Monday, 26 February 2018

COVER BOOK COMPUTER SCIENCE


WHAT IS INTERNET?

The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANet. The original aim was to create a network that would allow users of a research computer at one university to "talk to" research computers at other universities. A side benefit of ARPANet's design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in the event of a military attack or other disaster.

Today, the Internet is a public, cooperative and self-sustaining facility accessible to hundreds of millions of people worldwide. Physically, the Internet uses a portion of the total resources of the currently existing public telecommunication networks. Technically, what distinguishes the Internet is its use of a set of protocols called TCP/IP (for Transmission Control Protocol/Internet Protocol). Two recent adaptations of Internet technology, the intranet and the extranet, also make use of the TCP/IP protocol.

For most Internet users, electronic mail (email) practically replaced the postal service for short written transactions. People communicate over the Internet in a number of other ways including  Internet Relay Chat (IRC), Internet telephony, instant messaging, video chat or social media

The most widely used part of the Internet is the World Wide Web (often abbreviated "WWW" or called "the Web"). Its outstanding feature is hypertext, a method of instant cross-referencing. In most Web sites, certain words or phrases appear in text of a different color than the rest; often this text is also underlined. When you select one of these words or phrases, you will be transferred to the site or page that is relevant to this word or phrase. Sometimes there are buttons, images, or portions of images that are "clickable." If you move the pointer over a spot on a Web site and the pointer changes into a hand, this indicates that you can click and be transferred to another site.

Using the Web, you have access to billions of pages of information. Web browsing is done with a Web browser, the most popular of which are Chrome, Firefox and Internet Explorer. The appearance of a particular Web site may vary slightly depending on the browser you use. Also, later versions of a particular browser are able to render more "bells and whistles" such as animation, virtual reality, sound, and music files, than earlier versions.

The Internet has continued to grow and evolve over the years of its existence. IPv6, for example, was designed to anticipate enormous future expansion in the number of available IP addresses. In a related development, the Internet of Things (IoT) is the burgeoning environment in which almost any entity or object can be provided with a unique identifier and the ability to transfer data automatically over the Internet.

NETWORKING AND COMMUNICATION

What is Networking and Communication?

    Data communications refers to the transmission of this digital data between two or more computers and a computer network or data network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet.



What are the types of Computer Networks?
    In computer networks, the data is passed in the form of packets. The devices that transmit or receive this data, such as a phone or a computer, are referred to as nodes. There are three main types of networks: 

1. Local Area Network (LAN): It is usually a small network that is restricted to a small geographic area. A computer network available only to the residents of a building can be called a LAN. 

2. Wide Area Network (WAN): As the name implies, these networks cover a broad range of geographic area. WANs are used to connect LANs and other types of networks together so that users and computers can communicate with computers in other regions. An example of a WAN is the much-used and loved, Internet. 

3. Metropolitan Area Network (MAN): MAN is a network that connects the users with computer resources in a geographic area that is larger than LAN but not quite as large as WAN.


What are the basic components of  Computer Networks?

1.Servers - Servers are computers that hold shared files, programs, and the network operating system. Servers provide access to network resources to all the users of the network. There are many different kinds of servers, and one server can provide several functions. For example, there are file servers, print servers, mail servers, communication servers, database servers, print servers, fax servers and web servers, to name a few.

2.Clients - Clients are computers that access and use the network and shared network resources. Client computers are basically the customers(users) of the network, as they request and receive services from the servers.

3.Transmission Media - Transmission media are the facilities used to interconnect computers in a network, such as twisted-pair wire, coaxial cable, and optical fiber cable. Transmission media are sometimes called channels, links or lines.

4.Shared data - Shared data are data that file servers provide to clients such as data files, printer access programs and e-mail.

5.Shared printers and other peripherals - Shared printers and peripherals are hardware resources provided to the users of the network by servers. Resources provided include data files, printers, software, or any other items used by clients on the network.

6.Network Interface Card - Each computer in a network has a special expansion card called a network interface card (NIC). The NIC prepares(formats) and sends data, receives data, and controls data flow between the computer and the network. On the transmit side, the NIC passes frames of data on to the physical layer, which transmits the data to the physical link. On the receiver's side, the NIC processes bits received from the physical layer and processes the message based on its contents.

7.Local Operating System - A local operating system allows personal computers to access files, print to a local printer, and have and use one or more disk and CD drives that are located on the computer. 

8.Network Operating System - The network operating system is a program that runs on computers and servers, and allows the computers to communicate over the network.

9.Hub - Hub is a device that splits a network connection into multiple computers. It is like a distribution center. When a computer request information from a network or a specific computer, it sends the request to the hub through a cable. The hub will receive the request and transmit it to the entire network. Each computer in the network should then figure out whether the broadcast data is for them or not.

10.Switch - Switch is a telecommunication device grouped as one of computer network components. It uses physical device addresses in each incoming messages so that it can deliver the message to the right destination or port.

IT EDUCATION & IT TRAINING

You can’t get a job or successfully run a business without all the right tools. In the ever-changing information technology industry, education is essential. CompTIA’s information technology education efforts include a comprehensive suite of IT channel training, a variety of events and meetings and a steady stream of research and market intelligence studies. Everything is designed to help you succeed.
Education-events

Channel Training

Whether you’re an IT industry rookie or a seasoned IT pro, rest assured we have something for you. Our information technology education and training content and materials are the result of a collaborative, CompTIA community-led development effort. We adhere to this IT industry-leading development process to offer the IT channel relevant, timely IT education content presented in an interactive format that caters to the way adults learn best. We’re constantly adding to and updating our existing vendor-neutral IT education to keep ourselves one step ahead of the curve. It’s this insight that helps IT channel companies diversify, grow and strengthen their businesses.

Events

The sole purpose of CompTIA events and meetings is to bring the information technology community together. When IT leaders and experts converge the possibilities are endless. There’s always something going on, but ChannelCon and our EMEA Member and Partner Conference draw the most solution providers, vendors, distributors, and media each year. While there’s no substitute for the value you’ll get from face-to-face business networking, we also offer a variety of virtual events and webinars to enhance your business.

Research and Market Intelligence

Every year, CompTIA produces a steady stream of IT research and market intelligence studies that provide members with timely, relevant data and assessments that can be put into action in business and marketing plans, education and sales strategies. Our information technology research team collects data from tens of thousands of end-users and technology companies on a wide range of issues covering technology trends, channel dynamics and the IT workforce. This research supports our information technology education and IT channel training and forecasts new industry opportunities and growth.

WHAT IS SOFTWARE?

Software can be thought of as the variable part of a computer and hardware the invariable part. Software is often divided into application software (programs that do work users are directly interested in) and system software (which includes operating systems and any program that supports application software). The term middleware is sometimes used to describe programming that mediates between application and system software or between two different kinds of application software (for example, sending a remote work request from an application in a computer that has one kind of operating system to an application in a computer with a different operating system).
         
An additional and difficult-to-classify category of software is the utility, which is a small useful program with limited capability. Some utilities come with operating systems. Like applications, utilities tend to be separately installable and capable of being used independently from the rest of the operating system.


Some general kinds of application software include:
  • Productivity software, which includes word processors, spreadsheets, and tools for use by most computer users
  • Presentation software
  • Graphics software for graphic designers
  • CAD/CAM software
  • Specialized scientific applications
  • Vertical market or industry-specific software (for example, for banking, insurance, retail, and manufacturing environments)
Firmware or microcode is programming that is loaded into a special area on a microprocessor or read-only memory on a one-time or infrequent basis so that thereafter it seems to be part of the hardware.

Eyeshadow Huda Beauty (RM150)

Inspired by the mysterious landscape of the desert at twilight, Huda Beauty’s Desert Dusk Palette will bring a hypnotic touch of Arabian luxe to your make up collection. Like a treasure chest overflowing with precious jewels, it features everything you need to master beguiling eye effects in one slimline (clutch bag-compatible) case. With 18 ultra-versatile powder shadows – eight matte shades, six pressed pearls, three duo-chrome toppers and one pure glitter – we're completely besotted with the broad spectrum of hues and textures. You're guaranteed to fall head-over-heels for iridescent ‘Twilight’ and ‘Retrograde’, rich metallic burgundy ‘Turkish Delight’, peachy matte ‘Desert Sand’ and vibrant purple ‘Amethyst’, not to mention the rest of the subtle sandy nudes, vibrant ochres and glimmering jewel metallics. Each of the stunning shades looks stunning on its own, or blended for a strikingly beguiling make up look. Make sure you don't get waylaid on your way to the checkout! This sought-after edit will not hang around...

Monday, 12 February 2018

INTENSE EAU DA PARFUM (VICTORIA SECRET) RM251

Victoria's Secret Intense Perfume Eau De Parfum. No limits. Too much is never enough with an intoxicating blend of salted praline coconut and creamy florals.






About the product
  • Fragrance type: Warm
  • Notes: Salted praline coconut, sueded musks and plum noir
  • 50 ml/1.7 fl. oz.
  • Brand New In Box with Cellophane Wrap








Monday, 5 February 2018

MACBOOK AIR (RM5,999)


The MacBook Air is a line of Macintosh subnotebook computers developed and manufactured by Apple Inc. It consists of a full-size keyboard, a machined aluminum case, and a thin light structure. The Air is available with a screen size of (measured diagonally) 13.3in (33.782 cm), with different specifications produced by Apple. Since 2011, all MacBook Air models have used solid-state drive storage and Intel Core i5 or i7 CPUs. A MacBook Air with an 11.6in (29.46 cm) screen was made available in 2010.

In the current product line, the MacBook Air sits below the performance-range of the MacBook Pro and compared to the MacBook Retina, its features reflect different priorities. The Air was originally released as a premium ultraportable positioned above the previous MacBook. Since then, the Air has become Apple's entry-level laptop due to the MacBook's discontinuation in 2011, as well as lowered prices on subsequent iterations.

Template by:

Free Blog Templates