SlideShare a Scribd company logo
1 of 14
Welcome
to
Operating System (OS)
• Set of software that manages the hardware and
provides services to computer programs.
• Cycle Hardware<OS<Application<User.
• Real-time OS are for executing real-time applications
• It is predictable response to Events. Has two aspects:
a) Event Driven b) Time Sharing
• Distributed OS: Many appear as 1 computer
• Embedded OS: For embedded computer System.
Different Operating Systems
• Unix: All Console
• Linux: GUI of Linux
• Mac: As known
• Windows: As known
• Android: Mobile OS, Linux wrapped in Java
• AIX: Customized Unix by IBM
• HP-UX: Customized Unix by HP
• Solaris: Customized Unix by Sun Microsystems
Architecture (Kernel OS)
OSI Model For Networking
OSI vs Internet
Middleware
• Computer Software that provides services to
software applications beyond Operating System.
• It makes it easier for developer to perform
communication (I/O) so that they focus on
purpose of application.
• Communication & Mgmt of data ‘Dash in client-
server’
• Software layer that lies between OS &
Application.
Development Skills
• Languages: Assembly, C, C++, Java, .Net
• Difference between C & C++.
• OOPS
• Module Prog. & S/W architecture.
• Algorithm & its Optimization.
• Scripting: Perl, Shell, Tcl, Python.
Software Testing
• Black-Box Testing: Internal System design not considered but based on
Requirement and functionality. (Not so strong).
• White-Box Testing: Internal Logic, mainly codes (Strong).
• Unit Testing: Components & modules.
• Integration Testing: Bottom Up approach.
• Functional Testing: Output as per Req.
• System Testing: Entire system is tested as per requirement.
• End to End Testing: Similar to System, but involves real world testing
(database,network,hardware).
• Sanity Testing: Testing of Software versions.
• Regression Testing: Testing whole application if any change in module or
functionality.
• Acceptance Testing: System meeting customer requirements.
• Load Testing: Testing system under load.
• Stress Testing: System is stressed beyond its application.(data,query,connections).
• Performance Testing: How system performing under different loads.
• Usability Testing: Is customer understanding the system.
• Install/Uninstall testing: Recovery from
crash and hardware failure.
• Security Testing: Penetrating via hacking.
• Compatibility Testing: Working on all
platforms.
• Manual Testing: Strong/Values.
• Automation Testing: Test
cases,Scripting,Automation.
Security Concepts
• IPSec: Internet Security Protocol is a
protocol suite for securing IP by:
a) Authentication
b) Encrypting each IPv4 & v6 packet
• Works on Internet Layer or Upper Layer.
• SSL: Secure Socket Layer
• TLS: Transport Layer Security
• SSH: Secure Shell
IPSec Uses Following Protocols
• Authentication Header
• Encapsulating Security Payloads (ESP).
• Security Associations.
• Common Terms:
• Algorithm, Intergrity, Authentication, Keys,
Encapsulation,Encryption,Protocols.
Thanks
Any Questions?

More Related Content

What's hot

Unified Deployment: Including the Mainframe in Enterprise DevOps
Unified Deployment: Including the Mainframe in Enterprise DevOpsUnified Deployment: Including the Mainframe in Enterprise DevOps
Unified Deployment: Including the Mainframe in Enterprise DevOpsCompuware
 
Acquia presented at MassTLC event on automated testing
Acquia presented at MassTLC event on automated testingAcquia presented at MassTLC event on automated testing
Acquia presented at MassTLC event on automated testingMassTLC
 
Training Slides: 103 - Basics - Simple Tungsten Clustering Installation
Training Slides: 103 - Basics - Simple Tungsten Clustering InstallationTraining Slides: 103 - Basics - Simple Tungsten Clustering Installation
Training Slides: 103 - Basics - Simple Tungsten Clustering InstallationContinuent
 
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...EmbeddedFest
 
Migrate in One Step (05.15.2013)
Migrate in One Step (05.15.2013)Migrate in One Step (05.15.2013)
Migrate in One Step (05.15.2013)AppZero Inc
 
openSUSE Virtual Summit 2020 - openSUSE maintenance
openSUSE Virtual Summit 2020 - openSUSE maintenanceopenSUSE Virtual Summit 2020 - openSUSE maintenance
openSUSE Virtual Summit 2020 - openSUSE maintenanceMarina Latini
 
Engineering-Best-Practices
Engineering-Best-PracticesEngineering-Best-Practices
Engineering-Best-PracticesGaurav Kumkar
 
Continuous Integration - Mobile Practice
Continuous Integration - Mobile PracticeContinuous Integration - Mobile Practice
Continuous Integration - Mobile PracticeHARMAN Services
 
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...Designing a Highly Available Environment Using Methods of Modern IT Infrastru...
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...Perforce
 
Building large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor frameworkBuilding large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor frameworkVignesh Sukumar
 
Correlation Composer for HP OpenView Operations
Correlation Composer for HP OpenView OperationsCorrelation Composer for HP OpenView Operations
Correlation Composer for HP OpenView OperationsStefan Bergstein
 
A Byte of Software Deployment
A Byte of Software DeploymentA Byte of Software Deployment
A Byte of Software DeploymentGong Haibing
 
Will ServerLess kill containers and Operations
Will ServerLess kill containers and OperationsWill ServerLess kill containers and Operations
Will ServerLess kill containers and OperationsStephane Woillez
 
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deployments
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deploymentsJohan Arwidmark - Troubleshooting SCCM 2012 R2 OS deployments
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deploymentsNordic Infrastructure Conference
 
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast Compuware
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice ArchitectureEngin Yoeyen
 

What's hot (19)

Unified Deployment: Including the Mainframe in Enterprise DevOps
Unified Deployment: Including the Mainframe in Enterprise DevOpsUnified Deployment: Including the Mainframe in Enterprise DevOps
Unified Deployment: Including the Mainframe in Enterprise DevOps
 
Acquia presented at MassTLC event on automated testing
Acquia presented at MassTLC event on automated testingAcquia presented at MassTLC event on automated testing
Acquia presented at MassTLC event on automated testing
 
Training Slides: 103 - Basics - Simple Tungsten Clustering Installation
Training Slides: 103 - Basics - Simple Tungsten Clustering InstallationTraining Slides: 103 - Basics - Simple Tungsten Clustering Installation
Training Slides: 103 - Basics - Simple Tungsten Clustering Installation
 
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...
Embedded Fest 2019. Володимир Шанойло. High FIVE: Samsung integrity protectio...
 
Migrate in One Step (05.15.2013)
Migrate in One Step (05.15.2013)Migrate in One Step (05.15.2013)
Migrate in One Step (05.15.2013)
 
openSUSE Virtual Summit 2020 - openSUSE maintenance
openSUSE Virtual Summit 2020 - openSUSE maintenanceopenSUSE Virtual Summit 2020 - openSUSE maintenance
openSUSE Virtual Summit 2020 - openSUSE maintenance
 
Engineering-Best-Practices
Engineering-Best-PracticesEngineering-Best-Practices
Engineering-Best-Practices
 
virtualization
virtualizationvirtualization
virtualization
 
Continuous Integration - Mobile Practice
Continuous Integration - Mobile PracticeContinuous Integration - Mobile Practice
Continuous Integration - Mobile Practice
 
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...Designing a Highly Available Environment Using Methods of Modern IT Infrastru...
Designing a Highly Available Environment Using Methods of Modern IT Infrastru...
 
Building large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor frameworkBuilding large scale, job processing systems with Scala Akka Actor framework
Building large scale, job processing systems with Scala Akka Actor framework
 
Selenium Automation
Selenium AutomationSelenium Automation
Selenium Automation
 
Correlation Composer for HP OpenView Operations
Correlation Composer for HP OpenView OperationsCorrelation Composer for HP OpenView Operations
Correlation Composer for HP OpenView Operations
 
Erlang/Elixir and OTP
Erlang/Elixir and OTPErlang/Elixir and OTP
Erlang/Elixir and OTP
 
A Byte of Software Deployment
A Byte of Software DeploymentA Byte of Software Deployment
A Byte of Software Deployment
 
Will ServerLess kill containers and Operations
Will ServerLess kill containers and OperationsWill ServerLess kill containers and Operations
Will ServerLess kill containers and Operations
 
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deployments
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deploymentsJohan Arwidmark - Troubleshooting SCCM 2012 R2 OS deployments
Johan Arwidmark - Troubleshooting SCCM 2012 R2 OS deployments
 
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast
Go Fast, Go Safe, Go on Vacation - Compuware ISPW Webcast
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice Architecture
 

Viewers also liked

الوحدة السابعة (1)
الوحدة السابعة (1)الوحدة السابعة (1)
الوحدة السابعة (1)Saif Eddin
 
מאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםמאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםZachi Berger, Ph.D. MBA
 
الوحدة التاسعة
الوحدة التاسعةالوحدة التاسعة
الوحدة التاسعةSaif Eddin
 
PERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGEPERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGEsoft-point
 
Vishwanath_M_CV_NL
Vishwanath_M_CV_NLVishwanath_M_CV_NL
Vishwanath_M_CV_NLVishwanath M
 
Resume Bhavesh Amin
Resume Bhavesh AminResume Bhavesh Amin
Resume Bhavesh AminBhavesh Amin
 
المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر dr yetkin bayer
 
Tools to ensure quality of information system
Tools to ensure quality of information system Tools to ensure quality of information system
Tools to ensure quality of information system soft-point
 
الوحدة الحادية عشرة
الوحدة الحادية عشرةالوحدة الحادية عشرة
الوحدة الحادية عشرةSaif Eddin
 
Qualitative operation of IT systems
Qualitative operation of IT systemsQualitative operation of IT systems
Qualitative operation of IT systemssoft-point
 
DB REPLICATION
DB REPLICATIONDB REPLICATION
DB REPLICATIONsoft-point
 
как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...soft-point
 

Viewers also liked (20)

Canvas Miami
Canvas MiamiCanvas Miami
Canvas Miami
 
الوحدة السابعة (1)
الوحدة السابعة (1)الوحدة السابعة (1)
الوحدة السابعة (1)
 
מאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגייםמאמר על היעילות של השיטה בחולים אונקולוגיים
מאמר על היעילות של השיטה בחולים אונקולוגיים
 
الوحدة التاسعة
الوحدة التاسعةالوحدة التاسعة
الوحدة التاسعة
 
Referencing
ReferencingReferencing
Referencing
 
PERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGEPERSONAL INFORMATION STORAGE
PERSONAL INFORMATION STORAGE
 
Vishwanath_M_CV_NL
Vishwanath_M_CV_NLVishwanath_M_CV_NL
Vishwanath_M_CV_NL
 
Resume Bhavesh Amin
Resume Bhavesh AminResume Bhavesh Amin
Resume Bhavesh Amin
 
المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر المنطقة المانحة في زراعة الشعر
المنطقة المانحة في زراعة الشعر
 
Imran CV
Imran CVImran CV
Imran CV
 
Tools to ensure quality of information system
Tools to ensure quality of information system Tools to ensure quality of information system
Tools to ensure quality of information system
 
NRI Services
NRI Services NRI Services
NRI Services
 
Keidan Presentation 2016 + video
Keidan Presentation 2016 + videoKeidan Presentation 2016 + video
Keidan Presentation 2016 + video
 
Maor Patent PCT
Maor Patent PCTMaor Patent PCT
Maor Patent PCT
 
الوحدة الحادية عشرة
الوحدة الحادية عشرةالوحدة الحادية عشرة
الوحدة الحادية عشرة
 
Qualitative operation of IT systems
Qualitative operation of IT systemsQualitative operation of IT systems
Qualitative operation of IT systems
 
DB REPLICATION
DB REPLICATIONDB REPLICATION
DB REPLICATION
 
как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...как обеспечить качественное функционирование ит систем для маркетинга и прода...
как обеспечить качественное функционирование ит систем для маркетинга и прода...
 
PEEFEXPERT
PEEFEXPERTPEEFEXPERT
PEEFEXPERT
 
DATA EXCHANGE
DATA EXCHANGEDATA EXCHANGE
DATA EXCHANGE
 

Similar to Computer Fundamentals

IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best PracticesPrecisely
 
Lecture 4.pptx
Lecture 4.pptxLecture 4.pptx
Lecture 4.pptxsara591850
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1Lahav Savir
 
Towards Continuous Delivery in Mobile Apps
Towards Continuous Delivery in Mobile AppsTowards Continuous Delivery in Mobile Apps
Towards Continuous Delivery in Mobile AppsPhillip Wheatley
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeDenis Gundarev
 
1 artem mygaiev - testing open-source software in embedded devices
1   artem mygaiev - testing open-source software in embedded devices1   artem mygaiev - testing open-source software in embedded devices
1 artem mygaiev - testing open-source software in embedded devicesIevgenii Katsan
 
Open Audit
Open AuditOpen Audit
Open Auditncspa
 
Lecture 1-vs.pptx.......................
Lecture 1-vs.pptx.......................Lecture 1-vs.pptx.......................
Lecture 1-vs.pptx.......................HassamShahid2
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE PrashantChahal3
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5FRSecure
 
Computer system organization
Computer system organizationComputer system organization
Computer system organizationSyed Zaid Irshad
 
Chap1
Chap1Chap1
Chap1adisi
 
Operating system components
Operating system componentsOperating system components
Operating system componentsSyed Zaid Irshad
 
20140708 - Jeremy Edberg: How Netflix Delivers Software
20140708 - Jeremy Edberg: How Netflix Delivers Software20140708 - Jeremy Edberg: How Netflix Delivers Software
20140708 - Jeremy Edberg: How Netflix Delivers SoftwareDevOps Chicago
 
Digital literacy 1 b operating systems
Digital literacy 1 b operating systemsDigital literacy 1 b operating systems
Digital literacy 1 b operating systemsmrspetty19
 

Similar to Computer Fundamentals (20)

Introducing AWS Device Farm
Introducing AWS Device FarmIntroducing AWS Device Farm
Introducing AWS Device Farm
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best Practices
 
Lecture 4.pptx
Lecture 4.pptxLecture 4.pptx
Lecture 4.pptx
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1
 
Towards Continuous Delivery in Mobile Apps
Towards Continuous Delivery in Mobile AppsTowards Continuous Delivery in Mobile Apps
Towards Continuous Delivery in Mobile Apps
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
 
1 artem mygaiev - testing open-source software in embedded devices
1   artem mygaiev - testing open-source software in embedded devices1   artem mygaiev - testing open-source software in embedded devices
1 artem mygaiev - testing open-source software in embedded devices
 
Open Audit
Open AuditOpen Audit
Open Audit
 
Lecture 1-vs.pptx.......................
Lecture 1-vs.pptx.......................Lecture 1-vs.pptx.......................
Lecture 1-vs.pptx.......................
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
os_1.pdf
os_1.pdfos_1.pdf
os_1.pdf
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
Computer system organization
Computer system organizationComputer system organization
Computer system organization
 
Simics - Break the Rules of Product Development
Simics - Break the Rules of Product DevelopmentSimics - Break the Rules of Product Development
Simics - Break the Rules of Product Development
 
Chap1
Chap1Chap1
Chap1
 
Operating system components
Operating system componentsOperating system components
Operating system components
 
20140708 - Jeremy Edberg: How Netflix Delivers Software
20140708 - Jeremy Edberg: How Netflix Delivers Software20140708 - Jeremy Edberg: How Netflix Delivers Software
20140708 - Jeremy Edberg: How Netflix Delivers Software
 
Ch 2
Ch 2Ch 2
Ch 2
 
Digital literacy 1 b operating systems
Digital literacy 1 b operating systemsDigital literacy 1 b operating systems
Digital literacy 1 b operating systems
 

More from ashishsharma1506

More from ashishsharma1506 (6)

Referencing
ReferencingReferencing
Referencing
 
Technology Fundamentals
Technology FundamentalsTechnology Fundamentals
Technology Fundamentals
 
Networking & Security Fundamentals
Networking & Security FundamentalsNetworking & Security Fundamentals
Networking & Security Fundamentals
 
Technology Fundamentals
Technology FundamentalsTechnology Fundamentals
Technology Fundamentals
 
Networking & security
Networking & securityNetworking & security
Networking & security
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 

Recently uploaded

How Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People AnalyticsHow Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People AnalyticsDavid Green
 
Ways to Make the Most of Temporary Part Time Jobs
Ways to Make the Most of Temporary Part Time JobsWays to Make the Most of Temporary Part Time Jobs
Ways to Make the Most of Temporary Part Time JobsSnapJob
 
Mercer Global Talent Trends 2024 - Human Resources
Mercer Global Talent Trends 2024 - Human ResourcesMercer Global Talent Trends 2024 - Human Resources
Mercer Global Talent Trends 2024 - Human Resourcesmnavarrete3
 
Webinar - How to set pay ranges in the context of pay transparency legislation
Webinar - How to set pay ranges in the context of pay transparency legislationWebinar - How to set pay ranges in the context of pay transparency legislation
Webinar - How to set pay ranges in the context of pay transparency legislationPayScale, Inc.
 
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In ArjanArjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjanparisharma5056
 
Situational Questions for Team Leader Interviews in BPO with Sample Answers
Situational Questions for Team Leader Interviews in BPO with Sample AnswersSituational Questions for Team Leader Interviews in BPO with Sample Answers
Situational Questions for Team Leader Interviews in BPO with Sample AnswersHireQuotient
 
Employee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational SuccessEmployee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational SuccessHireQuotient
 
Cleared Job Fair Handbook | May 2, 2024
Cleared Job Fair Handbook  |  May 2, 2024Cleared Job Fair Handbook  |  May 2, 2024
Cleared Job Fair Handbook | May 2, 2024ClearedJobs.Net
 
Mastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership ManagementMastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership ManagementBoundless HQ
 
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...PayScale, Inc.
 
HRM PPT on placement , induction and socialization
HRM PPT on placement , induction and socializationHRM PPT on placement , induction and socialization
HRM PPT on placement , induction and socializationRishik53
 
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Dan Medlin
 

Recently uploaded (14)

How Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People AnalyticsHow Leading Companies Deliver Value with People Analytics
How Leading Companies Deliver Value with People Analytics
 
Ways to Make the Most of Temporary Part Time Jobs
Ways to Make the Most of Temporary Part Time JobsWays to Make the Most of Temporary Part Time Jobs
Ways to Make the Most of Temporary Part Time Jobs
 
Mercer Global Talent Trends 2024 - Human Resources
Mercer Global Talent Trends 2024 - Human ResourcesMercer Global Talent Trends 2024 - Human Resources
Mercer Global Talent Trends 2024 - Human Resources
 
Webinar - How to set pay ranges in the context of pay transparency legislation
Webinar - How to set pay ranges in the context of pay transparency legislationWebinar - How to set pay ranges in the context of pay transparency legislation
Webinar - How to set pay ranges in the context of pay transparency legislation
 
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In ArjanArjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
Arjan Call Girl Service #$# O56521286O $#$ Call Girls In Arjan
 
Situational Questions for Team Leader Interviews in BPO with Sample Answers
Situational Questions for Team Leader Interviews in BPO with Sample AnswersSituational Questions for Team Leader Interviews in BPO with Sample Answers
Situational Questions for Team Leader Interviews in BPO with Sample Answers
 
Employee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational SuccessEmployee Roles & Responsibilities: Driving Organizational Success
Employee Roles & Responsibilities: Driving Organizational Success
 
Cleared Job Fair Handbook | May 2, 2024
Cleared Job Fair Handbook  |  May 2, 2024Cleared Job Fair Handbook  |  May 2, 2024
Cleared Job Fair Handbook | May 2, 2024
 
Mastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership ManagementMastering Vendor Selection and Partnership Management
Mastering Vendor Selection and Partnership Management
 
escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Rajender Nagar Metro❤️9953056974
 
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
Webinar - Payscale Innovation Unleashed: New features and data evolving the c...
 
HRM PPT on placement , induction and socialization
HRM PPT on placement , induction and socializationHRM PPT on placement , induction and socialization
HRM PPT on placement , induction and socialization
 
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Komal 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Komal 💚😋 9256729539 🚀 Indore Escorts
 
Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024Austin Recruiter Network Meeting April 25, 2024
Austin Recruiter Network Meeting April 25, 2024
 

Computer Fundamentals

  • 2. Operating System (OS) • Set of software that manages the hardware and provides services to computer programs. • Cycle Hardware<OS<Application<User. • Real-time OS are for executing real-time applications • It is predictable response to Events. Has two aspects: a) Event Driven b) Time Sharing • Distributed OS: Many appear as 1 computer • Embedded OS: For embedded computer System.
  • 3. Different Operating Systems • Unix: All Console • Linux: GUI of Linux • Mac: As known • Windows: As known • Android: Mobile OS, Linux wrapped in Java • AIX: Customized Unix by IBM • HP-UX: Customized Unix by HP • Solaris: Customized Unix by Sun Microsystems
  • 5.
  • 6. OSI Model For Networking
  • 8. Middleware • Computer Software that provides services to software applications beyond Operating System. • It makes it easier for developer to perform communication (I/O) so that they focus on purpose of application. • Communication & Mgmt of data ‘Dash in client- server’ • Software layer that lies between OS & Application.
  • 9. Development Skills • Languages: Assembly, C, C++, Java, .Net • Difference between C & C++. • OOPS • Module Prog. & S/W architecture. • Algorithm & its Optimization. • Scripting: Perl, Shell, Tcl, Python.
  • 10. Software Testing • Black-Box Testing: Internal System design not considered but based on Requirement and functionality. (Not so strong). • White-Box Testing: Internal Logic, mainly codes (Strong). • Unit Testing: Components & modules. • Integration Testing: Bottom Up approach. • Functional Testing: Output as per Req. • System Testing: Entire system is tested as per requirement. • End to End Testing: Similar to System, but involves real world testing (database,network,hardware). • Sanity Testing: Testing of Software versions. • Regression Testing: Testing whole application if any change in module or functionality. • Acceptance Testing: System meeting customer requirements. • Load Testing: Testing system under load. • Stress Testing: System is stressed beyond its application.(data,query,connections). • Performance Testing: How system performing under different loads. • Usability Testing: Is customer understanding the system.
  • 11. • Install/Uninstall testing: Recovery from crash and hardware failure. • Security Testing: Penetrating via hacking. • Compatibility Testing: Working on all platforms. • Manual Testing: Strong/Values. • Automation Testing: Test cases,Scripting,Automation.
  • 12. Security Concepts • IPSec: Internet Security Protocol is a protocol suite for securing IP by: a) Authentication b) Encrypting each IPv4 & v6 packet • Works on Internet Layer or Upper Layer. • SSL: Secure Socket Layer • TLS: Transport Layer Security • SSH: Secure Shell
  • 13. IPSec Uses Following Protocols • Authentication Header • Encapsulating Security Payloads (ESP). • Security Associations. • Common Terms: • Algorithm, Intergrity, Authentication, Keys, Encapsulation,Encryption,Protocols.