Keyboard
Keyboard is an input device used to enter text, numbers and many more symbols and commands into the computer system.
Notes with worthy tutorials
Based on evolution history, programming languages are divided into these three broad categories, they are as follows, 1. Machine Language: Machine Language consists of 1s and 0s only. These are hard to use. Machine languages are called the first generation languages. A machine can understand these languages. There is not translator of these languages as … Read more
Software Software is a set of instructions that make the computer perform tasks. In other words, software tells the computer what to do. Though the array of available programs is vast and varied, most software fall into two major categories; system software and application software. Types of software System software Operating system software Network operating … Read more
Keyboard is an input device used to enter text, numbers and many more symbols and commands into the computer system.
Peripheral Device: Those devices which are not required or essential for a computer system to boot and run are called peripheral devices. A computer system has four categories of computer hardware among which mostly all I/O devices are peripheral devices. Though there are other devices which are both input and output devices and most of … Read more
Based on the direction of data from sender to receiver, there can be 3 types of transmission modes which are as follows
Computer Hardware: Computer Hardware is any part of the computer that can be touched. These are primarily electronic devices used to build up the computer. Computer Hardware actually perform the computing operations along with taking input and outputting the computed result or to store that. There are four categories of computer hardware, they are being described below. … Read more
Computer Threats: A threat, in general, is a person or a thing likely to cause damage or danger. In computer security, a computer threat is a possible danger that might exploit vulnerability to breach security and therefore cause possible harm. A computer threat is any activity that can cause damage to private or any data … Read more
Malware Malicious Software or Malware is any piece of software that disrupts computer operation, steal information, gain access to private systems or display unwanted advertising. Malware causes intentional harm, direct or indirect, to the computer by damaging files etc. or to the user by stealing sensitive information of the user from the computer etc. A … Read more
Tree: Data frequently contain a hierarchical relationship between various elements. The data structure which reflects this relationship is called a rooted tree graph or simply a tree. Among different types of data structures in practice, tree is very important to store and manipulate data with complex relationship. This is sometimes like the properties of an … Read more
Risk management is a series of steps that help a software team to understand and manage uncertainty. It’s a really good idea to identify it, assess its probability of occurrence, estimate its impact, and establish a contingency plan that─ ‘should the problem actually occur’. Risk management is a part of umbrella activities. Simplistically, you can think of a risk as something that you’d prefer not to have happen. Risks may threaten the project, the software that is being developed or the organization.