A Clarification Of Several Notions About Which Everyone Should Know Educated Person
Basically, digital content refers to information available for sharing, or downloaded on electronic media like an eBook or iTunes song, in that chapter one the writer focused on the binary system., The Binary data is processed, stored, and transmitted as a series of 0s and Each 1 or 0 is called a(n) bit. A series of eight 0s and 1s called a (n) byte, Numeric data consists of numbers which suppose to be used in arithmetic operations, and It can be represented digitally using the binary number system. On the other hand, the Character data is composed of symbols, letters, and numerals that might not use in arithmetic operations.
For the purpose of reducing file transmission times, and it’s size, the digital data can be compressed. The Lossless compression provides the means to compress data and reconstitute it into its original state. Lossy compression throws away some of its original data throughout the compression procedure. The Compressed files normally have .zip at the end of the file name and are comes with special icons. These files have to be unzipped or extracted before we can view the data. The sound, Music, and voices effects can all be recorded and stored on a computer system as digital audio. To digitally record sound, samples of the sound are collected at periodic intervals and stored as numeric data. High-quality sound is usually sampled at 44.1 kHz, and each stereo sample requires 32 bits of storage space. To conserve space, radio-quality recordings of speaking voices are often recorded at lower sampling rates. The digital audio file formats include WAV, AAC, WMA, Ogg, and MP3. Most portable media players work with an MP3 format or with the AAC format, used for .m4p files at the iTunes Store. A bitmap graphic is composed of a grid of tiny rectangular cells called pixels. The color of each cell is stored as a binary number. Popular bitmap graphics formats include BMP, TIFF, GIF, JPEG, RAW, and PNG. Of these formats, GIF, JPEG, and PNG are supported by most Web browsers.
Digital Devices
Now a day’s digital devices use a variety of storage technologies. The Magnetic storage technologies, for example, hard disks, store data as particles oriented south or north. whereas a hard disk drive provides multiple platters for data storage that are preserved inside the drive case to prevent airborne contaminants from interfering with the read-write heads. We know that the Hard disks are fewer durable rather than many other types of storage, so it is very important to make a copy of the data they contain. Similarly, the Optical storage technologies store data as a series of pits and lands on the surface of CDs, DVDs, or BDs. Storage technologies, for example, CD ROM, are often used for distributing software, but we cannot alter the disc’s contents.
Although, the Recordable technology always allows us to write data on a CD, BD, or DVD, we cannot erase or modify that data.
On the other hand, the rewritable or rerecord able technology allows us to write and remove data on a CD, DVD, or BD. The Solid-state storage technologies, like USB flash drives, store data by activating electrons in a microscopic grid of circuitry. We know that a backup is a copy of documents or files that have been made in case the original files become broken. A proper backup plan allows us to restore a device’s operating system, data files, settings, accounts, software, and profiles in case of a huge hardware crash or virus contamination. The personal computer backups are usually recorded on external hard drives, online storage services, USB flash drives, and network servers.
The common easy way to get a backup of significant data files is to use the copy command to make duplicates and store them on a pen drive. The Backup utilities such as Time Machine and File History use a technique called file synchronization to make sure that files on two devices are the same. A floppy image is a bit-for-bit copy of the data from all sectors of a hard disk.
Networks
A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. Two famous and very common types of networks are Wide Area Network (WAN), and Local Area Network (LAN). Beside that there are some different type of network in our community such as WLAN - Wireless Local Area Network., MAN - Metropolitan Area Network, and SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network.
The Network security consists of the practices, and policies adopted to prevent and monitor unofficial access, misuse, modification, or denial of a computer network and network-accessible resources. Networks can be personal, such as within a company, and others which might be open to public access.
The Web
The web is a way of accessing information through the internet. That is an information-sharing model that is built on top of the internet. The web uses the HTTP protocol, only one of the languages spoken over the internet, to transmit data. Web services, which use HTTP to allow applications to communicate in order to exchange business logic, use the web to share information. The web also utilizes browsers, such as Internet Explorer or Firefox, to access Web documents called web pages that are linked to each other via hyperlinks. The Web documents also include graphics, sounds, text, and video.
We can access the internet to view the World Wide Web and any of the WebPages or other content it contains. The web is the information-sharing portion of the web. It is the broad name for the HTML pages that are served on the internet. The web consists of billions of digital pages that are viewable through web browser software on your computers. These pages contain many types of content, including static content such as encyclopedia pages and dynamic content like eBay sales, stocks, and weather, news and traffic reports.
WebPages are connected using Hypertext Transfer Protocol, the coding language that allows us to jump to any public web page by clicking a link or knowing a URL, which is the unique address for each webpage on the internet.
Social Media
Social media always refers to websites and applications which are designed to allow people to share their content quickly, efficiently, and in real-time. Now a day’s people define social media as apps on their smart phone or tablet, but the fact truth is, this communication tool started with computers. This misunderstanding stems from the fact that most social media users access their tools via their different apps
The ability to share, opinions, events, photos etc in real-time has transformed the way we live and, also, the way to do their business. People who engage in social media as an integral part of their marketing approach usually see measurable results. But t it is true that the key way to successful social media is to not treat it like an extra attachment but to treat it with the same care, respect, and attention you do all of your marketing efforts.
Social media can allow people to do at least four important things: Discover new ideas and trends, Connect with existing and new audiences in deeper ways. Bring attention and traffic to your work, and Build, craft and enhance your brand. In the 21st century, the Social media is becoming an essential part of human life online as social websites and applications proliferate. Most of the traditional online media include social components, such as comment fields for users. In business, social media is used to market products, to promote brands, connect to current customers and foster new business strategy.
Software
The common purpose of application software is a type of application that can be used for different tasks. Which is not only limited to one particular function. We can find an example a word processor might be classed as general purpose software as it could allow a user to write a narrative , create a different menu for different business purpose or even make a poster and other banners. The operating system controls the basic functions of a computer or network. It's a software program that enables hardware to communicate and operate with the computer software. The System software industry caters to enterprise application development markets through direct sales and channel partners.
The Computer software systems are classified into three major types namely system software, programming software, and an application software. Here the examples and types of software as follow:-
Software, Examples , and Program respectively:- Game , Madden NFL Football, Quake, World of War craft Yes.
Internet browser Firefox, Google Chrome, Internet Explorer Yes.
Movie player VLC, Windows Media Player Yes.
Digital Security
If we are searching for a reasonable and efficient way to provide a solid layer of surveillance around our home, a digital security system with video is a wonderful tool to use. The digital security systems are sometimes which referred to as IP-based systems because they rely on high-speed networking to function. Now everybody knows that the digital security risk is any incident that might cause a defeat or broke to a computer or mobile device, software, data, information, hardware, or the processing capability. Any unlawful operate involving the use of a computer or related devices generally is referred to as a computer crime.
Lots of home security systems suggest great technology features, including wireless systems. But with a system that runs off of cellular service and isn't hardwired to a phone line, we might be the wonder if it's safe and secure. The Digital Security is very important because it allows to people to use social media and online baking and protects them from risks such as identity theft and fraud.
ITC
ICT is an umbrella term that includes any communication device or application, surrounding: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as video conferencing and distance learning ICT is one of the world’s major economic sectors; revenues exceed those of the oil and gas industry and the world’s airlines. Television is a technology designed to send moving images over a distance. Beginning with black-and-white sets, televisions progressed to colored programming and eventually transitioned to digital television (DTV).Pay television is a popular subscription service in which consumers pay to receive a selection of television channels.
The Job seekers can produce resumes in a variety of formats, Here is some popular format as follow:-
Print, Email, HTML, LinkedIn, and Online Job service
The resume is the key way to getting success in our carriers:-
Good Resume should be Clear and concise, we have to eliminate unnecessary words, phrases, and sentences. Be efficient with words when describing our task, duties, titles, and accomplishments. When we built our Resume always we have to place the most important point first. We have to summarize skills at the top of the Resume, and we have to list our qualification by the importance of the job you seek.
Use language effectively: - We have to always double check grammar and spelling. When posting information in a database, we have to use nouns that describe our skills. We have to use the action verb to maintain the reader interest, and we have to also use past and present tenses consistently
Information System
We know that the Information systems are combinations of software, hardware and other telecommunications networks which people are normally construction and use to collect, create, and distribute useful data, naturally in organizational settings. In this chapter nine, we have been introduced to the thought of information systems. Here we have reviewed several definitions, with a focus on the components of information systems: technology, people, and process. We have reviewed how the business use of information systems has evolved over the years, from the use of large mainframe computers for number crunching, through the introduction of the PC and networks, all the way to the era of mobile computing. During each of these phases, new innovations in software and technology allowed businesses to integrate technology more deeply.
We are now to a point where every corporation is using information systems and asking the question: Does it bring an aggressive advantage? In the end, that is really what this book is about. Every businessperson should understand what an information system is and how it can be used to bring a competitive advantage. And that is the task we have before us.
Databases
The Database is a systematic collection of data. Databases support storage and manipulation of data. Databases make data management easy.
SQL:- Structured Query language (SQL) pronounced as "S-Q-L" or sometimes as "See-Quel" is actually the standard language for dealing with Relational Databases.SQL programming can be effectively used to insert, search, update, delete database records. We have some popular database available now, such as- MySQL Database, Oracle, Ms. SQL Server, Sybase, etc uses SQL! How to use SQL syntaxes? SQL syntaxes used in these databases are almost similar, except the fact that some are using few different syntaxes and even proprietary SQL syntaxes.
NoSQL is an upcoming category of Database Management Systems. Its main characteristic is its non-adherence to Relational Database Concepts. NoSQL means "Not only SQL".
The alternative to the above problem would be to distribute our database load on multiple hosts as the load increases. NoSQL database is non-relational databases that scale out better than relational databases and are designed with web applications in mind. A database management system (DBMS) is a computer software that enables users and applications to store, modify and analyze a database. Now’s a day database technology is becoming increasingly complex and supports previously unthinkable data volumes – all driven by the demands of today’s always-on economy. This drives most organizations to spend up to 75% of their time just keeping the lights on, leaving very little time to deliver innovations that move the business forward.
As we know the Database Design is a collection of processes that facilitate the designing, development, implementation, and maintenance of enterprise data management system.
The first objectives of database designing are to produce logical and physical designs models of the proposed database system. The logical model concentrates on the data requirements and the data to be stored independently of physical considerations. It does not concern itself with how the data will be stored or where it will be stored physically.
The physical data design model involves translating the logical design of the database onto physical media using hardware resources and software systems such as database management systems (DBMS).
Big data is an expression that describes a large number of data both structured and unstructured that inundates a business on a day-to-day basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and strategic business moves.
Programming
Generally, the program development life cycle contains 6 phases, they are as follows….Problem Definition, Problem Analysis, Algorithm Development., Coding & Documentation, Testing & Debugging, and Maintenance. A programming tool could be any software program or utility that aids software developers or programmers in creating, editing, debugging, maintaining and/or performing any programming or development-specific task. A programming tool is also known as a software development tool.
The procedural language is a type of computer programming language which specifies a sequence of well-structured steps and actions within its programming context to compose a program. It contains a systematic order of statements, functions, and commands to complete a computational task or program. Declarative programming is a programming model in which the programmer defines what needs to be accomplished by the program without defining how it needs to be implemented. In other words, the approach focuses on what needs to be achieved instead of instructing how to achieve it. It is different from an imperative program which has the command set to resolve a certain set of problems by describing the steps required to find the solution. Declarative programming always describes a particular division of problems with language implementation taking care of finding the solution. The declarative programming approach helps in simplifying the programming behind some parallel processing applications.