0 ratings0% found this document useful (0 votes) 153 views16 pagesComputer Applications
Theory for basics of computer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Gy
Computer Ape Veattons
Se
Tn _Qiytee Automaton ¢
—
" Co Ure mach
> BWlee Auromahen TYyers to | Veusi ous og “3
Steve,
& Saytwone Used to chi ey Corrente, Collers
Mamiputare Oyaice Ingormahon needed dew aecomplishug
baate trate. ]
~~ The bacebone 4 Ogee Automahon Is 4 LAN,
Uk
Uhich allows Useng to Pramaget data, mal
even Vorces across the Niw:
> BUN oggice Funchons , Hncly dng Typing, Filing
Copying 5 Fax , Retord management » Foul \nto
His Coigony:
~
Compuke, applicahims In, Oggi Automeborn cut
Gy DaG Storage a Mamiputakon 2 Word Process
Lortwane , Prenentaten Saghoares Wow
¢ >
esny or editing bextany Ave +
9 Spread sheer applicahiont Provide Useg lth
the Copacty to engage In the cary Pa niputobing
Q ofp Of numbaig
: +o
% Imoge apptiablns oattow He Captuie &
“ns 4 Uisuol Teneges,(ny Date ianedemece |
Of Stored dala & Ingor maton
Stmplitg ing the taneacnet
3 Porog oam Sehedules , Tekles Systems oe Re rrierta
Systems 5 lack Mameg emenk Coa Some OY the
feotunes Uhich empower burtnen to have an
P4e on att busimen Psocemen ait Out Ama honte-
ce
(1) Dok. Exchange ¢.,
rots Exshomge Video ory
> Blechronic medil!, Voice moat , Paesimile axe
Examples Oy Uechonic ranspes applicabens
% This woutd allow Your emp loyees fo Collaboxate
in Rest Time 2 Enhame thes Produc vite.
2 Mya Smashyty & Brreesy HR Use Arkgi cio Tastettgene
(tyy Acouxae 2 FO eeu Hime fo hive 2 Seweenis pron.
9 Once the bugs ase. Memoued Gem a Program os
Guahes Systeme
am applicahen , t ‘Com hetp You tn Getting two,
Aecunney dn clog fo clos business Processes.
2 Tmplementn
am aduvamced busunen Automaton
cox the Prt csi City Q eer.
CY Save Tme & Resources
= _Atsousie
By
Saptwasie wredu
~ Computers Teehnotog ies 2 Niw Communi tahons
Axe not Conghicted by Geographic! Lhe ‘rethions
Te, Saver. both Time & money Spewt Op teauetingx
a
~ Dat
git & @. eliminafe thé ‘need og
Pres enu!
: erving hasd Copies & hence, Saving Paros
Dafuse a8 Welt: a
wn) Red vced Costs 2
9» Since ev busines Process is NOW atomabed,
You conte need +0 Invest muth om hising
New resources for img Cane o4 Hose tart,
UsShich Com be Uy executed nee, am
Mga tee automaton Sy ster.
Cdbiees Using Uideotex Com dlectronicalty publish
Stenclasd | 0 pes atu Prvced use Mamuots» Sates
Hhestahuie 9” fn —hotse Newsletter Othe I ion
> ,
9» Oygtee Entey Auto mahon adlowe employ ees to
Come th & Ou | He ayyice Using, a
es OT Bio meBuc System fngkod Of
empleying a team Se cusuthy Shed +
“Disadvambeges
5 Toto} nsveskment! Costs: ora: IS
3 | Sriuser to Moamege Veyygied cutomehen cfg ents
fer rmequied Udhich organ Jon ees
net have :
9 VomeHmes business” may “euutomate the
! uo Prveme
Mase
2 Reduces Team 'om Custernes (nkesachon #°ey, + Computer Applicahess fn Date Aratysin
* Dota Anetysts fs @ Process Y Inspecting ,
Cleansing , Trantgorming g Mod eng claly | Usith the
gow y Cis cov ex ing Usy wt Ingormatin , > Ingorming
Conclusion 2 Suppesting dedcion -m
4g om ating -
Date An ne ate fools Meatee th ecates, dor Usess
to Pimess Rimaniputete clata, Anety ze the relation
“Ships & Corr abens b/w daty Se, & Ch Obsy
hetps to Vlertity Patterns 2 brends dew In Fexpretots
Some oy the Beta Prey sin Foolk Ques
@ R S_Prog ramming : Te isthe Lang vsge ee ges
StatsH coy Computeken » dara Anetysin A Qrephicod
Weprenentahon Oy doa. Tt is Us tlety used tn
Polts, Dota Minang Susvegs.
> Wet —desis ned Publi caHon - 4 b Plo Gn
be Produad, Indlucing meithe matical Syrobets
& Formulae Whew necded.
3
® Python sel Als ahipas, machin Langusge
Udhich Cam bbe Used +0 | handle big hota
& Peyoom Complex Mathematics .
> Te hes @ Limpte Syntax Limulax fe 8| @® marcas 2: he teva Hugh Pry owm ane
| tongenge
| Bata Explorohtn & Ulsuoti goon
| ~ Tt Com aloo be Used dew Modeling ,Slmalato
| - Perote © 4Cing, > Appticabon deuvclopment Usea Gut,
"uanien Can, be Used gen Dots Ancigin;
9 Te AUows you to Solve many technical Compat
| ~ eng Problems esp. those Udtth Mmotrix & Vector
>
Formutation In a drattion cy me.
® SkyTRee . Ze ts a ' big deta Prnelyties too)
thot empowers ota RclenHst +0 bud more
Accuxose Models Faster +
> Te QUpens Accunote Predichve Machine leaving
modas thar cow cay to Use.
3 Tt allows dota Sdentists to Visuotize &
| Unde Stand the Logie behind Mt Ceeisions.
© Talend ; “Ze ts 4 big dlata:! too) that
Simpligies 2 cutomates big ota’ Integration,
| re euto us & mraste ota mramege gent & Cheers
© Ploety Ze! ts am Prnaly Hes tool that lets
Users to Creo Chauh & Clasthboads bo
ik Shee ontine:AX]
: 3 Gm eaddly tein omy doa into eye —Cakhig
is 2 Ingowmatve graphics:
@ Lumigy + ode fs big data gusion , Analyst,
2 Ulsuotiganen Plakjerm Tt helps Usexs to
din cove Connechons & Explore rrelabonShips
tn theiy ata Via Que y Ainady re Optons.
> Dota Analysis Process Consists gy gollowsng Pheses
G) Date Requixemenr Speci cation Cpotlay suvey)
Ch) Pata CotleKon (Daretased
Cu} Dota Proumlva CSpread Sheer JeraHsheot App.)
Qu} Date Clea €
“3 on | gteHsteel Cah
(yy): Dots Praolysin CUisuctizas
Moles),a v NG
imp ules hou In’) Cyber Seca
% Computer App iveatons in Cyber ear
> Cyber Secwity Is Agfined as Technetogies 2
Processes Constructed +o Protect Com pulaus ,
Computan hesedeseinie , Sajtware , Hetwosts 2 dol
dem Unauthorized | access , Vulnes abi lites Sepeied
through foreinek by Cy ben Crlminab, Hewonsr
Gree 2 hackeus-
9 Ghiete Veen Pa, % Cybex Come
Ch Cybex Steahing 3 "Intructeng Into tndtuisuate Peuent
Lye +o Cause distress > anxleky 2 Peon:
ary Tntett ectuot Property That 9 Innovakhon, Rew
Research »Method, models 1 Parriutes! ase Intetleche)
Property UNG, We Ob mse gy Ther.
% This Can be Protecded udu hewing Patents ,
Trademasrs , Copy wig he On Videos & Muste ag welt
(i) Salam! Atak 3 Cybex Ceminale And Hares
Steoy ea In Vv
Severe bamrg crecounk.
QW) @-mad Rombs Sen
Lute amount drom
ina Sg eNorMmous, amount
] ermatls to a Fig clef peso,
5 Pradulent Otrempt mede +H wo.
Cophisie
(VY Phi'shin h emaip |
Persona! 2 dinancot Teyeamanon(wt) “Tdentity That > Peis pretends to be Someone
Clee & dou Crime Like aera ‘Lapermakior|
Ive Name, Pears, Credit Cor no,, Acc. ne.
Ct) Spooping 3 Teehntque to have Unautherigel
5 to Compulens
acces!
View
Wm) Worms , Trojan Horse ,
ems =
Computer Virus Unes fsey uaith a maticlous
Uatdth Udhen Tuns han
Preg var ov execulable Files
he Comput « '
Existena Qy Wem tn System atone Com aypew
te Go net need
the Peg cernane oy. Sy stern beg
Ruppert} ue ottachad File
Trojan Horce , at givst Glance Seems Usa Sq
bur Acruoklay Clamage Compules; Uthen inshaued &
Alon Create’ bacrdoor for Matidous Uses to
Conteol pou Computes Temot ety «
Cx) Dos & Dds ? Denial 4 Service CDS) ahaue
an GtHempb to, mare Computer , Sever
\
Unaveaitable to fs authey
Srey exs i
Or Nework wWesounces
Uses + \ \
» 8 Dist Sbuted, Dental 4 Senvice PYyos 9
Dos GHack, thet Rrepegetes from mose thane
One Inyected System fCa ber Seeustity thro ugh Comput Appiicohios ' ®
It Includes Authenioto,
© Access Conte) :
AuthowzaHen , & ARudir.
Authedt atin methods & tokens Include Passwort,
Blomeble Anatysin , Electronic Keys > ee.
!
designed dew the etecton 9 Key Stroke logger
Saroae 2 Alao Incorporate the abi ly to delle
Oe aHeast mmobuise Hidden Keystone logon
Seftuoast, om Your Computer.
= Pubue Compatens, on Usage » Finamctal
nsthitulms one Ferg eb : y keg leg as.
anlar ety
® SIem
® Anti key Loggers ¢ Type gy Sayhvore Speelgi cathy
Sher Sec usury, Lryoo mak on, A Event Marae
Sqyrwore | Produchs.2) Serica Combine Secwaby
fet la tot dat
Inger mation Mlegras tener 8 Been Guent
Date
) Sand Box = Te Tels vey Secusaty mechanism gor
Separating ve prvamains > Usuobly
In am ost to iG ate System Failures
fen Spreasing:
3 Sandbox! ts “Brag uenty Uded to tect Unveils
Peegzams thar od Ae QA Uimug | Ow Othey
Malicious Code
Or Say puocout Voter Bite—
©
@
@
& Intrusion Oetechon System ¢ Tt is q device
On Sq twore Applicahon thar maniters GF O
opeal , :
Nekwosk OF Systeme ger Malicious oct ul ty ox
; Slg not based derecho
be Two Tyee g ar i CRetogmi'ging bad paiten’)
Anomely boned cletechon
It welles! m Machine Leamung © Oetectig goad etic)
Pieewall 2 A Nw Secusity Sy tiem thar
Monitors 2 Conbols incoming 2 Oukgoing N [wo
Prajyie bared om predehumimed Secusehy mules.
oe Typically ectablishes @ baseiiex bl a
Trusted Inteynaf Nf and Untwsted ex Fennel
Nl.
Enewg phen Spon Te Is a Sqroase tab
Uses, Cry eel ‘fo prevent Unauthorg
access +o tq itot Tegowmalon « \
a Example y Ener phen’ Seyhvore One 4
Emad iy) HTTPS
re Secunily , Secene" He
Ant Vierus i Sepa Computer Pregram Used
to preven, doce aT emove Malware. |av
% “CEReaRS epeIanee go, oxi) EEG). ,
> Sorin} Nekoow ies ig the use OY Internet Booed
Sous} media gites +o Stay Connected uit Prteuts
Family , Collengues , Cuttomens , om Clients
ly > leagues » >
| 9 Any Sort of Computes | mediated Communtablen
Com be Cotted Sociol Sap tocwe Since Comm. te
Inhenentiy Godot “ex any fe Group ware ( Simple
Forums; Pasjech M1 ermunt', S exe). Educoonaf loeb
| °) oo
j Sexurtces Cums) 33 Compulir Games, et.
:
|
js
Forms oy Soda! Nehworting
0 Shaning 9 Links 2 Reads:
> Souist Rooter Sites he Q Website that
abLows you to Store. bootmasks OA Q Femoke
Sesvey Q to Shase Usith OMe.
9% Hybrid Systems Miike NewsVine! allow to read,
Ciseuss. 2 Vote ger news’ Steves.
> Sedey Navigatens Systems Thar (ork Users
build truly of ued renources 4 Share them
Uke Amazon Shoppiy app-
@ > Loewy Shops 2 Venu Com aduetise Upcomteg Quen
Sheva caita} Ovtiacts ¢
crs:
2S Plerwie Ch Logrvares Lee Fltery, Pb,
Tastegzan , Youtube
Q -* % Gorpie clamzvoms helps to Creote » Olistribult,
2 Qrade assignment te 9 Papuless woay:
Te dc Use to Streqmiine the Process od
aaah Ailes bl reaches & Sudan -
3 Oncline Collaborate Writing tools Such as
eciik Conkenr
e
Uoikipediq “allow Uses to add 2
Usex Com aloo Creo mew Pome:
On \ine
® Socio citatons & Reference Mareger :
Thee as Many TY erene management Sop hwaxa
that Can mare the Process % maneaing you
eee almost Ygostless .
| Uy Reeworrs satlows Usexs to g enaxal & Former
bibiliegwaphiet 2 Manuscrpls tn hunchreds
CY OP Styles:
(1) Menaletey >» OMows’ User to Genesote CiteKons
2 bibl! og saphies Ma ms) Woewd, Libre gis
TES great! few Collaberratue dest:
® Soda Shopping ;
a Sech Sy stern Opens, Reviews, Recommendation,
Composd son «
2 Bmazon ,Flipkout ete oun Cmtine Shopplug Sites
2 otlow Hsas to Compare
| ©) Socta ntw Conshwetion +
> Sofia networting Sqptwane mre im :
plements Socup
Walia eather °
Cations 4 es:Pocussed Socioy! ‘Nt foo Soytwoome Ure Lineal,
vol Kipedia. ete ' (tee
Genera Pumpose Sociol, Nivw Soy roue
Farboor, Tuot tHene
)
)
?B Myoov tn type Sept Loebsiges, Govt. Gor the
Sigg estion y Hue Puble 2 to Keep tus Public
Upcoted on tray Achat
® Baan
Mnance Plieahions ¢
Soctot niw Cres new OPeabunites ger Flobet
rane:
| >) The. Use an Usstuot Cussrency Systems hn Side
|; @® Mesiot Appttcabons ¢
|
2 Por Peopte Suygering from Ue ~eiteating cise
Core Usebsites Such ag .Pahents Like Me Qbger theb
Membas to Connect Usith Othe clealing sth th.
© Crowd Sous et Appt cohons :
7 —— e =—*
9 Crorod? oustting Sociol Medig Ploug dems Combines
Group °4 Pry esstonal “Preelances» Such ay
\
designers 2 -hetp them Cainaniate
L estion.
Iousiness Ownens Interested In Ther “vay>
rat
+ Compute Appiiatins fo Bose Pubishieg
> Publishing is the business Qy meting bgforeratia
Auellable to He Public “Such as Likererusre | ww
tegeomation both olig ite & Ne aightet_madia
3 Publishing Includes Fott owing Stages % levetop|
— mek
2) Dequisition “(Copy | Editing Gu) Producten
(wy Pasa ng WwW) Manteting (uth Distsibuton
cl) Cop Editing Process 4 reviewing & Cone tring
Rtn mabeuint +0 Improve Aecusay >
ead obi ly & gitmess dew dts usipose +
> Pag in ation Ie
Prose: ‘Such as Page meaten , the Quask
Xpress, Adobe Indesign Udleh gives Cony
eclatore move (Conkeet One) He Cowshucnen 2
Wewisions | gy Hodis Coutent.
| Cu) Pcquaaivon +
9 Exbeiner hos Lenpligied tue Process gy Pest
Checking & Ovlme Prag rams Sudh a Faceboot
| oe Twitter have olen expedited! He Prous
| igor mesion qubouns ADesktop Publishing Sena
alan TevoluHonidy th.
Convenient Peake |p
a Image Sejecnon 2 Searen {Engine Oph mizaken
Tape eye ans. ‘wheeze
Ineveaned tHe is! belly [4 Search Renutt
L RSpecasitly’ When Ceciening Gor Keywords inHedte\
®@ Poblishing : .
Comp wher appli cohins in publishing vir
New peo gscol Chamges to the Pusu'shuma
Trdushy, South oy @ -books,, Pant On demamd 2
Accessible Pubtiching .
2
C= book 3 A Rook Publicohion made Avarlable in digit
Corny
Can be Pod In Q-reader deviun, Computers, tolls
Prdvom tage BY e-books ose Its lowe Pres ,
Increased Com cat & Laige Seeckom % Htler.
Bleeronite! Bookm auey Make myrun ung earier
AMow waders to! amnota Page.
Fos Program Code mple on
' ” 3 meee epic °
Ceint on Bemiamd > Le isha, PrinHng Feehnotegy a
Business’ prvcese jth Ushich book Copies
Ose Hot Printed Until ‘the Compomy wedeves
AN Onder , ;
> Tt Coutd be possi ble ust the begionig cr
ag ttat Repting beog tr was nok economicay
to pene Singte) Copies With gy Ser mn
2 Mam acodemie Publishers, inchu: Unluast
Presses , Usee Poo Sanvien Fo met feum lange
block lists CLists ¢ Y Olctes, Pupti cohen),f, Accessible Publis hing D Te ts am approach
to Publighu
& book design Ushure by
books
2 other Texts axe made aveitl obte
in Blhainahve Pormats designed Fo col
or
Deplace He Trend tog Pru:
3 Alteinatve Parrnots Such o4 Large Ponts,
Spedatiged onk Por Cextaim Kinds % Reade
dinabiline, , Broke, Audtoboots » Daisy (Digit
Accessibte Tiny ormahon System) digites souk boots.
@ WW) Monkees © Increasing no. & Users ome
using Niche... MoH keting Gnbing FO SOL mare Books
9 Niche mankehing fs the Subser gy Mesncer on
Which a Specie Producr ts gocusses: fared |
Price ramse , Produchon quolthy 3 dlamographics
thot ts intencted to faxger.
2 Smash words
ow Amazon's Creotespace dhe
drree Senurees to hove tein
ger Uoatd usicle Late.
booK Avalj able