Posts

Showing posts from 2017

what is a content management system (CMS)

A content management system (CMS) is a software application or may be a set of related programs used to create and manage digital content. There are two types of content management system as enterprise content management (ECM) and web content management (WCM). Enterprise Content Management (ECM) It is an application with multiple functionalities that provides a full-scale Content Management System for a company's organization and processes.  ECM helps to streamline the life cycle of information with document management and automates process workflows. It is easy to deal with more file types such as image files, email, computer-aided design and etc. An ECM consists five components as Capture Manage Store Preserve Delivery Web content management (WCM) A WCM facilitates collaborative authoring for websites. ECM software often includes a WCM publishing functionality, but ECM webpages typically remain behind the organization's firewall. The thr

What is ado.net

Image
Ado.net is a set of software components that expose data access service for .net framework programmers. Basically it is a part of the base class library in .net framework. Programmers used this for creating database driven applications. Ado.net has two primary parts. Data provider Data set What is the data provider? It is a set of related components work together to provide data in an efficient manner. Data provider means providing data from a data base. Here we use two types of databases. SQL : used for SQL server OLEDB : used for oracle, My SQL, Access Data provider consist 4 main components. Connection object Command object Data reader object Data adapter object What is Data set? This is a disconnected, in memory representation of data. The data is data set can be loaded from any valid data source. Data set is made my data adapter.it has two components as Data table and Data relation. A dataset object represen

What is Rapid Application Development

Image
Rapid Application Development (RAD) is a software development life-cycle designed to give; much faster development and higher-quality results than those achieved with the traditional life-cycle High speed, High quality, low lost are the three main goals of rapid application development. We use RAD to Takes advantage of automated tools and techniques because it allows organizations to build software applications faster, better, and cheaper. RAD Model The process of writing the software itself involves the planning required for developing the product is known as Rapid Application Development Model. It consist main five phases. Business Modeling In here information flow among business functions is defined. That means the complete business analysis is done to understand the business. Business functions are defined by answering questions like what information drives the business process, what information is generated and who generated it, where does the info

OOP Concepts

Image
today we are going to study about OOP concepts. Object oriented programming language is based on the concept of objects. Object oriented concepts are, Object Class Inheritance Polymorphism Encapsulation object an entity which has state(properties) and behavior is known as an object. it may be anything and may be logical or physical.Object is an instance of a class. ex :- dog,pen,tree,car,mother,...etc. as we told state and behavior let's discuss it with an example class class is a blue print or template of object. Which is a group of objects have similar properties. inheritance when one object acquires all or some properties of another object it is inheritance. That may the child will acquire their parents properties. as an example let's take the supper class as vehicle. A vehicle has colour,brand,speed,auto/manual etc. Car may be a sub class of above supper class. That means car has common properties in vehicle class and there may
Image
We all know operating systems are designed to help us in normal tasks which done by a compute such as Managing files, Loading programs, Printing documents etc. But developers are creating new programs to enhance or extend the operating system’s capabilities. Those are calls utility software. Simply utility programs provide new features which are not supported by an operating system. Now there are thousands of different utility software and we can find them on internet for free or with little price. Although we cannot take a definite list of utility software categories some common types are, Disk and file management programs Internet security Op customization tools Antivirus utilities A virus is a parasitic, scramble files or replicate itself until the host disk is full. Viruses can be transmitted in numerous ways such as while transforming files from one to another, downloading files over the internet or reusing old diskettes etc. So we use antiv
Image
Six sigma methodology Six sigma is a special methodology which provide special organization tools to improve the capabilities of any business process. It helps to increase the performance by decreasing the process variations. However it defect deductions and helps to improve the profit, make quality products and services and to develop the employee morale. Six sigma has begun in 1986 Motorola Ink in the USA. It has been based on statistical method and it was used to reduce variations in electronic manufacturing processes. But now it is use as a business encompassing methodology in world. There are three key elements of six sigma process improvement. They are,             Customers      customers are the people who define the quality of a product. They are expecting a better reliability, performance, on-time delivery, service, competitive price etc.so it is important to provide facilities for a good customer feedback.             Processes   in busi
  WHAT IS NETWORK Network security is a part of computer science and it is basically securing our networks from un-authorized access, network misuse, data theft, and device and data modification. Also network security introduces defense methods and new mechanisms to protect data and information from external or internal threats.               BASIC  NETWORK SECURITY Now we know network security is very important. To build a well-developed network security system there should be a good understanding among security technology developers and developers of networks. Network is based on Open System Interface (OSI) model. When creating a network we follows different types of protocols too. When developing a good network system it should fulfill following requirements. ·            Access       Confidentiality  Authentication  Integrity  Non-repudiation ·     NEED OF NETWORK SECURITY In the presence we are dealing with massive and more sensitive data