Posts

Computer Crimes

Image
Computer crimes have become a rapidly growing and serious problem today. Some crimes use computers as tools. Ex: manipulate records Counterfeit money and documents Commit fraud via telecommunication links Make unauthorized electronic transfers of money.             Identity theft is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else. They use that information to obtain credit, merchandise and services in the name of the victim or to provide the thief with false credentials. Some types of computer crimes are, Malicious software             Is any software that gives partial to full control of your computer to do whatever the malware creator wants. Malware can be a virus, worm, Trojan, adware, spyware, rootkit, etc. Most malware requires the user to initiate its operation. Some vectors of attack include an attachment in e-mails, browsing a malicious website that installs software afte

What is database suspect mode ?

A database is always in a specific status such as online, offline, recovering, restoring, emergency, suspect, etc.  Among them today we are going to discuss about suspect mode. If a database go into suspect mode we cannot work on it or at least can’t connect to the database until it becomes online mode. The main reason for a suspect status is damaging the primary filegroup of the database. So to recover this issue we have to perform some specific actions. What are the reasons to marks database as Suspect? Hardware failure. Database server is not shutdown properly. Corruption of the database files. Missing database logging files Low disk spaces. SQL cannot complete a rollback or roll forward operations. Steps to recover the Suspect mode of database Open SQL Server Management Studio. Select New Query and we have to turn on emergency mode.by turn on the emergency mode it allows read only access to the administrator. We can do it by,           ALTER DATABASE 

what is a content management system (CMS)

A content management system (CMS) is a software application or may be a set of related programs used to create and manage digital content. There are two types of content management system as enterprise content management (ECM) and web content management (WCM). Enterprise Content Management (ECM) It is an application with multiple functionalities that provides a full-scale Content Management System for a company's organization and processes.  ECM helps to streamline the life cycle of information with document management and automates process workflows. It is easy to deal with more file types such as image files, email, computer-aided design and etc. An ECM consists five components as Capture Manage Store Preserve Delivery Web content management (WCM) A WCM facilitates collaborative authoring for websites. ECM software often includes a WCM publishing functionality, but ECM webpages typically remain behind the organization's firewall. The thr

What is ado.net

Image
Ado.net is a set of software components that expose data access service for .net framework programmers. Basically it is a part of the base class library in .net framework. Programmers used this for creating database driven applications. Ado.net has two primary parts. Data provider Data set What is the data provider? It is a set of related components work together to provide data in an efficient manner. Data provider means providing data from a data base. Here we use two types of databases. SQL : used for SQL server OLEDB : used for oracle, My SQL, Access Data provider consist 4 main components. Connection object Command object Data reader object Data adapter object What is Data set? This is a disconnected, in memory representation of data. The data is data set can be loaded from any valid data source. Data set is made my data adapter.it has two components as Data table and Data relation. A dataset object represen

What is Rapid Application Development

Image
Rapid Application Development (RAD) is a software development life-cycle designed to give; much faster development and higher-quality results than those achieved with the traditional life-cycle High speed, High quality, low lost are the three main goals of rapid application development. We use RAD to Takes advantage of automated tools and techniques because it allows organizations to build software applications faster, better, and cheaper. RAD Model The process of writing the software itself involves the planning required for developing the product is known as Rapid Application Development Model. It consist main five phases. Business Modeling In here information flow among business functions is defined. That means the complete business analysis is done to understand the business. Business functions are defined by answering questions like what information drives the business process, what information is generated and who generated it, where does the info

OOP Concepts

Image
today we are going to study about OOP concepts. Object oriented programming language is based on the concept of objects. Object oriented concepts are, Object Class Inheritance Polymorphism Encapsulation object an entity which has state(properties) and behavior is known as an object. it may be anything and may be logical or physical.Object is an instance of a class. ex :- dog,pen,tree,car,mother,...etc. as we told state and behavior let's discuss it with an example class class is a blue print or template of object. Which is a group of objects have similar properties. inheritance when one object acquires all or some properties of another object it is inheritance. That may the child will acquire their parents properties. as an example let's take the supper class as vehicle. A vehicle has colour,brand,speed,auto/manual etc. Car may be a sub class of above supper class. That means car has common properties in vehicle class and there may
Image
We all know operating systems are designed to help us in normal tasks which done by a compute such as Managing files, Loading programs, Printing documents etc. But developers are creating new programs to enhance or extend the operating system’s capabilities. Those are calls utility software. Simply utility programs provide new features which are not supported by an operating system. Now there are thousands of different utility software and we can find them on internet for free or with little price. Although we cannot take a definite list of utility software categories some common types are, Disk and file management programs Internet security Op customization tools Antivirus utilities A virus is a parasitic, scramble files or replicate itself until the host disk is full. Viruses can be transmitted in numerous ways such as while transforming files from one to another, downloading files over the internet or reusing old diskettes etc. So we use antiv