Monday, 31 December 2018

DATA P[ROCESSING ACTIVITY


DATA P[ROCESSING ACTIVITY
NOTE:send answers as comment on the blog.Thanks.



(a) List: (i) Three application areas of a word  processing program
(ii)  Three  types of data item.

(b) Identify the four data types available in Table 2 below


Table 2
Student I.D.       Name          Date of Birth      Score in Computer studies           Gender
A 00022            Odi, G.A.        13/10/97                   38                                            M
C 00021          Zakari, M.         15/05/98                  71                                            M
B 00023      Ngozi Tella          16/09/96                     62                                           F

Monday, 24 December 2018

AP[P[LICATION P[ACKAGE....


Ndibaba corporation...ICT facilitator and sup[p[ort.



Open Excel to a blank worksheet.


Create a spreadsheet like the one below. Enter all the numbers.
o   Change the formatting of the numbers to dollars.
o   Make the grid around the cells visible.
o   Insert the title “Monthly Budget” and center and merge it.
§  Change the font to Baker Signet, size 18.
§  Make the text white and the fill black.
o   Insert the subtitle “January 2005 – June 2005.”
§  Change the font to Baker Signet, size 10
§  Make text white and fill black.
§  Center and merge it.
o   Total the expenses at the bottom of each month.
§  Widen columns if necessary so numbers can be seen.
o   Put a dark border around the edges of the document.
o   Change the amount for gasoline in June from $60 to $70.
o   Figure out the average for each row. You must know the formula on your own!
o   Center and bold the headings (months and average)
§  Change the font to BakerSignet on the headings
§  Bold the headings in column A.
§  Change the font to BakerSignet.
o   Add a header with your name.
  




NOTE:change the font to available one if you can not find the required font as instructed.

seasons GrEEtInGs..


Thursday, 20 December 2018

APPLICATION PACKAGE PRACTICAL



Q1)

 In a new worksheet, create a table and insert the following information. Use different fonts for different columns.

1. Names of people (at least 20)

2. Their ages

3. Number of years they have worked

4. Salary per month

5. Show housing, medical, travel and hardship allowances, and columns


B. Using the table to do the following:

1. (a) Calculate the total salary for each person and grand total for all persons.
(b) Calculate Average, Minimum, Maximum.

2. Show a graph of the their salaries

3. Copy and paste your graph from sheet 1 to sheet 2, name your graph sheet ‘CHARTS’

4. Add columns where necessary to include: leave payment, over time payment and sick off amount, and then calculate the net salary

Sunday, 16 December 2018

APPLICATION PACKAGE PRACTICAL REVIEW

ACTIVITY

A spreadsheet is require to predict cash flow for a company over the four quarters of a year. Open a blank spreadsheet, enter in the data below and save it as IBIM ACTIVITY 


MonthJan-MarApr-JunJul-SepOct-Dec
Opening Bank Balance:€20000
Expenditures    
Wages:€2340€2340€2340€2340
Electricity:€760€860€960€1060
Overheads:€1080€1280€1480€1680
Materials:€6000€6500€7000€7500
Total (expenditures)
    
Sales Income:€13290€13290€13290€13290
     
Profit this quarter
Closing bank balance:
  1. Enter in formulae to calculate 'Total (expenditures) for each quarter. (The sum of all the individual expenditures)
  2. Enter in formulae to calculate the 'Profit' for each quarter. (Sales income less Total expenditures)
  3. Enter in formula to calculate the closing balance for each quarter (The Opening balance plus the profits)
  4. Enter in formulae for the 'Opening balance' for each quarter after the first one (=the closing balance of the previous quarter)

Saturday, 15 December 2018

QUESTIONS PREVIEW

Q1) Calculation the following table using appropriate application package
SN
Month
Income
Expenses
Saving
1
January
12000
8000

2
February
18000
12000

3
March
15000
23000

4
April
14000
11000

Total



 Calculate Saving as Income - Expense using Table Formula.
 Calculate Total Income, Expense and Saving.

Q2  Sort  out the following  into :manual input devices,direct input devices,and sensors
                Keyboard,scanner,MICR,OCR,light sensor,remote control,barcode reader,camera,temperature sensor,magnetic stripe reader

Wednesday, 5 December 2018

MS WORD ACTIVITIES[[[]

MS WORD ACTIVITIES

Q.No.1 
Types of Computers
There are different types of computer systems nowadays for different purpose according to the user needs. However we can classify them into different groups based on different aspects:
Based on Size
We can find four different type of computers based on size.
Super Computers
These are large computers that are most powerful. They can complete tasks very soon and are optimized to complete given tasks quickly.
Mainframe Computers
These are the largest computers and can support hundreds of users simultaneously. These are powerful computers and optimized to run maximum number of applications at one time.
Mini Computers
These are medium sized computers –smaller than mainframe but much larger than personal computers. They can be the best solution for medium scale organizations.
Micro Computers

Micro computers are the smallest when size is concerned. They range from Desktop, Laptop up to the palm top and even smaller ones. Because micro computers are developed to support single person, they are often called personal computers (PCs).

a.) Copy the text above. Make the text italic, text font size 15, line spacing 2, insert page number at left bottom of page, insert drop cap.
b) Insert "Computer Operator Exam 2070" as footer, header, and watermark.
c) Insert following equation.
d) Perform following task.
i) H2O, CO2, MNO2
ii) Zn + H2SO4 Ã’ ZNSO4 + H2#
iii) NaOH + HNO3 Ã’ NaNO3 + H2O


Q.No.2
i.                    Create following Table
Day /
Period I
Period II
Period IV
Period V
Sunday
Math
Science
English
Computer
Monday
Science
Computer
Math
English
Tuesday
English
Math
Computer
Science
Wednesday
Computer
Science
Math
English
Friday
Math
Science
English
Computer
       1.      Create margin at the top & bottom 1.1 inch and right & left 1.5 inch
       2.      Create landscape orientation & A4 paper size 
       3.      Insert Period III column after Period II
       4.      Insert Thursday row bellow Wednesday row
       5.      Insert page number center align and arial font
       6.      Insert watermark "Hello  world"
       7.      Table font times new roman and 13 size

Thursday, 15 November 2018

TYPES OF ATTRIBUTES IN DBMS

TYPES OF ATTRIBUTES AND KEYS  IN DBMS



Types of Attributes

  • Simple attribute − Simple attributes are atomic values, which cannot be divided further. For example, a student's phone number is an atomic value of 10 digits.

  • Composite attribute − Composite attributes are made of more than one simple attribute. For example, a student's complete name may have first_name and last_name.

  • Derived attribute − Derived attributes are the attributes that do not exist in the physical database, but their values are derived from other attributes present in the database. For example, average_salary in a department should not be saved directly in the database, instead it can be derived. For another example, age can be derived from data_of_birth.

  • Single-value attribute − Single-value attributes contain single value. For example − Social_Security_Number.

  • Multi-value attribute − Multi-value attributes may contain more than one values. For example, a person can have more than one phone number, email_address, etc.

  • TYPES OF KEYS
  • The different types of keys in DBMS are:
    1. Candidate Key - The candidate keys in a table are defined as the set of keys that is minimal and can uniquely identify any data row in the table.A minimal super key is called a candidate key. An entity set may have more than one candidate key
    2. Primary Key - The primary key is selected from one of the candidate keys and becomes the identifying key of a table. It can uniquely identify any data row of the table.A primary key is one of the candidate keys chosen by the database designer to uniquely identify the entity
    3. Super Key - Super Key is the superset of primary key.A set of attributes (one or more) that collectively identifies an entity in an entity set. The super key contains a set of attributes, including the primary key, which can uniquely identify any data row in the table.
    4. Composite Key - If any single attribute of a table is not capable of being the key i.e it cannot identify a row uniquely, then we combine two or more attributes to form a key. This is known as a composite key.
    5. Secondary Key - Only one of the candidate keys is selected as the primary key. The rest of them are known as secondary keys.
    6. Foreign Key - A foreign key is an attribute value in a table that acts as the primary key in another another. Hence, the foreign key is useful in linking together two tables. Data should be entered in the foreign key column with great care, as wrongly entered data can invalidate the relationship between the two tables 
courtesy;tutorialpt

Saturday, 10 November 2018

Question on DBMS



 Information in a bank is about customers and their accounts. Customer has a name, address, which
 consists of house number, area, city and one phone number. Account has numbers, type, and balance. 

We need to record customers who own an account. Account can be held individually or jointly. Account cannot exist without a customer. Arrive at an E-R diagram, clearly indicate: entities, attributes, relationships.

Friday, 9 November 2018

MERITS AND DEMERTS OF INDEXNG

MERITS
1)Speed up SELECT query
2)Helps to make a row unique or without duplicates(primary,unique) 
3)If index is set to fill-text index, then we can search against large string values. for example to find a word from a sentence etc.
4)They result  in better queries performance.
5)They make it possible to quickly retrieve (fetch) data.
6)They can be used for sorting..
7)Unique indexes guarantee uniquely identifiable records in the database.
DEMERTS
1)Indexes take additional disk space.
2)indexes slow down INSERT,UPDATE and DELETE, but will speed up UPDATE if the WHERE condition has an indexed field.  INSERT, UPDATE and DELETE becomes slower because on each operation the indexes must also be updated.
3)Some databases will monocase(It means that filenames are case-insensitive) values in fields that are indexed



courtesy..bayt.com

Tuesday, 9 October 2018

INDEXES IN DATABASE

In database systems, an index (IDX) is a data structure defined on columns in a database table to significantly speed up data retrieval operations. An index is a small copy of a database table sorted by key values. Without an index, query languages like SQL may have to scan the entire table from top to bottom to choose relevant rows.

TYPES OF INDEX


  • 1 Clustered Indexes: Clustered indexes store row data in order. Only a single clustered index can be created on a database table. This works efficiently only if data is sorted in increasing and decreasing order or a limit is specified on the columns involved in the table. Such a sequential arrangement of data on disks reduces block reads.
  • 2 Non-Clustered Indexes: In non-clustered indexes, data is arranged in a random way, but a logical ordering is internally specified by the index. Thus, the index order is not the same as the physical ordering of data. A "create index" statement creates a non-clustered index by default, which also creates a clustered index on the primary key. The index keys are sorted here with the leaf containing a pointer to the page. Non-clustered indexes work well with tables where data is modified frequently and the index is created on columns used in order by WHERE and JOIN statements

      3  Dense Index

In dense index, there is an index record for every search key value in the database. This makes searching faster but requires more space to store index records itself. Index records contain search key value and a pointer to the actual record on the disk.
Dense Index

 4         Sparse Index

In sparse index, index records are not created for every search key. An index record here contains a search key and an actual pointer to the data on the disk. To search a record, we first proceed by index record and reach at the actual location of the data. If the data we are looking for is not where we directly reach by following the index, then the system starts sequential search until the desired data is found.
Sparse Index


Indexes and Constraints

Indexes are automatically created when PRIMARY KEY and UNIQUE constraints are defined on table columns. For example, when you create a table and identify a particular column to be the primary key, the Database Engine automatically creates a PRIMARY KEY constraint and index on that column.

How Indexes are used by the Query Optimizer

Well-designed indexes can reduce disk I/O operations and consume fewer system resources therefore improving query performance. Indexes can be helpful for a variety of queries that contain SELECT, UPDATE, DELETE, or MERGE statements. Consider the query SELECT Title, HireDate FROM HumanResources.Employee WHERE EmployeeID = 250 in theAdventureWorks2012 database. When this query is executed, the query optimizer evaluates each available method for retrieving the data and selects the most efficient method. The method may be a table scan, or may be scanning one or more indexes if they exist.
When performing a table scan, the query optimizer reads all the rows in the table, and extracts the rows that meet the criteria of the query. A table scan generates many disk I/O operations and can be resource intensive. However, a table scan could be the most efficient method if, for example, the result set of the query is a high percentage of rows from the table.
When the query optimizer uses an index, it searches the index key columns, finds the storage location of the rows needed by the query and extracts the matching rows from that location. Generally, searching the index is much faster than searching the table because unlike a table, an index frequently contains very few columns per row and the rows are in sorted order.
The query optimizer typically selects the most efficient method when executing queries. However, if no indexes are available, the query optimizer must use a table scan. Your task is to design and create indexes that are best suited to your environment so that the query optimizer has a selection of efficient indexes from which to select. SQL Server provides the Database Engine Tuning Advisor to help with the analysis of your database environment and in the selection of appropriate indexes.


courtsey..tutorialspoint,https://docs.microsoft.com

Friday, 28 September 2018

computer virus

computer virus

A computer virus is a piece of software that attaches itself to another program to corrupt the program and files on the computer system.
Types of Computer Virus
Computer Viruses are classified according to their nature of infection and behavior. Different types of computer virus classification are given below.
1. Resident virus: They usually fix themselves inside the computer memory. They get activated every time the OS runs and end up infecting other opened files.They hide in RAM.Examples CMJ,Randex,Mrklunky etc.
 2. Overwrite Virus: These types of viruses delete any information in a file they infect, leaving them partially or completely useless once they are infected. Once in the computer, they replace all the file content but the file size doesn’t change.examples trivial.88.D,trj.Reboot etc
3. \Boot sector: A Boot Sector Virus infects the first sector of the hard drive, where the Master Boot Record (MBR) is stored. . If a computer is infected with Boot Sector Virus, when the computer is turned on, the virus launches immediately and is loaded into memory, enabling it to control the computer. examples poly boot,AntiEXE,stone virus,disk killer,form etc
4. Macro virus: Macro viruses infect files that are created using certaing applications e.g ms office suite, these macros are usually stored as part of the document or spreadsheet and can travel to other systems when these files are transferred to another computer.examples Relax,Bablas etc
5. Directory Virus: Also known as cluster virus or file system virus. They infect the computer’s directory by changing the path indicating file location. They are usually located in the disk but affect the entire directory. Example is any file with the extension .EXE or .COM 3
6. \Polymorphic virus: Polymorphic Viruses have the capability to change their appearance and change their code every time they infect a different system.This helps the Polymorphic Viruses to hide from anti-virus software.examples are Elkern,Marburg,etc.
Effects of virus
It causes computer to crash (i.e. to stop functioning normally or to stop responding to other software) Loss of files and corruption of data stored in file.
Virus warning signs 
When a computer is infected with virus, the following symptoms may occur
 Slow system performance
 Presence of tiny dots
 Incomplete saving of files
 Appearance of strange characters
  Corruption of the system set up instructions
 Wandering across the screen
 New windows keep opening up at an alarming rate
 when files and folders getting deleted
  when disks and drives are not working properly
 Sources of Virus
  Infected storage devices such as flash drive ,CD-ROM etc
 By downloading or opening attachments in email from unknown source
 Through internet download
 Installation of infected programs
  opening an infected document
  by downloading cracked and illegal versions of software

MALWARE PROGRAMS
Malware is an abbreviated term meaning malicious software.it is a program that is specifically designed to gain access to or damage the computer files without the knowledge of the owner. It is developed for the purpose of doing harm to files, software and hardware.Computer Virus is one of the examples of malware.
 Other malware programs include;
Computer Worm: This is a program that uses computer network to spread itself.
 Trojan Horses: This is illegal instructions placed in the middle of a legitimate program.It is hidden program that runs on your computer without your knowledge.
Logic Bombs: This type of malware do not replicate, they are designed to destroy data on the computer system once certain conditions have been met.
Spyware: It is written to spy through a legal software.it changes computer’s configuration and personal information.

VIRUS DETECTION SOFTWARE (ANTI-VIRUS) This is a program written by the programmer to get rid of computer viruses. Some anti-virus are programmed to kill the virus and the effect done to the computer while others prevent the virus from entering the computer system. Anti-virus software is computer software used to prevent, detect and remove malicious software. Examples are; karpersky,E-scan,Avast,McAfee, etc

Thursday, 27 September 2018

The Art of Information Processing

INFORMATION PROCESSING  
 THE ART OF INFORMATION PROCESSING INTRODUCTION
Information is data that has been processed in such a way that it is meaningful to the person who receives it. Information is also referring to facts and opinions provided and received during the course of daily life. Information processing is the change of information in any manner detectable by any observer. As such it is a process that describes everything that happens (changes) in the universe from the falling of a rock to the printing of a text file from a digital computer system.
 DEFINITION
Information processing is the process of acquiring, obtaining, recording, organizing, Storing and dissemination of information. OR Information processing refers to the manipulation of digitalized information by computers and other digital electronic equipment.
 PROCEDURES FOR INFORMATION PROCESSING 
The procedures for information processing can be categorized into; 1.Collation of information 2.Organisation of information 3.Analysis of information 4.Interpretation of information
1. COLLATION OF INFORMATION: Collation is the assembly of written information into a standard order. Many systems of collation are based on numerical order or alphabetical order. Collation is a fundamental element of most office filling systems, library catalogs and reference books Benefits of collation i. It makes it faster and easy for a user to find an element in the list or to confirm that it is absent from the list. ii. Search operation can be done automatically using the binary search or manual searching. iii.The first and last element can be easily found in a given range.

2.ORGANIZATION OF INFORMATION: Organizing skills helps in arranging information in such a way that it can be used more effectively. This essentially involves the following: 1.Comparing and contrasting 2.Classifying perceptions 3.Ordering perceptions/events 4. Representing ideas/perceptions The nine basic ways of organizing information are: 1.Alphabet 6. Hierarchy 2.Category 7. Chronological 3.Continuum 8. Geographical 4.Location 9.Value Size 5.Time

3.ANALYSIS OF INFORMATION: Since information is the raw material of decision making, it is crucial to learn how to analyze it. Analysis part may be adding up numbers and averaging them or comparing information to examine the relationship of one thing to another or two things together. Two ways to analyze information are; a.) Tally sheets b.) Summary sheets

 4. INTERPRETATION OF INFORMATION: During the interpretation stage, searcher’s assess the usefulness of their information and reflect to develop personal meaning. Information requires interpretation to become knowledge. Interpretation of information involves the following 1) Inferring 2)Drawing conclusions 3)Filtering information (point of view bias etc.) 4) Comparing and contrasting 5) Determining credibility 6) Classifying 7) Evaluating information 8) Evaluating information to support or result a problem or research question...
.................................................................................freke's copy

Types of Binary code schemes



BINARY CODING SCHEMES Binary coding scheme is a method used for representing all of the digits’ letters, special characters and symbols using the binary digits Os and 1s.

 Three types of binary coding schemes are;
1)ASCII: Stands for American Standard Code for Information Interchange. This is the most widely used binary code for microcomputers

.2) EBCDIC: Stands for Extended Binary Coded Decimal Interchange Code.it was developed by IBM and is used for primarily for large computers.\

3) Unicode: it is 16-bits code design to support international languages such as Chinese and Japanese. it was developed by Unicode Inc. with support from Apple, IBM and Microsoft.

syllabus for data processing exam.

click on the link for tabular explanation....
http://www.pmbgs-abeokuta.org.ng/download/ebooks/DATA%20PROCESSING.pdf




.
OBJECTIVES OF THE SYLLABUS The objectives of the syllabus are to test candidates’ (i) acquisition of basic skills of data processing and management; (ii) level of competence in ICT applications that will promote the acquisition of entrepreneurial skills for everyday living in the global world; (iii) knowledge in the application of ICT in facilitating business transaction and education; (iv) preparedness for further studies in Data Processing and Management. EXAMINATION SCHEME There will be two papers, Papers 1 and 2 both of which shall be taken as a composite paper at one sitting. PAPER 1: will consist of forty multiple-choice objective questions, all of which are to be answered in 1 hour for 40 marks. PAPER 2: will consist of two sections: Sections A and B. Candidates will be required to answer five questions in all. Section A: will consist of four essay questions. Candidates will be required to answer any three in 1 hour for 30 marks. Section B: will be a test of practical work. It shall consist of two compulsory essay questions to be answered in 1 hour for 40 marks.
DETAILED SYLLABUS S/N TOPICS CONTENT NOTES 1 INFORMATION AGE History of Computers i. Computing devices. ii. Concept of Number system in computing. iii. Generations of Computer: first, second, third, fourth, fifth generations of computer. Candidates should identify the various computing devices since the beginning of counting/computing. Should include the importance of number system to computing. Relate each generation with its characteristic feature. describe each generation under the following: year of development, basic component/type of technology, speed of operation, storage capacity/component. 2 Data and Information i. Definition of data and information. ii. Types of Data. ii. Ways of handling Data. iii. Definition of Data. iv. Digitalization. Differences between data and information should be emphasized 3 BASIC COMPUTING Classification of Computers Classify computers by: Type, Size, Usage. 4 Application of ICT in everyday life i. Uses of ICT in everyday activities. ii. Impact of ICT in the society. The use and areas of ICT application should be linked to societal development. 5 Components of i. Input Devices. Examples of each component Computers ii. Output Devices. iii. System Unit. iv. Storage Devices should be treated and how they are used in data processing. 6 INFORMATION PROCESSING The art of Information processing i. Definition of Information Processing. ii. Steps involved in Information Processing. Description of each step involved in information processing is required. 7 INFORMATION TRANSMISSION Process of Information transmission i. Definition of information transmission. ii. Methods of transmitting information. Modes of information transmission such as visuals(newspaper), audio(radio, telephone), audiovisual(GSM, Television) are required. 8 Medium of Information Transmission i. Types of Information Transmission. ii. Classification of means of transmission. Medium of information transmission such as radio, television, newspaper etc. 9 Networking i. Meaning of Networking, Internet and Intranet. ii. Types of Networking. Significance of networking should be mentioned Types such as MAN, LAN, WAN should be treated. 10 Internet i. Definition of Internet. ii. Benefits of internet iii. Internet browsers iv. Internet security v. Abuse of the Internet Candidates should be able to develop skills in the use of various services available on the internet 11 TOOLS FOR PROCESSING INFORMATION Operating System i. Definition of Operating System. ii. Types of Operating System. iii. Examples of Operating System. Differences between text iv. Functions of Operating System. (character) base interface and Graphical User Interface should be treated. 12 Word Processing i. Definition of Word Processing. ii. Uses of Word Processing iii. Examples of word Processing software. iv. Starting, loading and exiting word processing v. Creating, saving and retrieving documents Candidates should be able to make use of word processor to create and manipulate documents 13 Spreadsheet i. Definition. ii. Uses. iii. Examples of Spreadsheet Applications. iv. Loading and exiting spreadsheets. v. Creating, saving and retrieving Spreadsheet files. Candidates should be able to make use of spreadsheet to create and manipulate worksheets 14 Database Management System i. Definition. ii. Uses. iii. Examples of Database Applications. iv. Loading and exiting DBMS. v. Creating, saving and retrieving database files. i. Candidates should be able to use DBMS to create and manipulate Database files. ii. Include examples of packages for database management such as Microsoft Access. 15 Presentation Package i. Definition, uses, examples. ii. Loading and exiting Presentation programs. iii. Creating, saving and retrieving presentation files. i. Candidates should be able to use presentation programs to create and manipulate slides. 16 Web Design Packages i. Definition. ii. Uses. iii. Components. iv. Examples. Designing of web pages not required. 17 Graphic Packages i. Definition. ii. Uses of Graphic software packages. iii. Examples of graphic packages. Focus should be placed on Corel Draw COMPUTER MAINTENANCE, 18 ETHICS AND HUMAN ISSUES Maintenance of Computer i. General Cleaning. ii. Battery Charging and replacement for portable systems and UPS. iii. DVD drive lens cleaning. iv. Details of Hardware maintenance. v. Details of Software maintenance. vi. Computer crash and data recovery. Candidates should take note of basic maintenance procedures. Students should be able to ensure data integrity and recover data after a crash 19 Computer Ethics i. Computer room management ethics. ii. Laboratory rules and regulations. Responsible ways of using and securing computers 20 Safety Measures i. The sitting arrangement. ii. Positioning of the monitor, keyboard, CPU, mouse and any other peripheral devices. iii. Illuminating the computer room. iv. Maintaining a dust free environment. v. Keep liquid away from the computer room. Importance of safety measures should be emphasized. 21 Career opportunities in Data Processing i. Professions in computer. ii. Qualities of a good data processing professional. iii. Computer professional bodies. Duties of each professional/professional bodies should be treated. 22 Computer Virus i. Definition. ii. Types/Examples. iii. Sources. iv. Signals of virus warning v. Virus prevention, detection and deletion. Destructive effects of virus infection on computers DATA MANAGEMENT 23 Relational Model i. Database and table creation using application packages. ii. Creating relationships between tables iii. Creation of forms, queries and report. Arranging data in tables and forms should be emphasized The concept of primary and foreign keys, entities, attributes and relationships should be emphasized. Query language should be limited to those available to the database application package (e.g. query by example , SQL). 24 File Organization i. Definition of File organization. ii. Types of File organization. Comparison between the various types of File Organization is required. 25 Database Security i. Concept of data security, access control and data encryption. ii. Role of a database administrator. Importance of securing data is required 26 Parallel and Distributed databases i. Basic concept of parallel and distributed database. ii. Storing data in a distributed database (DBM) Definitions of concepts is required Significance of storing data in a distributed database management system is also required. LIST OF FACILITIES AND MAJOR EQUIPMENT/MATERIALS REQUIRED The table below shows the minimum requirement for a class of fifty candidates. ITEM NO. EQUIPMENT QUANTITY REQUIRED 1 Pictures/Charts showing different computing devices and other relevant information such as computers in a network 5 2 Computer system with Graphical User Interface (GUI), internet ready system; 5 3 Standard software packages such as Open Office, Microsoft office etc.(Latest version is desirable) 1 4 Multimedia systems and applications such as projector, speakers 1 5 Graphic packages such as corel draw.

WiFi networks and it's misconceptions 2

The Wi-Fi Alliance The  Wi-Fi Alliance , the organization that owns the Wi-Fi registered trademark term specifically defines Wi-Fi as any...