Posts

Company's Founders

Company's Founders :- Apple :- Steve Jobs Amazon :-  Jeff Bezos Airtel :- Sunil Mittal Alibaba :- Jack ma Adobe :- Charles Geschke & John Warnock Byjus:- Byju Raveendra Nath Cadbury :- John Cadbury Dell :- Michael Dell eBay :- Pierre morad omidyar Google :- Sergey brin & Larry page FB :- Mark Zuckerberg NestlĂ© :- Henry NestlĂ© FSF :- Dennis Ritchie Ford :- Henry Ford Horlicks :- William & James Horlicks HP :- Bill Hawlett & David Packard Intel :- Gordon e moore, robert Noyce & Arthur rock Mobikwik :-  Bipasana Taku & Vipin Preet Singh Myspace :- Tom, Chris & Jon MS :- Bill Gates Nike :- Bill Bowerman Nokia :- Fredrik & Leo Oracle :- Larry errison Wikipedia :- Jimmy Wales & Larry Sanger YouTube :- Steve Chen, Chad & Jawed Twitter :- Evan Williams, Biz & Jack Samsung :- Les byung-chull Yahoo :- David filo & Jerry Yang Sony :- Maruso Ibuka & Akio Morita Tesla :- Elon Musk Instagram :- Kevin Systrom LinkedIn :- Reid ...

OSI Layers and their work

OSI (Open system interconnection) Layers :- (1) Application Layer :-  Manipulation of data, mail service etc. are provided, uses web browser. (2) Presentation Layer :-  Perform by OS that converts HLL to MLL, maintain encryption & decryption. (3) Session Layer :- Manages conversation between two different applications, Manages session b/w source and destination. (4) Transport Layer :-  Decides data transmission should be on parallel or single path, It breaks message into packets & maintain it should reach destination with reliability. (5) Network Layer :-   Acts as network controller, Decides which route data should take. (6) Data Link Layer :- Error controlling, Error detection bits are used. (7) Physical Layer :- Activates, maintain  & deactivate Physical connection, It converts digital bits into electrical signals. BONUS FACTS  :- Hub :-  Works on Physical Layer. Switch :- Works on Data Link Layer. Bridge :- Works on Data Link Layer. ...

Operating System (OS)

OS  :- It is system software which works as an interface between user and hardware. Types of OS  :- (1)   Single user OS :- Allows one user at a time. Like PC.e.g. MS DOS. (2) Multi user OS :- Allow multiple users at a time. Like Network.e.g. Unix,Linux. (3) Multitasking OS :- Work on more than one processor at a time and allow users to switch between running applications.e.g.Linux, Unix. (4) Real Time OS :- Processing done within a time constraint. Like Flight reservations,Military applications.e.g.HP-RT. (5) Embedded OS :- It is self contained in the device & resident in ROM. Like Microwave,washing machines.e.g.Win.CE. (6) Batch processing OS :- No.of jobs are put together & executed as a group.e.g.Unix. (7) Distributed OS :- Data can be stored & processed on multiple locations. Like IBM RS/6000 e.g.Unix. (8) Mobile OS :- Operates on smart phones,tablets & digital mobile phones.Mobile OS classified as : * Android :- Introduced by Google in 2007.Based on ...

Classification of computers Part-II

Image
•  Micro Computer :- Micro Computer is a small, relatively inexpensive computer with a microprocessor as its CPU. •  Mini Computer :- Mini computers were designed for control, instrumentation, human interaction, and communication switching as it is distinct from calculation and record keeping. •  Mainframe Computers :- Mainframe Computers is a powerful multi-user computer that can support thousand users simultaneously. •  Super Computer :- Super Computers are best in terms of processing capacity and also the most expensive one.

Nature & orientation of HLL

Fortran - Compiled   Imperative, structured and general purpose language. ALGOL - Compiled Imperative LISP - Compiled and interpreted General purpose COBOL - Compiled Imperative BASIC - Interpreter General purpose PASCAL - Compiled Procedural C - Compiled Procedural C++ - Compiled Object oriented Java - Compiled and interpreted Object oriented

Important laws of Cyber crimes

Sections Applicable for Cyber Crimes   Cyber Crime ITAA 2008 Act Section’s-IPC Section’s Email spoofing 66D-416,417,463,465,419 Hacking  66,43-378,379,405,406  Web-jacking 65-383  Virus attacks 43,66  Logic bombs  43,66  Salami attacks 66  Denial of Service attacks  43  Email bombing  66  Pornography & Child Pornography  67,67B-292,293,294  Bogus websites,cyberfrauds  420  Forgery of electronic records  463,465,470,471 Sending defamatory messages by email 66A-499,500  Sending threatening messages by email 66A-503,506  Financial Crime 415,384,506,511 CyberTerrorism  66F-153A,UAPA15-22  Identity Theft 66C-417A,419A  Website Defacement 65-463,464,468,469

Security threat & safety measures

 ❖ A computer virus is a program usually hidden within another simple program.  Macro viruses created with the intention of fooling the user can deceive them in sharing confidential information.   ❖ Worms are very similar to viruses in the manner that they are computer programs that replicate copies of themselves.   ❖ A Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses into the system.   ❖ A Spyware is a program used to spy on the computer system to get all the confidential and sensitive information such as your bank account numbers, passwords etc.   ❖ Malware is any kind of unwanted software that is installed without your adequate consent.   ❖ Spam emails is not only unwanted, it clogs your email accounts and uses unnecessary server space. It is also referred as junk email.   ❖ Hackers were the gifted programmers who gain access to the systems or network to s...