computer technology

computer technology is the activity of designing and constructing and programming computers. The definition of computer technology is the design and construction of computers to better help people at work, school, home, etc. An example of computer Computer technologydirectly correlates with information technology.Computer technology encompasses a developing list of different software programs and devices.  the OLPC computer and Sakshat Tablet are intended to provide rugged technology at a price affordable for mass deployments. The World Bank surveyed the available ICT (Information and communication technologies for development) devices in 2010.[15] The Raspberry Pi and Arduino are single-board computers used to promote low-cost educational computing and interfacing applications. Its best technology jobs include software developer, computer systems analyst, information security analyst, Web developer, IT manager, computer systems administrator, database administrator, programmer and computerComputer Technology. The computer technology program transforms students into technologyleaders in a sustainable global economy. ... With an understanding of how organizations operate, students will be able to move effectively design systems and networks that will support the needs of the business or organization. Upgrade To a Device with Superior Performance. Dell PC w/ Intel CoreReliable Performace PC w/ 6th Gen Intel Core For Everyday Productivity. computer-based technologies means that work is available in:
  • businesses of all kinds and sizes
  • government agencies
  • nonprofit organizations
  • schools and universities
  • hospitals and health care facilities
·         Computer Information Technology Career Paths
·         Networking/Security
Network specialists design, install, configure, administer, evaluate and test a wide array of networks including LANs (local area networks), WANs (wide area networks), Internet-based networks, intranets, voice communication and wireless systems, VPNs (virtual private networks) and cloud-based networks.
·         PC Support
Personal computer support specialists install computer hardware and software, interpret and resolve problems for users, and provide technical support for hardware, software and systems.
·         Programming
Programmers design, write and update computer programs or software using programming languages such as C, Objective-C, C++, C#, Java and Visual Basic.NET. They perform these tasks for a wide variety of platforms that include Apple and Windows desktop; Apple, Windows and Android mobile; and Web.
Web/Internet Services
Web developers design, code, test and debug Web-based programs and media to create, publish and maintain websites. They integrate graphics, text and digital audio/video using both server-side and client-side technologies to develop rich Internet appEarly electronic computers such as Colossus made use of punched tape, a long strip of paper on which data was represented by a series of holes, a technology now obsolete.[15] Electronic data storage, which is used in modern computers, dates from World War II, when a form of delay line memory was developed to remove the clutter from radar signals, the first practical application of which was the mercury delay line.[16] The first random-access digital storage device was the Williams tube, based on a standard cathode ray tube,[17] but the information stored in it and delay line memory was volatile in that it had to be continuously refreshed, and thus was lost once power was removed. The earliest form of non-volatile computer storage was the magnetic drum, invented in 1932[18] and used in the Ferranti Mark 1, the world's first commercially available general-purpose electronic computer.[19]
IBM introduced the first hard disk drive in 1956, as a component of their 305 RAMAC computer system.[20]Most digital data today is still stored magnetically on hard disks, or optically on media such as CD-ROMs.[21]Until 2002 most information was stored on analog devices, but that year digital storage capacity exceeded analog for the first time. As of 2007 almost 94% of the data stored worldwide was held digitally:[22] 52% on hard disks, 28% on optical devices and 11% on digital magnetic tape. It has been estimated that the worldwide capacity to store information on electronic devices grew from less than 3 exabytes in 1986 to 295 exabytes in 2007,[23] doubling roughly every 3 years.[24] The World Wide Web, or ‘Web’ is a part of the Internet. The Web is viewed through web browser softwares such as Google Chrome, Internet Explorer, Mozilla Firefox etc. Using browsers one can access the digital libraries containing innumerable articles, journals, e-books, news, tutorials stored in the form of web pages on computers around the world called Web Servers. Today thousands of web pages/websites are added to the WWW every hour.
.
computer technology - the activity of designing and constructing and programmingcomputersA blog, short for ‘web log’ is a modern online writer’s column. A blog is a web site like any other, but it is intended to offer personal opinions of people on their hobbies, interests, commentaries, photo blogs, etc. Initially, blogs started out as online personal diaries, but in a technology-driven world, now they have also been taken up by businesses as an informal method of communicating with customers and clients. Blogs can also be used for commercial purposes, too. Absolutely anyone can start a blog, but some people make reasonable incomes by selling advertising on their blog pages. Social network companies also realise how popular blogs are and many offer free blog space (e.g. MySpace). Another feature of popularising a blog is the ability of visitors to add comments to the
·          
2 Types of blogs There are millions of blogs on the Web. But they are categorised into these types: Personal blogs 15 Basics of Internet News and views Company blogs Micro blogURL’s, or ‘uniform resource locators’, are the web browser addresses of internet pages and files. It is the way to locate a file or document on the Internet. The URL specifies the address of a file and every file on the Internet has a unique address. It works with IP addresses to give a name, location to web pages. Web software, such as your browser, use the URL to retrieve a file from the computer on which it resides. Format of a URL: Protocol://site address/path/filename Every URL has three parts to address a page or file: 1. Protocol which ends with a ‘//:’ 2. Host computer which ends with web extensions such as .com,.org etc. 3. Filename or page name which displays the related information. Example: http://www.banks.com/login/password.htm The above URL consist of: Protocol : http Host computer name : www Domain name : banks Domain type : com Path : /login File name : password.html 7.2 Elements of Absolute and relative URL: An Absolute URL is independent or free from any relationshAdvantages of Video Conferencing 1. Reduced traveling cost: In the global world where businesses are being conducted across continents, the travelling cost and the time that is wasted during travel is reduced to a greater extent. The video conferencing lowers the distance by showing the receiver on the monitor and it takes least amount of time to conduct talks between the two users. 2. Increased productivity: The people meet in the virtual world where the discussions takes place instantly without meeting each other and the decisions about a problem are thus made faster. This leads to increased productivity. 3. Going Green: Since conferencing between people is possible even without travelling from one place to another through video conferencing, a lot of petrol or fuel is saved. One can therefore say, th
The E-Learning is a method of providing guidance and/or delivering information to students of university or the employees of companies. Several universities and companies design the courses that can be reviewed using laptop, desktops or other smart devices. These programs are developed in such a way that the individuals don’t need to come to a classroom but can review all the data from any place convenient to them. It can be their home or their office. Such courses are designed in such a way that people can progress slowly or at a pace, they can manage. These courses help an individual to assess their knowledge online. This is done using the built in evaluation tools like quizzes or multiple choice questions. These courses are sometimes, stored in a directory or a server, from where the students can access and copy them on the compact disc or other data storage device. In either case, the program is developed in such a way that the student needs minimal interaction with a human tutor to understand the information being shared. The biggest advantage of E-learning is that it helps to provide information to a large group of individuals who cannot attend an institution. It also reduces the need for one to go to a specific place to learn or to share information. The E- Learning provides an opportunity to the student to complete the course at their speed. Several product development companies develop programs for E-learning the business in schools and universities. Today even a young child from an elementary school knows how to use a smart device, a device that helps in interactive learning. The universities from across the globe keep offering the on-line courses. This is possible through e-learning. The e-learning may even provide the students a the platform to share their thoughts and have live or online discussions for clarifications. The following are the advantages of online or computer-based learning: 1. Class work can be scheduled around work and family 2. Reduces travel time and travel costs for off-campus students 3. Students may have the option to select learning materials that meets their level of knowledge and interest5. E-Reservation E-Reservation System is an online reservation system that enables hotels, resorts, property owners, operators, theater operators and transport companies to maximize revenues without having to put human booking agenE-Shopping On-line shopping is the purchase of products and services over the Internet using a desktop or laptop of other smart device. With the access of Internet everywhere On-line shopping is gaining popularity as it is convenient to fast paced life style of the people these days. More and more business firms are offering these opportunities because it also helps them to reduce the infrastructure costs setting up stores, hiring sales employees and merchandising. Products such as clothes, shoes, groceries, books and larger products as furniture and home décor are offered through online shopp
GIMP is a multi-platform photo manipulation tool. Most GNU/Linux distributions include GIMP as a standard application. The GIMP is also available for other operating systems such as Microsoft Windows™ or Apple’s Mac OS X™ (Darwin). The GIMP is a Free Software application covered by the General Public License [GPL]. The GPL provides users with the freedom to access and alter the source code.
HTML was invented in November 1990 by a scientist called Tim Berneses-Lee. The purpose was to make it easier for scientists at different university to gain access to each other’s research documents. 1.2 A Brief history HTML is not an invention but an improved version of Standard Generalised Markup Language(SGML).SGML is a Meta Language (general -- purpose language)used for defining and creating descriptive markup language. With the wide spread use of internet, networks and computers have become increasingly susceptible to threats. These threats destroy data as well the programs that computers use. The objective of these threats is to destroy the data and to steal the vital information stored in computers. This information is used by the attackers for their benefit. We occasionally hear about the data theft from credit card companies or banks, which lead to major financial losses. Also sometimes individual users are fooled in to giving their personal and sensitive information such as passwords or bank data leading to financial loss. This chapter shows various threats that computers and networks face. 1. Viruses A computer virus is a program usually hidden within another simple program. It produces copies of itself and inserts them into other programs or files, in turn destroying the data and performing other malicious actions. Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread does not Security Threats and Safety Measures 97 remain directly under our control. While developing the viruses, programmers have specific target in mind such as data theft or destruction of software, which runs the computers. The virus can be transferred hidden in files, programs or even in disks. The viruses can be of different kind but a common virus is macro virus, which is discussed in detail here. 1.1 Macro Viruses A simple macro is series of programming steps that are stored in a single location. Macro allows automation of many actions with only a single keystroke. These can be embedded in the program files. Many programs, such as Word and excel allow you to record a series of keystrokes and menu selections and then save them to a file. This helps eliminate doing the same action several times increasing efficiency. Macro viruses created with the intention of fooling the user can deceive them in sharing confidential information. This information can be used by the Macro to damage the computer data or software. The virus using macro files are most popular as they are: Easy to write. Can infect more people faster as they exchange documents and data frequently Can easily infect any computer capable of running Office and Internet Macro viruses can corrupt data, create new files, move text, flash colors, insert pictures, send files across the Internet, and format hard drives. Macro viruses are increasingly used as transport mechanisms to drop off even nastier bugs. Macro viruses modify registries, forward copies of it through emails, look for passwords, copy documents, and infect other programs. Macro viruses can do a lot of different damage in a lot of different ways. Example of macro Virus is Wazzo, W97M etc. 2. Worms Worms are very similar to viruses in the manner that they are computer programs that replicate copies of themselves (usually to other computer systems via network connections). Viruses often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. Unlike viruses, however, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms are also often referred to as viruses. Some examples of the worst Worms that impacted the web are as follows: 1. Jerusalem is one of the earliest worms that spread in 1987. It is also one of the most commonly known viruses. It used to delete files that were executed on each Friday the 13th. It was first detected in the city of Jerusalem. 98 Information and Computer Technology 2. In 1991, thousands of machines running MS-DOS were hit by a new worm, Michelangelo. The virus would overwrite the hard disk or change the master boot record of infected hosts. 3. In 2007 Storm Worm hit the computers. Once hit, your machine becomes part of a large botnet which performs automated tasks that range from gathering data on the host machine, to sending infected emails to others. About 1.2 billion emails were sent from the infected computers propagating infection. Since Worms spread mostly through the email attachments, the best ways to avoid them is using caution in opening emails. If the email is from an unidentified source, it is always best to delete it. Most of the time worms attach themselves to email. Even the sender of email does not recognize what they have forwarded, as emails are sent automatically using all contact information in the user’s profile. 3. Trojan horses A Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses into the system. Since they look like sincere programs they are referred as Trojan like the Trojan horse of Greek mythology. The Trojan program does not attach itself to the files like a virus nor replicate itself like a worm but it does provide unauthorized access to user’s computer. They are mostly spread through internet downloads and online gaming programs. They mostly affect the targeted computers. The trojan program prompts you to do the normal functions such as inputting your email address or profile name. You do so, not knowing that, you have provided access to the malicious software. This software is capable of taking over the functionality of your computer. An infected computer will begin to operate slowly and will exhibit pop-ups from time to time. Eventually the computer will cease to operate, or crash. The best way to avoid the Trojans is to adopt safe download practices. If you are not sure of the website safety, then it is probably best not to download any program from that source. An example of the Trojan horse was “I love you” which infected several computers in USA and Asia, completely damaging the data of millions of computers 4. Spyware A Spyware as the name suggest is a program used to spy on the computer system. This program will try to get all the confidential and sensitive information such as your bank
7. Hackers and crackers Hackers and crackers are the software programmers who use dubious ways to get control over your computer and systems. The intent of both hackers and crackers is to gain control over your computer so that they can get the sensitive confidential information. They then use this information against you by stealing money, personal data, pictures, bank details and government military information, so on and so forth. This information can either be sold for money or hackers access account themselves to rob you directly. Originally hackers were the gifted programmers who gain access to the systems or network to show case the security loopholes to the administrators. Later the term cracker was coined for such activist who had intentions of doing malicious activities. Crackers have an end goal of destroying data and network for personal monetary gains. 8. Anti Virus Tools Anti Virus tools are the software programs that help us detect the virus in emails or files and hence protect our computers. These tools can detect virus, worms, Trojans as well as spyware and adware. They block us from visiting unsafe websites, and also downloading unsafe programs from such websites. They protect us from identity thefts and threats from phishing websites. There are several commercial antivirus softwares available such as Norton, Mcafee, K7, Quickheal etc. Security Threats and Safety Measures 101 9. Data Backup and security As we discussed earlier, there are threats to the computers that are sometimes hard to avoid. Unknowingly we may open an email that may have virus attachments and can destroy all the program and data on our computer. That is why to protect ourselves from such unknown threat; we need to assure backing up the data. The basic principal on data back up is very simple, just make another copy of the data and keep it elsewhere than on the same computer. This guarantees that once the data on your computer gets corrupted due to a threat, you can reload the data again on your computer once it has been rectified. These days you have external hard drives which can back up data. Also most of the smart devices are also used to back up the data. Before we discuss in detail how to use the security tools, here are some of the guiding principles to use the computers securely. 1. Using Security software such as Norton antivirus, Symantec etc. 2. Never share passwords 3. Beware of email attachments form unknown sources 4. Do not randomly download material from websites which has not been checked for security 5. Never propagate hoax or chain emails 6. Always logout your laptop or computer 7. Restrict remote access 8. Frequently back up important data and files 9. Use encryption or sites that use encrypted data There are several security tools available which help us protect against all sorts of threats mentioned above. In brief, the tools are available for antispam, antivirus, firewalls, encryption tools, password managers and cleanup tools. First Recorded Computer Crime In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s employees that their traditional employment and

Top Downloads


Cyber Crime ITAA 2008 Act Section’s -IPC Section’s Email spoofing 66D- 416,417,463,465,419 Hacking 66,43-378,379,405,406 Web-jacking 65 -383 Virus attacks 43,66 Logic bombs 43,66 Salami attacks 66 Denial of Service attacks 43 Email bombing 66 Pornography & Child Pornography 67, 67B -292,293,294 Bogus websites, cyber frauds 420 Forgery of electronic records 463, 465, 470, 471 Sending defamatory messages by email 66A- 499, 500 Sending threatening messages by email 66A -503, 506 Financial Crime 415,384,506,511 Cyber Terrorism 66F -153A, UAPA 15-22 Identity Theft 66C-417A, 419A Website Defacement 65 -463,464,468,469 Summary A computer virus is a program usually hidden within another simple program. Macro viruses created with the intention of fooling the user can deceive them in sharing confidential information. Worms are very similar to viruses in the manner that they are computer programs that replicate copies of themselves. A Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses into the system. A Spyware is a program used to spy on the computer system to get all the confidential and sensitive information such as your bank account numbers, passwords etc. Malware is any kind of unwanted software that is installed without your adequate consent. Spam emails is not only unwanted, it clogs your email accounts and uses unnecessary server space. It is also referred as junk email. Hackers were the gifted programmers who gain access to the systems or network to show case the security loop holes to the administrators. Cracker was coined for such activist who had intentions of doing malicious activities.


To be a good programmer is difficult and noble. The hardest part of making real a collective vision of a software project is dealing with one's coworkers and customers. Writing computer programs is important and takes great intelligence and skill. But it is really child's play compared to everything else that a good programmer must do to make a software system that succeeds for both the customer and myriad colleagues for whom she is partially responsible. In this essay I attempt to summarize as concisely as possible those things that I wish someone had explained to me when I was twenty-one.
This is very subjective and, therefore, this essay is doomed to be personal and somewhat opinionated. I confine myself to problems that a programmer is very likely to have to face in her work. Many of these problems and their solutions are so general to the human condition that I will probably seem preachy. I hope in spite of this that this essay will be usefelcome to the “Implementing a language with LLVM” tutorial. This tutorial runs through the implementation of a simple language, showing how fun and easy it can be. This tutorial will get you up and started as well as help to build a framework you can extend to other languages. The code in this tutorial can also be used as a playground to hack on other LLVM specific things.
The goal of this tutorial is to progressively unveil our language, describing how it is built up over time. This will let us cover a fairly broad range of language design and LLVM-specific usage issues, showing and explaining the code for it all along the way, without overwhelming you with tons of details up front.
By the end of the tutorial, we’ll have written a bit less than 700 lines of non-comment, non-blank, lines of code. With this small amount of code, we’ll have built up a very reasonable compiler for a non-trivial language including a hand-written lexer, parser, AST, as well as code generation support with a JIT compiler. While other systems may have interesting “hello world” tutorials, I think the breadth of this tutorial is a great testament to the strengths of LLVM and why you should consider it if you’re interested in language or compiler design.
Computer PDF is also courses for training in Pascal, C, C + +, Java, COBOL, VB, C #, perl and many others IT.
You should come see our Computer programming documents. You will find your happiness without trouble !
The latest news and especially the best tutorials on your favorite topics, that is why Computer PDF is number 1 for courses and tutorials for download in pdf files - Android Development Tutorial. and Computer programming!
Download other tutorials for advice on Android Development Tutorial. you will see ! We will do everything to help you !
And you dear surfers what you need? The best course and tutorial, and how to learn and use Android Development Tutorial. of course!


 The materials for which you will get the PDF, DOC, PPT, RAR and ZIP files are html & html5, css & css3, javascript, php, asp, j2ee, ajax, jquery, node.js, angularjs and many others. As these tutorials are included in many of the academic schedules, you will need to get detailed information on them.

Comments