder. (Some authors also called the
‘Product risks’ as ‘Quality risks’ as they are risks to the quality of
the product.)
10. SOMESOFTWARE PRODUCT RISKS:
If the software is unreliable and frequently fails to work.
If software fail in ways that cause financial or other damage to
a user or the company that user works for.
If the software has problems related to a particular quality
characteristic, which might not be functionality, but rather
security, reliability, usability, maintainability or performance.