0% found this document useful (0 votes)
11 views

O Level

This document provides an overview of several computer science and programming topics: 1. It outlines courses on computer appreciation, organization, operating systems, word processing, spreadsheets, presentations, databases, IT and society, internet fundamentals, connectivity, networking, web publishing and browsing, HTML programming, interactivity tools, programming, C language, .NET framework, and C# basics. 2. Key concepts covered include computer hardware, binary systems, software types, Windows and Linux features, office productivity applications, databases, internet infrastructure, HTML, JavaScript, programming logic, C language syntax, pointers, files, and object-oriented .NET programming. 3. Various functions and applications are discussed for topics like spreadsheets

Uploaded by

vineet mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

O Level

This document provides an overview of several computer science and programming topics: 1. It outlines courses on computer appreciation, organization, operating systems, word processing, spreadsheets, presentations, databases, IT and society, internet fundamentals, connectivity, networking, web publishing and browsing, HTML programming, interactivity tools, programming, C language, .NET framework, and C# basics. 2. Key concepts covered include computer hardware, binary systems, software types, Windows and Linux features, office productivity applications, databases, internet infrastructure, HTML, JavaScript, programming logic, C language syntax, pointers, files, and object-oriented .NET programming. 3. Various functions and applications are discussed for topics like spreadsheets

Uploaded by

vineet mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

1. Computer Appreciation 04Hrs.

Characteristics of Computers, Input, Output, Storage units, CPU, Computer System, Binary
number system, Binary to Decimal Conversion, Decimal to Binary Conversion, ASCII Code,
Unicode.
2. Computer Organization

Central Processing Unit - Processor Speed, Cache, Memory, RAM, ROM, Booting,
Memory- Secondary Storage Devices: Floppy and Hard Disks, Optical Disks CD-ROM,
DVD, Mass Storage Devices: USB thumb drive. Managing disk Partitions, File System Input
Devices - Keyboard, Mouse, joystick, Scanner, web cam, Output Devices- Monitors,
Printers – Dot matrix, inkjet, laser, Multimedia- What is Multimedia, Text, Graphics,
Animation, Audio, Images, Video; Multimedia Application in Education, Entertainment,
Marketing. Names of common multimedia file formats, Computer Software- Relationship
between Hardware and Software; System Software, Application Software, Compiler, names
of some high level languages, free domain software.
3. Operating System 13 Hrs.
Microsoft Windows- An overview of different versions of Windows, Basic Windows
elements, File management through Windows. Using essential accessories: System tools –
Disk cleanup, Disk defragmenter, Entertainment, Games, Calculator, Imaging – Fax,
Notepad, Paint, WordPad. Command Prompt- Directory navigation, path setting, creating
and using batch files. Drives, files, directories, directory structure. Application Management:
Installing, uninstalling, Running applications. Linux- An overview of Linux, Basic Linux
elements: System Features, Software Features, File Structure, File handling in Linux: H/W,
S/W requirements, Preliminary steps before installation, specifics on Hard drive
repartitioning and booting a Linux system.
4. Word Processing 06 Hrs.
Word processing concepts: saving, closing, Opening an existing document, Selecting text,
Editing text, Finding and replacing text, printing documents, Creating and Printing Merged
Documents, Character and Paragraph Formatting, Page Design and Layout.
Editing and Profiling Tools: Checking and correcting spellings. Handling Graphics, Creating
Tables and Charts, Document Templates and Wizards.
5. Spreadsheet Package 09 Hrs.
Spreadsheet Concepts, Creating, Saving and Editing a Workbook, Inserting, Deleting Work
Sheets, entering data in a cell / formula Copying and Moving from selected cells, handling
operators in Formulae, Functions: Mathematical, Logical, statistical, text, financial, Date and
Time functions, Using Function Wizard.
Formatting a Worksheet: Formatting Cells – changing data alignment, changing date,
number, character or currency format, changing font, adding borders and colors, Printing
worksheets, Charts and Graphs – Creating, Previewing, Modifying Charts.
Integrating word processor, spread sheets, web pages.
6. Presentation Package 05 Hrs.
Creating, Opening and Saving Presentations, Creating the Look of Your Presentation,
Working in Different Views, Working with Slides, Adding and Formatting Text, Formatting
Paragraphs, Checking Spelling and Correcting Typing Mistakes, Making Notes Pages and
Handouts, Drawing and Working with Objects, Adding Clip Art and other pictures, Designing
Slide Shows, Running and Controlling a Slide Show, Printing Presentations.
7. Data Base Operations

Data Manipulation-Concept: Database, Relational Database, Integrity. Operations:


Creating, dropping, manipulating table structure. Manipulation of Data: Query, Data Entry
Form, Reports.
8. Information Technology and Society 04 Hrs.
Indian IT Act, Intellectual Property Rights – issues. Application of information Technology in
Railways, Airlines, Banking, Insurance, Inventory Control, Financial systems, Hotel
management, Education, Video games, Telephone exchanges, Mobile phones, Information
kiosks, special effects in Movies

internet
Internet, Growth of Internet, Owners of the Internet, Anatomy of Internet, ARPANET
and Internet history of the World Wide Web, basic Internet Terminology, Net etiquette.
Internet Applications – Commerce on the Internet, Governance on the Internet, Impact
of Internet on Society – Crime on/through the Internet.
2. TCP/IP – Internet Technology and Protocol 03 Hrs.
Packet switching technology, Internet Protocols: TCP/IP, Router, Internet Addressing
Scheme:
Machine Addressing (IP address), E-mail Addresses, Resources Addresses
3. Internet Connectivity 03 Hrs.
Connectivity types: level one, level two and level three connectivity, Setting up a
connection: hardware requirement, selection of a modem, software requirement,
modem configuration, Internet accounts by ISP: Telephone line options, Protocol
options, Service options, Telephone line options – Dialup connections through the
telephone system, dedicated connections through the telephone system, ISDN,
Protocol options – Shell, SLIP, PPP, Service options – E-mail, WWW, News Firewall
etc.
4. Internet Network 04 Hrs.
Network definition, Common terminologies: LAN, WAN, Node, Host, Workstation,
bandwidth, Interoperability, Network administrator, network security, Network
Components: Severs, Clients, Communication Media, Types of network: Peer to Peer,
Clients Server, Addressing in Internet: DNS, Domain Name and their organization,
understanding the Internet Protocol Address. Network topologies: Bust, star and ring,
Ethernet, FDDI, ATM and Intranet.
5. Services on Internet (Definition and Functions) 04 Hrs.
E-mail, WWW, Telnet, FTP, IRC and Search Engine
6. Electronic Mail 07 Hrs.
Email Networks and Servers, Email protocols –SMTP, POP3, IMAp4, MIME6, Structure
of an Email – Email Address, Email Header, Body and Attachments, Email Clients:
Netscape mail Clients, Outlook Express, Web based E-mail. Email encryption- Address
Book, Signature File.
7. Current Trends on Internet 03 Hrs.
Languages, Internet Phone, Internet Video, collaborative computing, e-commerce.
8. Web Publishing and Browsing 10 Hrs.
Overview, SGML, Web hosting, HTML. CGL, Documents Interchange Standards,
Components of Web Publishing, Document management, Web Page Design
Consideration and Principles, Search and Meta Search Engines, WWW, Browser,
HTTP, Publishing Tools
9. HTML Programming Basics 12 Hrs.
HTML page structure, HTML Text, HTML links, HTML document tables, HTML Frames,
HTML Images, multimedia
10. Interactivity Tools 08 Hrs.
33
ASP, VB Script, JAVA Script, JAVA and Front Page, Flash
11. Internet Security Management Concepts, Information Privacy and Copyright
Issues
04 Hrs.
Overview of Internet Security, Firewalls, Internet Security, Management Concepts and
Information Privacy and Copyright Issues, basics of asymmetric cryptosystems.

1. Introduction to Programming 04 Hrs.


The Basic Model of Computation, Algorithms, Flow-charts, Programming Languages,
Compilation, Linking and Loading, Testing and Debugging, Documentation
2. Algorithms for Problem Solving 10 Hrs.
Exchanging values of two variables, summation of a set of numbers, Decimal Base to
Binary
Base conversion, Reversing digits of an integer, GCD (Greatest Common Division) of
49
two numbers, Test whether a number is prime, Organize numbers in ascending order,
Find square root of a number, factorial computation, Fibonacci sequence, Evaluate ‘sin x’
as sum of a series, Reverse order of elements of an array, Find largest number in an array,
Print elements of upper triangular matrix, multiplication of two matrices, Evaluate a
Polynomial
3. Introduction to ‘C’ Language 04 Hrs.
Character set, Variables and Identifiers, Built-in Data Types, Variable Definition, Arithmetic
operators and Expressions, Constants and Literals, Simple assignment statement, Basic
input/output statement, Simple ‘C’ programs.
4. Conditional Statements and Loops 07 Hrs.
Decision making within a program, Conditions, Relational Operators, Logical Connectives, if
statement, if-else statement, Loops: while losop, do while, for loop, Nested loops, Infinite
loops,
Switch statement, structured Programming .
5. Arrays 06 Hrs.
One dimensional arrays: Array manipulation; Searching, Insertion, Deletion of an element
from an array; Finding the largest/smallest element in an array; Two dimensional arrays,
Addition/Multiplication of two matrices, Transpose of a square matrix; Null terminated
strings as array of characters, Standard library string functions
6. Functions 06 Hrs.
Top-down approach of problem solving, Modular programming and functions, Standard
Library
of C functions, Prototype of a function: Formal parameter list, Return Type, Function call,
Block structure, Passing arguments to a Function: call by reference, call by value,
Recursive
Functions, arrays as function arguments.
7. Storage Classes 03 Hrs.
Scope and extent, Storage Classes in a single source file: auto, extern and static, register,
Storage Classes in a multiple source files: extern and static
8. Structures and Unions 06 Hrs.
Structure variables, initialization, structure assignment, nested structure, structures and
functions, structures and arrays: arrays of structures, structures containing arrays, unions
9. Pointers 06 Hrs.
Address operators, pointer type declaration, pointer assignment, pointer initialization,
pointer
arithmetic, functions and pointers, Arrays and Pointers, pointer arrays, pointers and
structures, dynamic memory allocation.
10. Self Referential Structures and Linked Lists 04 Hrs.
Creation of a singly connected linked list, Traversing a linked list, Insertion into a linked list,
Deletion from a linked list
11. File Processing 04 Hrs.
Concept of Files, File opening in various modes and closing of a file, Reading from a file,

1.The .NET framework 03 Hrs.


Introduction, Common Language Runtime, Common Type System, Common Language
Specification, The Base Class Library, The .NET class library Intermediate language,
Justin-
Time compilation, garbage collection, Application installation & Assemblies, Web
Services, Unified classes.
2. C# Basics 11 Hrs.
Introduction, Data Types, Identifiers, variables & constants, C# statements, Object Oriented
Concept, Object and Classes, Arrays and Strings, System Collections, Delegates and
Events, Indexes Attributes, versioning.
3. C# Using Libraries 07 Hrs.
Namespace-System, Input Output, Multi-Threading, Networking and Sockets, Data
Handling, Windows Forms, C# in Web application, Error Handling.
4. Advanced Features Using C# 07 Hrs.
Lectures = 60
Practical/tutorials = 60
Total = 120
65

Detailed Syllabus
1. Introduction to Multimedia 08Hrs.
What is multimedia, Components of multimedia, Web and Internet multimedia applications,
Transition from conventional media to digital media.
2. Computer Fonts and Hypertext 10 Hrs.
Usage o f text in Multimedia, Families and faces of fonts, outline fonts, bitmap fonts
International character sets and hypertext, Digital fonts techniques.
3. Audio fundamentals and representations 10 Hrs.
Digitization of sound, frequency and bandwidth, decibel system, data rate, audio file format,
Sound synthesis, MIDI, wavetable, Compression and transmission of audio on Internet,
Adding sound to your multimedia project, Audio software and hardware.
4. Image fundamentals and representations 10 Hrs.
Colour Science , Colour, Colour Models, Colour palettes, Dithering, 2D Graphics, Image
Compression and File Formats :GIF, JPEG, JPEG 2000, PNG, TIFF, EXIF, PS, PDF, Basic
Image Processing [ Can Use Photoshop ], Use of image editing software, White balance
correction, Dynamic range correction, Gamma correction, Photo Retouching.
89
5. Video and Animation 10 Hrs.
Video Basics , How Video Works, Broadcast Video Standards, Analog video, Digital video,
Video Recording and Tape formats, Shooting and Editing Video (Use Adobe Premier for
editing), Video Compression and File Formats. Video compression based on motion
compensation, MPEG-1, MPEG-2, MPEG-4, MPEG-7, MPEG-21, Animation: Cell
Animation, Computer Animation, Morphing.
6. Multimedia Authoring 12 Hrs.
Multimedia Authoring Basics, Some Authoring Tools, Macromedia Director & Flash

…………………………………
…………………………………
………………………………
 We Are Hiring

VBScript JavaScript
VBScript (Visual Basic Script) is JavaScript is the Client side scripting
the Active Scripting Language , lightweight & language, prototype based and mostly used
designed for fast interpreter . with web browsers.
Microsoft Developed VBScript. Brendan Eich founded JavaScript
and NetScapeDeveloped it.
VBScript works at both client side and server side. JavaScript works only at client side.
VBScript is not case sensitive language. JavaScipt is case sensitive language.
It runs only on Internet Explorer (IE) browser. It runs on the all browser.
VBScript is used for server side validation. JavaScript is used for client side validation.
VBScript supports functions & subroutines and JavaScript supports only functions and
uses functionand end function for starting and uses curly bracesfor starting and ending
ending function. function.
VBScript Syntax is derived from BASIC language . JavaScript syntax is derived from C
language.
VBScript is not the default scripting language , JavaScript is default scripting language
but can be made by specifying in scripting almost in all browsers.
language.
File extension in VBScript is .vba or .vbs File Extension in JavaScript is .js

Graphics Interchange Format (GIF) was devised by UNISYS


Corporation and Compuserve, initially for transmitting graphical images over
phone lines via modems. The GIF standard uses the Lempel-Ziv-Welch
algorithm (a form of compression - see Chapter 7), modified
slightly for image scanline packets to use the line grouping of pixels
effectively.
The GIF standard is limited to 8-bit (256) color images only. While this
produces acceptable color, it is best suited for images with few distinctive
colors (e.g., graphics or drawing).
The GIF image format has a few interesting features, notwithstanding the fact
that it has been largely supplanted, The standard supports interlacing - the
successive display of pixels in widely spaced rows by a four-pass display
process.
In fact, GIF comes in two flavors. The original specification is GIF87a. The
later version, GIF89a, supports simple animation via a Graphics Control
Extension block in the data. This
provides simple control over delay time, a transparency index, and so on.
Software such as
Corel Draw allows access to and editing of GIF images.

JPEG
The most important current standard for image compression is JPEG [6].
This standard was created by a working group of the Intemational
Organization for Standardization (ISO) that was infonnally called the Joint
Photographic Experts Group and is therefore so named. We
shall study IPEG in a good deal more detail in Chapter 9, but a few salient
features of this compression standard can be mentioned here.
The human vision system has some specific limitations, which IPEG takes
advantage of to achieve high rates of compression. The eye-brain system
cannot see extremely fine detail. If many changes occur within a few pixels, we
refer to that image segment as having
high spatial frequency - that is, a great deal of change in (x, y) space. This
limitation is even more conspicuous for color vision than for grayscale (black
and white). Therefore,
color information in IPEG is decimated (partially dropped, or averaged) and
then small blocks of an image are represented in the spatial frequency domain
(u, v), rather than in (x, y). That is, the speed of changes in x and y is evaluated,
from low to high, and a new "image" is formed by grouping the coefficients or
weights of these speeds.
PNG
One interesting development stemming from the popularity of the Internet is
efforts toward more system-independent image formats. One such format is
Portable Network Graphics(PNG). This standar~ is meant to supersede the GIF
standard and extends it in important ways. The motivation for a new standard
was in part the patent held by UNISYS and Compuserve on the LZW
compression method.
Special features of PNG files include support for up to 48 bits of color
infOlmation a large increase
TIFF
Tagged Image File Format (TIFF) is another popular image file format.
Developed by
the Aldus Corporation in the 1980s, it was later supported by Microsoft. Its support for
attachment ofadditional information (refelTed to as "tags") provides a great deal offlexibility.
The most important tag is a format signifier; what type of compression etc. is in use in the
stored image. For example, TIFF can store many different types of images: I-bit, grayscale,
8-bit, 24-bit RGB, and so on. TIFF was originally a loss1ess format, but a new JPEG tag
allows you to opt for JPEG compression. Since TIFF is not as user-controllable as JPEG, it
does not provide any major advantages over the latter.
3.2.5 EXIF
Exchange Image File (EXIF) is an image format for digital cameras. Initially
developed in
1995, its CUlTent version (2.2) was published in 2002 by the Japan Electronics and InfOlmation
Technology Industries Association (JEITA). Compressed EXIF files use the baseline
JPEG format. A variety of tags (many more than in TIFF) is available to facilitate higherquality
printing, since information about the camera and picture-taking conditions (flash,
exposure, light source, white balance, type of scene) can be stored and used by printers
for possible color-colTection algorithms. The EXIF standard also includes specification of
file format for audio that accompanies digital images. It also supports tags for information
needed for conversion to FlashPix (initially developed by Kodak).

PS and PDF
PostScript is an important language for typesetting, and many high-end
printers have a PostScript interpreter built into them. PostScript is a vector-
based, rather than pixel-based, picture language: page elements are essentially
defined in terms of vectors. With fonts defined this way, PostScript includes
text as well as vector/structured graphics; bit-mapped
images can also be included in output files. Encapsulated PostScript files add
some information for including PostScript files in another document.
Several popular graphics programs, such as Illustrator and FreeHand, use
PostScript.
However, the PostScript page description language itself does not provide
compression; in fact, PostScript files are just stored as ASCII. Therefore files
are often large, and in academic settings, it is common for such files to be
made available only after compression by some
UNIX utility, such as compress or gzip.
Therefore, another text + figures language has begun to supersede PostScript:
Adobe Systems Inc. includes LZW (see Chapter 7) compression in its Portable
Document Format (PDF) file format. As a consequence, PDF files that do not
include images have about
the same compression ratio, 2:1 or 3:1, as do files compressed with other
LZW-based compression tools, such as UNIX compress or gzip on PC-based
winzip (a variety of pkzip). For files containing images, PDF may achieve
higher compression ratios by using separate JPEG compression for the image
content (depending on the tools used to create original and compressed
versions). The Adobe Acrobat PDF reader can also be configured
to read documents structured as linked elements, with clickable content and
handy summary tree-structured link diagrams provided.

An Active Server Page (ASP) is an HTML page that includes one


or more scripts (small embedded programs) that are processed on a Microsoft
Web server before the page is sent to the user. An ASP is somewhat similar
to a server-side include or a common gateway interface (CGI) application in
that all involve programs that run on the server, usually tailoring a page for the
user. Typically, the script in the Web page at the server uses input received as
the result of the user's request for the page to access data from
a database and then builds or customizes the page on the fly before sending it
to the requestor.
ASP is a feature of the Microsoft Internet Information Server (IIS), but, since
the server-side script is just building a regular HTML page, it can be delivered
to almost any browser. You can create an ASP file by including a script written
in VBScript or JScript in an HTML file or by using ActiveX Data Objects
(ADOs) program statements in the HTML file. You name the HTML file with
the ".asp" file suffix. Microsoft recommends the use of the server-side ASP
rather than a client-side script, where there is actually a choice, because the
server-side script will result in an easily displayable HTML page. Client-side
scripts (for example, with JavaScript) may not work as intended on older
browsers.

WHAT IS INTERNET SECURITY?


A list of the major challenges of Internet security and simple
explanations of how they affect a network are explained below.

Protection from hackers and vandals on the internet.

Hacker attacks can cause irreparable damage to sensitive and


confidential information. Critical data resides on a company’s private network
and businesses must actively prevent the theft, destruction and corruption of
this information. For some companies, the confidential information residing on
the business network belongs to corporate clients, raising issues of legal
liability as well as financial loss.
Protection from Dos (Denial of Service Attacks).
The valuable rely more and more on networked resources, maintaining
their availability is becoming more and more critical. A common type of attack
referred to as a Denial of Service attack, is designed to deny access to
networked resources by crashing servers or routers or by overwhelming the
network with enough traffic to degrade service. These Dos attacks hinder
normal network activity, making productivity nearly impossible.
Filter Inappropriate Materials.
The valuable information so readily available online also includes
material inappropriate for the workplace, classroom, and home. Companies
can face losses in productivity due to the vast array of non-work related
material available at the click of a mouse. Objectionable content can create an
uncomfortable work environment, creating a vulnerability to harassment
lawsuits. Schools, libraries and home offices risk children accessing
pornography or racially intolerant sites.

Protection Against Viruses.

Viruses attacks are the greatest threat to Internet security today. The
outbreak of viruses has increased in the past several years and statistics
indicate that the number will continue to rise.
Protection from Active Content, such as ActiveX and Java.

ActiveX is a programming language that is used to embed small programs in


Web pages. It is generally considered an insecure protocol to allow into a
network since it is possible for malicious programmers to write controls that
can delete file, compromise security, or cause other damage. Java is also
used to embed small programs known as applets, in Web pages. It is
generally considered safer than ActiveX, but some administrators may want to
filter out Java since there have been instances of bugs in these safety
mechanisms.
WHAT IS A FIREWALL?

A firewall protects a computer that are stand-alone’s or a part of the


local area network (LAN) against outside intrusion. Firewall’s work as filters
between the outside world and a private network. A firewall approves some
types of traffic and blocks unauthorized users who attempt to access your
network.
The term “firewall” is borrowed from architecture, but it doesn’t actually
refer to any one particular device. A firewall could be either a piece of
hardware or software, and a network may use more that one type of firewall in
order to provide extra security.
There are two common types of firewall:

A packet-filtering firewall applies predefined rules to fitter the chunks of


data, or packets, that pass through it. The filter accepts or rejects packets
based upon the originating computer’s network address or other
characteristics. The packet filter may be a computer, or it may be part of a
separate piece of hardware, such as a router.
A proxy severs, also known as a gateway, acts as a middleman that
relays data between the network and that outside world. The proxy prevents
outsiders from gathering information about computers inside the network. The
proxy can also screen packets based on their application type, such as Web
access or email, or other identifying traits.

WHAT IS ANTI VIRUS


Anti virus software protect your computer from a variety of malicious
software programs which are referred as virus. The anti virus companies is
always on a lookout for these viruses and provide an immediate cure for the
same.
These can include:
Viruses – – They are small programs that attach themselves to other
programs or documents and replicate with the potential to cause damage.
Worms – – They are viruses that are specifically engineered to make
extensive use of mail to spread themselves rapidly.

Trojans – – They are programs that appear harmless but have a damaging
intent.

Zombies – – They are programs that install themselves on computers and


remain dormant until some external event triggers them into action. The
actions could include corrupting, truncating, or stealing your information and
sending it to a predefined email account or opening up remote control access
portals to your machines.

WHAT IS SSL (SECURE SOCKET LAYER)?

Customers visiting web sites may want to maintain their privacy when
they register for a service online and in particular want to be assured that their
credit card details are kept well away from crooks and fraudsters. The most
common means of achieving this privacy is through the use of SSL or
Secure Socket Layer technology. When you connect to secure web space
the data passing between your browser and the web site in question is
encrypted which makes it virtually impossible for any third party to intercept
the data that is being transferred. So whether your address or your credit card
number that is being recorded it is strictly between you and the web site in
question.
There are two symbols that assure the public that a web site has these
security measures in place. Firstly a secure web server will be prefixed by
http’s:// rather than the normal http://. Secondly your browser will display the
“golden padlock” symbol that is your assurance that you are in a secure area.
To gain certification for the security of your domain is a costly, complicated
and time-consuming procedure.
This is where shared SSL is beneficial. It is seldom desirable to host
the whole of your site on secure SSL servers as the extra complexity results in
slower performance than you would get on “standard” hosting. So you can
host the bulk of your site on normal shared hosting and use SSL secure
hosting only for the sensitive function such as customer registration and online
payment.
WHAT IS PROXY SERVER?

A proxy server is an interface between the browser and the destination


server. The proxy server receives the page request and handles the
connection of the browser to the destination. These proxy servers are also
able to cache pages. If such a proxy is configured to cache then it will first
check the cache to see it the requested page exists. If the page is not found
then the proxy server searches other caching proxy servers on makes a direct
request to the destination. This process depends on the configuration for the
proxy. The advantage of using a common caching proxy server is given by the
probability to find a page in the local cache. The probability is in general
expressed by the hit rate. A cache with several GB size and a lot of users can
reach a hit rate of 30 to 40 percent. Frequently requested pages such as the
help pages of your browser may be in the cache every time. In case the page
is not in the local cache there is no difference in the elapsed time of a direct
request or a request handled by a proxy server.

INTELLECTUAL PROPERTY

Intellectual property consists of written works, photographs, artwork,


and music that people create from information and ideas. Many people enjoy
sharing their intellectual property with others. However, they may want to get
credit for their hard work.
COPYRIGHT ISSUES
Copyright is the right to publish. The copyright law is intended to protect
the rights of content developers. In other words, if you create information, you
should get credit. This credit can come in the form of money if you sell the
information in a book, CD, or subscription Internet service. In some cases,
people aren’t concerned about money, but they want to make certain that their
name or organization is associated with the information. In other words, many
educators are willing to share information for free, but they want to be sure
that their work is cited. In a global community such as the Internet, the laws
become an issue. For example, the copyright laws in different countries vary.
In the US, the copyright law contains a “fair use” section that gives people
some flexibility to use and share information. People interpret the laws
differently.

Java Development Kit (JDK)


Definition - What does Java Development Kit (JDK) mean?
The Java Development Kit (JDK) is a software development environment used for
developing Java applications and applets. It includes the Java Runtime Environment
(JRE), an interpreter/loader (java), a compiler (javac), an archiver (jar), a documentation
generator (javadoc) and other tools needed in Java development.

[WEBINAR] Design the Next-Generation of Applications

Techopedia explains Java Development Kit (JDK)


People new to Java may be confused about whether to use the JRE or the JDK. To run
Java applications and applets, simply download the JRE. However, to develop Java
applications and applets as well as run them, the JDK is needed.
Java developers are initially presented with two JDK tools, java and javac. Both are run
from the command prompt. Java source files are simple text files saved with an
extension of .java. After writing and saving Java source code, the javac compiler is
invoked to create .class files. Once the .class files are created, the 'java' command can
be used to run the java program.

You might also like