A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.

Showing posts with label definition. Show all posts
Showing posts with label definition. Show all posts

Wednesday, June 9, 2021

Artificial intelligence

Artificial Intelligence or sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals.

The field of artificial intelligence (AI) has evolved from humble beginnings to a field with global impact.

The term intelligence refers to the ability to acquire and apply different skills and knowledge to solve a given problem. In addition, intelligence is also concerned with the use of general mental capability to solve, reason, and learning various situations.

Artificial intelligence (AI) is a branch of computer science. It is the development of computer systems that are able to perform tasks that would require human intelligence. AI algorithms can tackle learning, perception, problem-solving, language-understanding and/or logical reasoning.

AI is used in many ways within the modern world, from personal assistants to self-driving car. Artificial intelligence (AI) is evolving rapidly. While science fiction every so often portraits AI as robots closely as possible to humans.

Artificial intelligence is used to develop various robots that have human intellectual characteristics, behaviors, learning from past experience, have abilities to sense, and abilities to making predications and determine meaning of certain situation.

The most important purpose of artificial intelligence is to reduce human casualties in: wars, dangerous workspaces, car accidents, natural disasters.
Artificial intelligence

Thursday, December 10, 2020

Conversational commerce

Human speech can be considered a kind of coding language, think of English, Mandarin, or Swahili. Until recently, computer programs spoke a different language -- HTML, C++, JavaScript, etc.

Dan Miller, Lead Analyst and Founder of Opus Research, Inc., coined the term “conversational commerce” in 2013. People need to interact in order to transact. They have to ask questions, get advice, and understand options. Conversational commerce makes it possible for consumers to do just this without having to visit a store or call a contact center.

Matt Schlicht, the CEO of Octane AI and founder of chatbot magazine, chooses to define conversational commerce as: “Conversational commerce is an automated technology, powered by rules and sometimes artificial intelligence, that enables online shoppers and brands to interact with one another via chat and voice interfaces.”

‘Conversational commerce’ has become a term for business being done using natural language, linked with technology to provide personalized help, context-aware recommendations, and concierge-like assistance for everything from shopping to traveling to scheduling.

Conversational commerce makes it easy for consumers to communicate with brands from any device, on their own schedule, using natural language to buy things and get things done.
Conversational commerce


Wednesday, August 26, 2020

Cascading Style Sheets

Cascading Style Sheets, fondly referred to as CSS, is a simple design language intended to simplify the process of making web pages presentable. It is a style sheet language used to describe the presentation of a document written in a mark up language. CSS is a simple mechanism for adding style to Web documents in HTML and XHTML

CSS handles the look and feel part of a web page. CSS contains the ability to set colors on text and in the background of any element; it permits the creation of borders around any element, as well as the increase or decrease of the space around them; it allows authors to change the way text is capitalized, decorated (e.g., underlining), its spacing, and even whether or not it is displayed at all; and many other effects.

CSS is easy to learn and understand but it provides a powerful control over the presentation of an HTML document. When combined with a structural markup language like HTML, XHTML, or XML (though not limited to these), Cascading Style Sheets provide Internet browsers with the information that enables them to present all the visual aspects of a web document.

Advantages of CSS:
*CSS saves time
*Pages load faster
*Easy maintenance
*Superior styles to HTML
*Multiple Device Compatibility
*Global web standards
*Powerful and flexible way to specify the formatting of Html elements
*Share style sheets across multiple documents or entire website
Cascading Style Sheets

Tuesday, July 21, 2020

Data warehouse

The term "Data Warehouse" was first coined by Bill Inmon in 1990. According to Inmon, a data warehouse is a subject-oriented, integrated, time-variant, and non-volatile collection of data. This data helps analysts to take informed decisions in an organization.

A data warehousing is defined as a technique for collecting and managing data from varied sources to provide meaningful business insights. It is a blend of technologies and components which aids the strategic use of data.

A data warehouse is a database, which is kept separate from the organization's operational database. It possesses consolidated historical data, which helps the organization to analyze its business. However, the data warehouse is not a product but an environment. It is an architectural construct of an information system which provides users with current and historical decision support information which is difficult to access or present in the traditional operational data store.

The data warehouse (DW) acts as a central repository of information originating from one or more data sources. Data flows from transactional systems and other relational databases to the data warehouse and generally consist of structured, semi-structured, and unstructured data. This data is loaded, processed and consumed on a regular basis.

The main features of data warehousing can be summarized as follows:
*Easy access to nonskilled computer users.
*Data integration based on a model of the enterprise.
*Flexible querying capabilities to take advantage of the information assets.
*Synthesis, to enable targeted and effective analysis.
*Multidimensional representation to give the user an intuitive and handy view of information.
*Correctness, completeness, and freshness of information.

There are the three types of data warehouse applications.
*Information Processing – A data warehouse allows to process the data stored in it. The data can be processed by means of querying, basic statistical analysis, reporting using crosstabs, tables, charts, or graphs.
*Analytical Processing – A data warehouse supports analytical processing of the information stored in it. The data can be analyzed by means of basic OLAP (online analytical processing) operations, including slice-and-dice, drill down, drill up, and pivoting.
*Data Mining - Data mining supports knowledge discovery by finding hidden patterns and associations, constructing analytical models, performing classification and prediction. These mining results can be presented using visualization tools.

Data warehouse technologies are successfully used:
• Trade Sales and claims analyses, shipment and inventory control, customer care and public relations
• Craftsmanship Production cost control, supplier and order support
• Financial services Risk analysis and credit cards, fraud detection
• Transport industry Vehicle management
• Telecommunication services Call flow analysis and customer profile analysis
• Health care service Patient admission and discharge analysis and bookkeeping in accounts departments
Data warehouse

Saturday, October 19, 2019

Hacktivism

Hacktivism is a portmanteau of hacking and activism, which was coined in the US by the hacker group Cult of the Dead Cow in the 1990s. It is the subversive use of computers and computer networks to promote a political agenda or a social change. With roots in hacker culture and hacker ethics, its ends are often related to the free speech, human rights, or freedom of information movements.

As the cyber threat landscape continues to evolve, the ability to monitor, detect, and defend against cyberattacks has now become more arduous than ever.

Hacktivists operate within the fabric of cyberspace, struggling over what is technologically possible in virtual lives, and reaches out of cyberspace utilising virtual powers to mould offline life. Social movements and popular protest are integral parts of twenty-first-century societies. Hacktivism is activism gone electronic.

Cyberattacks by hacktivists are at an all-time high. With the use of social media, hacktivists can now spread the word and recruit across the globe with a single tweet or a Facebook post to carry out their agenda driven attack.

Hacktivists who are motivated by nationalism or patriotism tend to target government websites within the state offending their patriotic sentiments and will be referred to as ‘hacktriots’—patriotic hackers.
Hacktivism

Sunday, October 6, 2019

Data mining

Data Mining, also popularly known as Knowledge Discovery in Databases (KDD), refers to the nontrivial extraction of implicit, previously unknown and potentially useful information from data in databases. While data mining and knowledge discovery in databases (or KDD) are frequently treated as synonyms, data mining is actually part of the knowledge discovery process.

Statisticians were the first to use the term “data mining.” Originally, “datamining” or “data dredging” was a derogatory term referring to attempts toextract information that was not supported by the data.

Data mining is a multidisciplinary field, drawing work from areas including database technology, machine learning, statistics, pattern recognition, information retrieval, neural networks, knowledge-based systems, artificial intelligence, high-performance computing, and data visualization.

Data mining derives its name from the similarities between searching for valuable information in a large database and mining rocks for a vein of valuable ore. Both imply either sifting through a large amount of material or ingeniously probing the material to exactly pinpoint where the values reside.

The essential difference between the data mining and the traditional data analysis (such as query, reporting and on-line application of analysis) is that the data mining is to mine information and discover knowledge on the premise of no clear assumption.

Data mining is highly useful in the following domains:
*Market Analysis and Management
*Corporate Analysis & Risk Management
*Fraud Detection
Apart from these, data mining can also be used in the areas of production control, customer retention, science exploration, sports, astrology, and Internet Web Surf-Aid.

Stages of the Data Mining Process
1. Data gathering
2. Data cleansing
3. Feature extraction
4. Pattern extraction and discovery
5. Visualization of the data.
6. Evaluation of results
Data mining

Tuesday, July 10, 2018

Characteristics of transaction processing system

A transaction processing system (TPS) is a system that captures, enters, stores, retrieves, and processes the relevant details of business events and generates the information and documents necessary for running the business.

TPS are aimed at improving the routine business activities on which all organizations depend.

A transaction is any event or activity that affects the organization which occur as part of doing business, such as sales, purchases, deposit, withdrawals, refunds and payments. A transaction is the action that an entity performs beyond itself, i.e., on another entity.

Hence a transaction, at the simplest level, can be defined as an event involving the action of one entity on another.

Common transactions include placing orders, billing customers, hiring employees, and depositing cheques.

The 4 characteristics of TPS include:
*Rapid Response = Fast performance with a rapid response time is critical.
*Reliability = Failure rate must be very low
*Inflexibility = a TPS wants every transaction to be processed in the same way regardless of user. If TPS were flexible there would be too many opportunities for non-standard operations (less consistency).
*Controlled processing = the processing in a TPS must support an organisation’s operations.
Characteristics of transaction processing system

Friday, June 1, 2018

What is swatting?

Cybervandals have developed a form of “entertainment” called “swatting”; calling 911 and faking an emergency that draws a response for law enforcement – usually a SWAT team.

Swatting, is not a new threat; it has evolved over the last decade or so and includes a range of tactics and techniques used to cause false public alarm and divert law enforcement resources to a hoax threat.

The callers often tell tales of hostages about to be executed or bombes about to go off. Swatters have become more sophisticated in their targets and use of technology. Those who attempt to cause a swatting incident use several techniques, including: caller ID spoofing, TTY relay technologies, and social engineering. These actors will often have a reasonable scenario and will sometime include personal information.

Swatting should be considered a serious threat to the operations of a public safety agency. In many of the cases, the suspects have been successful in having a large response to a fake incident.
What is swatting?

Saturday, April 21, 2018

Computer profiling

Due to development of technology, digital devices are changing from data containers to a sort of “digital diaries” where it is impossible not to leave evidence of people lifestyle, even if unintentionally.

Chat rooms, blogs, forums, social networks, etc..., are now the new keeper of people personal habits, with the feature of easily allowing the structuring and mining of data. Capturing information about users and their interest is the main function of user profiling.

Computer profiling is the forensic reconstruction of a computer system for the purpose of characterizing its behavior and usage, providing for the identification of computer systems of interest.

The computer profiling object model is an information model which models a computer as objects with various attributes and inter-relationships.

Profiling is usually carried out using data mining technology, with the help of data mining techniques appropriate information, patterns are automatically discovered, and profiles are generated from large data set.

Profiling involves the use of inductive logic to determine indicators of characteristics and or behavior patterns that are related to the occurrence of certain behavior.

A judgment is made about a particular individual based on the past behavior of other individuals who appear statistically similar, that is, who have similar demographic, socioeconomic, physical, or other characteristics.
Computer profiling

Wednesday, March 21, 2018

Multi-user operating system

Operating systems may be single user, like a typical PC at home, or multi-user, where more than one person (usually many more) can use the same computer at apparently the same time.

Multi-user operating system can be defined as an operating system that can handle more than one user concurrently. Concurrent service of requests does not necessarily mean that the requests are serviced simultaneously. Instead, to the users they appear to be serviced at the same time.

The advantage of using multi-user operating system is that it facilitates the sharing of data and information among different users.

Multi-user operating systems are very similar to multi-tasking operating system. On the other hand, multi-tasking typically refers to system in which the tasks interact, while multi-user systems generally try to isolate the various tasks.

It allows multi-user to use programs that are simultaneously running on a single network server, called a terminal server.

A dedicated transaction processing system such as railway reservation system that supports hundreds of terminal under control of a single program is an example of multi-user operating system.
Multi-user operating system

Saturday, February 3, 2018

What is operating system?

Operating system is the most important piece of software in a computer. The operating system is the software responsible for mediating the control of all three families of the computer’s resources: hardware, software and data.

The operating system s control how the system works. Controls the running of programs and provides such services as resource allocation, scheduling, input, and out control and data management.

The fundamental task is to control interaction among users and also between users and system services. Performance is a critical factor of all facets of an operating system. All the important parts of the operating system such as memory management, process and thread scheduler, file I/O and communication protocol should work as efficiently as possible.
What is operating system?

Saturday, October 28, 2017

What is “doxxing”?

Doxxing is the word coined to describe the process of releasing of personally identifying information to the public without their consent.

This may include their real name, address, phone number, account names, passwords, even credit card details.
Doxxing is used to intimidate and frighten people by threatening their livehood and reputations - and at times their physical safety. Harassment and abuse, including rape and death threats are directed at the subject of the doxxing online at home and at work.

The effects of doxxing can be as seemingly mild as having of pizzas show up at a target’s house to as terrifying as having people show up outside their place of work, take photograph of them as they enter and leave their home, or attempt to engage or attack them.
What is “doxxing”?

Thursday, August 17, 2017

Secondary storage devices

Modern computers employ a hierarchy of storage devices which may be broadly divided into two categories: ‘primary’ and ‘secondary’ systems.

What is secondary storage? The bulk of data can’t be stored in the main memory as this memory is costly and naturally some other cheaper memory devices are required. These cheaper memory devices, called Secondary Storage Devices can store bulk of data at very less cost.
Devices such as flash memory, the hard disk, floppy disk, and writable optical disk, provide with examples of secondary storage devices. These offer larger storage capacity than primary storage devices, but operate more slowly. Flash RAM, sometimes embedded within solid-sate drives, provides the fastest access at the highest cost. Optical discs offer the slowest but cheapest storage method.

The secondary stored devices allow permanent storage of data and instructions. The data stored on a secondary storage device can be accessed, depending upon how it its stored on the device.

The benefits of secondary storage including:
*Non-Volatility
*Large capacity
*Reliable
*Convenience
*Low cost
*Re-usability
*Portability
Secondary storage devices

Thursday, July 6, 2017

What are the functions of business intelligence?

The most well-known definitions of business intelligence is “The right information to the right person at the right time in the right way.”

Intelligence involves knowing information about competitors, such as their profitability and turnover rate. The most important thing to gain from intelligence is knowledge of customers and potential customers.
Business intelligence technologies provide historical, current and predictive views of business operations. Common functions of business intelligence technologies include
*reporting
*online analytical processing
*analytics, data mining
*process mining
*complex event processing
*business performance management
*benchmarking
*text mining
*predictive analytics
*prescriptive analytics

Business intelligence system queries a data source, uses techniques such as online analytical processing and data mining to analyze information in the source and reports the results of its work.
What are the functions of business intelligence?

Friday, June 9, 2017

Internet Commerce

Nowadays shoppers can buy online at their convenience at any time and from anywhere. The World Wide Web provides the basic communication infrastructure or framework for supporting consumer oriented e-commerce,

E-commerce can be defined as a means of conducting business electronically via online transaction among trading partners.

While e-commerce encompass business activities that is conducted electronically, such as using the world wide web, the multimedia interactive component of the internet, telephone lines, leased lines and wireless, e-business can be understood as a superior set which extends the understanding of e-commerce to reflect the vision of the organization.
E-commerce can be between two business transmitting funds, goods, or services or between a business and a customer.

The goods or services are ordered over the internet, but the payment or ultimate delivery of the good or service may be conducted on or off line.

Internet or the information superhighway has been well understood as the enabler or the enabling technology. E-commerce sites nowadays expose variable degrees of sophistication, functionality, and complexity. Most e-commerce sites lists of available products, usually organized in category.
Internet Commerce

Saturday, March 4, 2017

Business concept of E-Business

E-business enables the market to become global. The well-known yellow pages are becoming electronic directories. E-business does involve implementing new systems and technology, which is a minor but important part of the puzzle.

E-business is about conducting the business both internally and/or externally by electronic means, e.g. over the internet, intranet or extranet. In involves not only buying and selling, but also operating automated, efficient internal business processes servicing customers and collaborating with the suppliers and business partners.

E-business impacts the technology, processes, organization, and management of the organization. These statements have strong implications for carrying out a successful e-business effort.

*Politics is an important part of e-business implementation. Nobody can ignore it or sweep it under the rug. It is there because e-business has such far-ranging impacts. E-business alters the power structure of departments and the entire organization.

*The culture of the society, organization and environment is an important factor in e-business because we are dealing with customers, suppliers and employees.

*Information technology (IT) has a major role that goes beyond systems work. Information technology is the only group that spans the organization and addresses the technology. Information technology must have a central role in e-business implementation.

Conducting business electronically is a change from traditional ways of doing things, leading to large scale transformation of existing business. To attain business efficiencies from e-business, it is imperative that organization effectively manage the e-business environment, and all associated changes to digitize and maintain the environment.
Business concept of E-Business

Monday, October 10, 2016

E-Learning and digital learning

E-learning or electronic learning - has been referred to as ‘technology-enhanced learning’ and more recently as ‘digital learning’.

E-learning describes as set of technology-mediated methods that can be applied to support student learning and can induced elements of assessment, tutoring and instruction. Electronic means including text, audio, motion video, still graphics, animation, live interaction with a facilitator and/or other students, exercises and tests.

From the student point of view, e-learning is interactive, ubiquitous, easily accessible, and inexpensive, allowing learning at one’s own pace with full flexibility in terms of time avaiabilty and scheduling.

E-learning is a great tool for repetitive training. Even of users were trained at some point in time. Chances are that they did not frequently use all the features of the software and they will forget certain parts of it.

With all the course modules residing on a web site, the users can log on and retake specific course modules at any time.

Most e-learning providers will offer courses on a per- time basis or on a subscription basis. The processes involve six major activities crucial to e-learning: content creation, content support, content packaging and wrapping, content distribution, support services and delivering to end users. These processes then form a value chain.
E-Learning and digital learning

Sunday, August 21, 2016

Application programs

Software are programs written to perform specific tasks. For example, word processors are programs that the users use to write letters, papers and even books.

All software is written in programming languages. There are two types of programs: system programs and application programs.

Application programs or apps created to perform a specific user’s task. They are designed to perform certain functions either directly for their users or for the other application programs.

Applications programs use computer or mobile operating system services and other elated support programs. They can include an assortment of database programs, development tools, word processors, web browsers, image editing and other such functions.

Application programs produce output concerning the exterior world, while system programs produce output concerning the state of the computer system. Application programs may be written by users but more often are written by professional programs.

Most application programs for personal computers all into one of five major categories:
*Word processing
*Database management
*Spreadsheets
*Graphics
*Communications

When adequate application software can be purchased, programmers often modify it to their company’s specific needs.
Application programs

Wednesday, July 20, 2016

What is system software?

Software is divided into two major groups: application software and system software. Application software is associated with what users routinely work with on a daily basis to get their work accomplished.

System software is the set of instructions that control how the computer reacts. System software is commonly associated with the efficient and reliable functioning of the computer system. The system provides facilities and functions to allow applications to be developed and to operate.

General types of system software are the operating system, communications software, database software, and development software. The operating system allows the computer to interact with the application software.
What is system software?

Friday, February 12, 2016

Cyber Crime definition

Cyber crime constitutes criminal acts, committed by way of computer networks that can be accomplished while sitting at a computer board. Ksehtri (2009) defined cybercrime as a criminal activity in which computers or computer networks are the principal means of committing an offense or violating laws, rules or regulation.

The awareness of security has since September 11 events increased in many ways - increased concerned over physical sites, increased concerns of securing networked infrastructure and changes in corporate attitude from being confident about their organization’s security and delaying spending on security, to seeing IT security as an essential capital investment.

Example of cyber crimes include gaining unauthorised access to computer file, denial-of-service-attacks, cyber-theft, cyber-trespass, cyber-obscenity, critical infrastructure attacks, online fraud, online money laundering, criminal uses of Internet communications, ID fraud, use of computers to further traditional crimes , and cyber-extortions.

A diverse range of acts such as disrupting the operation of remote computers with viruses, worms logic bombs, Trojan horses horses, visiting an obscene website and cyberstalking may qualify as a cybercrime.

There are many debates today among experts about what constitutes a computer-related crime or cyber crime. Cyber crime generally is understood to include traditional activities such as fraud, theft, or forgery whenever a computer is involved.

Society’ vital services and critical infrastructure: communications, finance, transportation, and utilities such as electricity, oil, gas and water rely on computer and computer networked. If these networked are damaged the nation will be disrupt.

Governments as well as business that own and operate banks, utility infrastructure, transportation systems, telecommunications networks and other critical systems, must be prepared for the possibility of a destructive attack in cyberspace. The cyber threat is out there, either directly or as collateral damage in other kinds of attacks.
Cyber Crime definition

The Most Popular Posts

  • The evolution of business intelligence (BI) tools reflects the broader progress of computing technology and data management. In the 1970s and 1980s, early ...
  • Watermelons are quintessential summer crops, prized for their refreshing, red, juicy, and crisp flesh. Producing high-quality melons requires careful handl...
  • Selenium, an essential trace element, plays a crucial role in various bodily functions, including antioxidant defense and thyroid hormone metabolism. Plant...