SlideShare a Scribd company logo
Why is programming  unique profession? www.auroracs.lk
Introduction ,[object Object],[object Object],[object Object],[object Object]
You play with a dumb machine ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer is bossy  (A necessary evil) ,[object Object],[object Object],[object Object]
No cheating in programming ,[object Object],[object Object],[object Object],[object Object],[object Object]
No point pleading ,[object Object],[object Object],[object Object]
No point flirting ,[object Object],[object Object],[object Object],[object Object]
Programmers are problem solvers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Logical thinking matters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart people, programming & profession ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],www.auroracs.lk

More Related Content

Viewers also liked

The story of ant
The story of antThe story of ant
The story of ant
Aurora Computer Studies
 
Doing your higher studies the right way
Doing your higher studies the right wayDoing your higher studies the right way
Doing your higher studies the right way
Aurora Computer Studies
 
Calculating the mean, median and mode
Calculating the mean, median and modeCalculating the mean, median and mode
Calculating the mean, median and mode
carltimmis
 
How to study effectively?
How to study effectively?How to study effectively?
How to study effectively?
Aurora Computer Studies
 
How to choose your career right?
How to choose your career right?How to choose your career right?
How to choose your career right?
Aurora Computer Studies
 
Effective Listning Skills
Effective Listning SkillsEffective Listning Skills
Effective Listning Skills
Aurora Computer Studies
 
Skimming and scanning
Skimming and scanningSkimming and scanning
Skimming and scanningcarltimmis
 
Introduction to the ancient Greek civilization
Introduction to the ancient Greek civilizationIntroduction to the ancient Greek civilization
Introduction to the ancient Greek civilization
Aurora Computer Studies
 

Viewers also liked (9)

Hauroa
Hauroa Hauroa
Hauroa
 
The story of ant
The story of antThe story of ant
The story of ant
 
Doing your higher studies the right way
Doing your higher studies the right wayDoing your higher studies the right way
Doing your higher studies the right way
 
Calculating the mean, median and mode
Calculating the mean, median and modeCalculating the mean, median and mode
Calculating the mean, median and mode
 
How to study effectively?
How to study effectively?How to study effectively?
How to study effectively?
 
How to choose your career right?
How to choose your career right?How to choose your career right?
How to choose your career right?
 
Effective Listning Skills
Effective Listning SkillsEffective Listning Skills
Effective Listning Skills
 
Skimming and scanning
Skimming and scanningSkimming and scanning
Skimming and scanning
 
Introduction to the ancient Greek civilization
Introduction to the ancient Greek civilizationIntroduction to the ancient Greek civilization
Introduction to the ancient Greek civilization
 

More from Aurora Computer Studies

Learning English as a Second Language
Learning English as a Second LanguageLearning English as a Second Language
Learning English as a Second Language
Aurora Computer Studies
 
Characteristics of laders
Characteristics of laders Characteristics of laders
Characteristics of laders
Aurora Computer Studies
 
නායකයකුගේ ගුණාංග
නායකයකුගේ ගුණාංග නායකයකුගේ ගුණාංග
නායකයකුගේ ගුණාංග
Aurora Computer Studies
 
How to do your Advanced Level (AL) studies successfully
How to do your Advanced Level (AL) studies successfullyHow to do your Advanced Level (AL) studies successfully
How to do your Advanced Level (AL) studies successfully
Aurora Computer Studies
 
Study BIT-UCSC @ Aurora Computer Studies
Study BIT-UCSC @ Aurora Computer StudiesStudy BIT-UCSC @ Aurora Computer Studies
Study BIT-UCSC @ Aurora Computer Studies
Aurora Computer Studies
 
විභාගයට සාර්ථකව මුහුණ දීම
විභාගයට සාර්ථකව මුහුණ දීම විභාගයට සාර්ථකව මුහුණ දීම
විභාගයට සාර්ථකව මුහුණ දීම
Aurora Computer Studies
 
How to face exams effectively?
How to face exams effectively?How to face exams effectively?
How to face exams effectively?
Aurora Computer Studies
 
How to act like busy in three steps?
How to act like busy in three steps?How to act like busy in three steps?
How to act like busy in three steps?
Aurora Computer Studies
 
Classification of human languages
Classification of human languagesClassification of human languages
Classification of human languages
Aurora Computer Studies
 
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
Aurora Computer Studies
 
Quotes for life
Quotes for lifeQuotes for life
Quotes for life
Aurora Computer Studies
 
මිනිස්සු ආගම් අදහන්නේ ඇයි?
මිනිස්සු ආගම් අදහන්නේ ඇයි?මිනිස්සු ආගම් අදහන්නේ ඇයි?
මිනිස්සු ආගම් අදහන්නේ ඇයි?
Aurora Computer Studies
 
Why do people believe in religions?
Why do people believe in religions?Why do people believe in religions?
Why do people believe in religions?
Aurora Computer Studies
 
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
Aurora Computer Studies
 
Agile philosophy for life
Agile philosophy for lifeAgile philosophy for life
Agile philosophy for life
Aurora Computer Studies
 
Career paths in ICT
Career paths in ICTCareer paths in ICT
Career paths in ICT
Aurora Computer Studies
 
How to build a successfull software
How to build a successfull softwareHow to build a successfull software
How to build a successfull software
Aurora Computer Studies
 
Attributes of great programmer
Attributes of great programmerAttributes of great programmer
Attributes of great programmer
Aurora Computer Studies
 
මනස සේදීම (Brain washing)
මනස සේදීම (Brain washing)මනස සේදීම (Brain washing)
මනස සේදීම (Brain washing)
Aurora Computer Studies
 
Brainwashing - What, why, how and preventing
Brainwashing - What, why, how and preventingBrainwashing - What, why, how and preventing
Brainwashing - What, why, how and preventing
Aurora Computer Studies
 

More from Aurora Computer Studies (20)

Learning English as a Second Language
Learning English as a Second LanguageLearning English as a Second Language
Learning English as a Second Language
 
Characteristics of laders
Characteristics of laders Characteristics of laders
Characteristics of laders
 
නායකයකුගේ ගුණාංග
නායකයකුගේ ගුණාංග නායකයකුගේ ගුණාංග
නායකයකුගේ ගුණාංග
 
How to do your Advanced Level (AL) studies successfully
How to do your Advanced Level (AL) studies successfullyHow to do your Advanced Level (AL) studies successfully
How to do your Advanced Level (AL) studies successfully
 
Study BIT-UCSC @ Aurora Computer Studies
Study BIT-UCSC @ Aurora Computer StudiesStudy BIT-UCSC @ Aurora Computer Studies
Study BIT-UCSC @ Aurora Computer Studies
 
විභාගයට සාර්ථකව මුහුණ දීම
විභාගයට සාර්ථකව මුහුණ දීම විභාගයට සාර්ථකව මුහුණ දීම
විභාගයට සාර්ථකව මුහුණ දීම
 
How to face exams effectively?
How to face exams effectively?How to face exams effectively?
How to face exams effectively?
 
How to act like busy in three steps?
How to act like busy in three steps?How to act like busy in three steps?
How to act like busy in three steps?
 
Classification of human languages
Classification of human languagesClassification of human languages
Classification of human languages
 
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
 
Quotes for life
Quotes for lifeQuotes for life
Quotes for life
 
මිනිස්සු ආගම් අදහන්නේ ඇයි?
මිනිස්සු ආගම් අදහන්නේ ඇයි?මිනිස්සු ආගම් අදහන්නේ ඇයි?
මිනිස්සු ආගම් අදහන්නේ ඇයි?
 
Why do people believe in religions?
Why do people believe in religions?Why do people believe in religions?
Why do people believe in religions?
 
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
 
Agile philosophy for life
Agile philosophy for lifeAgile philosophy for life
Agile philosophy for life
 
Career paths in ICT
Career paths in ICTCareer paths in ICT
Career paths in ICT
 
How to build a successfull software
How to build a successfull softwareHow to build a successfull software
How to build a successfull software
 
Attributes of great programmer
Attributes of great programmerAttributes of great programmer
Attributes of great programmer
 
මනස සේදීම (Brain washing)
මනස සේදීම (Brain washing)මනස සේදීම (Brain washing)
මනස සේදීම (Brain washing)
 
Brainwashing - What, why, how and preventing
Brainwashing - What, why, how and preventingBrainwashing - What, why, how and preventing
Brainwashing - What, why, how and preventing
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Why programming is unique