Data Processing SSS 3 Lesson Note
Data Processing SSS 3 Lesson Note
REGISTER LO G I N
Crash Recovery
Back to: DATA PROCESSING SS 3
Welcome to class!
In today’s class, we will be talking about crash recovery. Enjoy the class!
Crash Recovery
Definition
Crash recovery is the process by which the database is moved back to a consistent and usable state. This is done by rolling back incomplete transactions and completing
committed transactions that were still in memory when the crash occurred. When the database is in a consistent and usable state, it has attained what is known as a point
of consistency. Following a transaction failure, the database must be recovered.
1. A power failure on the machine causing the database manager and the database partitions on it to go down.
2. A hardware failure such as memory corruption, or disk, CPU, or network failure.
3. A serious operating system error that causes the DB to go down
ARIES is a recovery algorithm designed to work with no-force, steal database approach. It is used by IBM DB2, MS SQL Server and many other database systems.
The three main principles that lie behind the ARIES recovery algorithm:
2. Write-Ahead Logging: Any change to an object is first recorded in the log, and then the log must be written to stable storage before changes to the object are
written to a disk.
3. Repeating History during Redo: On restart, after a crash, ARIES retraces the actions of a database before the crash and brings the system back to the exact state
that it was in before the crash. The n it undoes the transaction still active at crash time.
4. Logging Changes during Undo: Change made to the database while undoing transactions are logged to ensure such an action isn’t repeated in the event of
repeated restarts.
Recovery procedure after crash
1. Analysis Phase: The first phase, analysis, compute all the necessary information from the log file.
2. REDO Phase: The Redo phase restores the database to the exact state at the crash, including all the changes of uncommitted transactions that were running at that
point time.
3. UNDO Phase: The undo phase then undoes all uncommitted changes, leaving the database in a consistent state. After the redo phase, the database reflects the
exact state at the crash. However, the changes of uncommitted transactions have to be undone to restore the database to a consistent state.
Evaluation
1. The Write-Ahead Log Protocol: Write-Ahead Logging (WAL) is a family of techniques for providing atomicity and durability (two of the ACID properties) in
database systems. In a system using WAL, all modifications are written to a log before they are applied. Usually, both redo and undo information is stored in the log.
WAL allows updates of a database to be done in one place.
2. Atomicity: This is the property of transaction processing whereby either all the operations of transactions are executed or none of them is executed (all-or-nothing)
3. Durability: This is the ACID property which guarantees that transactions that have committed will survive permanently.
4. Log: A transaction log (also transaction journal, database log, binary log or audit trail) is a history of actions executed by a database management system to
guarantee ACID properties over crashes or hardware failure. Physically, a log is a file of updates done to the database, stored in stable storage.
5. Check Pointing: Checkpointing basically consists of storing a snapshot of the current application state, and later on, use it for restarting the execution in case of
failure. A checkpoint record is written into the log periodically at that point when the system writes out to the database on disk all DBMS buffers that have been
modified. This is a periodic operation that can reduce the time for recovery from a crash. Checkpoints are used to make recovery more efficient and to control the
reuse of primary and secondary log files. In the case of a crash, backup files will be used to recover the database to the point of crash.
6. Media Recovery: Media recovery deals with the failure of the storage media holding the permanent database, in particular disk failures. The traditional database
approach for media recovery uses archive copies (dumps) of the database as well as archive logs. Archive copies represent snapshots of the database and are
periodically taken.
The archive log contains the log records for all committed changes which are not yet reflected in the archive copy. In the event of a media failure, the current database can
be reconstructed by using the latest archive copy and redoing all changes in chronological order from the archive log.
Faster recovery from disk failures is supported by disk organizations like RAID (redundant arrays of independent disks) which store data redundantly on several disks.
However, they do not eliminate the need for archive-based media recovery since they cannot completely rule out the possibility of data loss, e.g when multiple disks fail.
General evaluation
Reading assignment
Understanding Data Processing for senior secondary schools by Dinehin Victoria pages 261 – 267
Weekend assignment
1. The process by which a database is moved back to a consistent and usable state is called………. (a) cash recovery (b) crash recovery (c) past recovery (d) undo
recovery
2. The recovery algorithm that uses no-force and steals approach is ………….. (a) ARIAS (b) ARIES (c) ARREARS (d) ARIS
3. ARIES works in ……………. Phases (a) 3 (b) 2 (c) 1 (d) 4
4. Which of these is not a crash recovery type ………… (a) ARIES (b) Media recovery (c) Checkpointing (d) UNDO
5. ………. Crash recovery uses backup files (a) Checkpoint (b) ARIES (c) Media recovery (d) atomicity
Theory
Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.
Access Fun Video Lessons to Pass WAEC, NECO, JAMB, POST-UTME in One Sitting
← Previous Lesson
Checkpointing and Media Recovery
Next Lesson →
Parallel and Distributed Database
JANE
NOVEMBER 20, 2020 AT 1:51 PM
Reply
CLASS TUTOR
NOVEMBER 20, 2020 AT 3:16 PM
Reply
COMFORT
JANUARY 27, 2021 AT 12:15 PM
This is superb
Reply
CLASS TUTOR
JANUARY 28, 2021 AT 10:27 AM
Reply
DANIEL AGBUKE
FEBRUARY 22, 2021 AT 8:45 AM
Reply
EMELUE TOBECHUKWU
OCTOBER 13, 2021 AT 3:35 PM
This is exactly what i wanted. Thank u very much for the lesson note
Reply
BAYO
OCTOBER 25, 2021 AT 10:16 PM
Reply
ORATOR OGBONNA
OCTOBER 26, 2021 AT 7:18 PM
Reply
AMAKA EMMANUEL
DECEMBER 6, 2021 AT 6:30 PM
Reply
VICTOR CHINEDUM
NOVEMBER 2, 2022 AT 7:03 AM
Very educative but please make a person to copy the text please some teachers can use it to form their note thanks
Reply
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
Website
Save my name, email, and website in this browser for the next time I comment.
Post Comment
Student’s Menu
Dashboard
My Courses
My Achievements
Edit Account
Sign Out
PRIMARY 6
First Term
Second Term
Crash Recovery
Parallel and Distributed Database
Parallel And Distributed Database II
Networking
Networking II
Computer Virus
Computer Virus II
Career Options in Data Processing
Career Options In Data Processing II
OPEN
08051544949, 09032253648
08051544949
COMMUNITY
About CN
Teach for CN
Testimonials
Faculty
Careers
Blog
A liate
Press
Terms of use
Privacy Policy
WEEKLY NEWSLETTER
Name
Your Email
SUBSCRIBE
REGISTER LO G I N
Welcome to class!
In today’s class, we will be talking about parallel and distributed database. Enjoy the class!
Parallel database:
Parallel Database improve processing and input/output speeds by using multiple CPU and disks in parallel. A Parallel Database system seeks to improve performance
through parallelization of various operations, such as loading data, building indexes and evaluating queries. In Parallel processing, many operations are performed
simultaneously, as opposed to serial processing, in which the computational steps are performed sequentially.
Organizations of every size benefit from databases because they improve the management of information. The database has a server, a specialized program that oversees
all user requests. Organization use parallel database approach for a large user base and millions of records to process. They are fast, flexible and reliable.
Shared Memory
Shared Disk System
Shared Nothing System
1. Shared Memory System: This is where multiple processors are attached to an interconnected network and access a common region of memory.
Advantages
Disadvantages
2. Shared disk system: where each processor has its own main memory, and direct access to all disks through an interconnected network.
Advantages
Disadvantages
1. More interference
2. Increases N/ W bandwidth.
3. The shared disk is less sensitive to partitioning.
3. Shared nothing: This is where each processor has local main memory and disk space, but no two processors can access the same storage area and all
communication between processor is through a network connection. It has its own mass storage as well as main memory.
Advantages
Disadvantages
1. It is hard to program.
2. Addition of new nodes requires reorganization.
Evaluation
A relational query execution plan is a graph/ tree of relational algebra operators (based on this operators can execute in parallel) and the operators in a graph can be
executed in parallel. If an operator consumes the output of a second operator, we have pipelined parallelism.
Data partitioning: In this case, a large database is partitioned horizontally across several disks, this enables us to exploit the I/O bandwidth of the disk by reading and
writing them in parallel. This can be done in the following ways:
1. Round-robin partitioning: If there are n processors, the 1st tuple is assigned to processor mod n round-robin partitioning. Round-robin partitioning is suitable for
efficiently evaluating queries that access the entire relation. If only a subset of the tuples is required, hash partitioning and range partitioning are better than round-
robin partitioning.
2. Hash partitioning: A hash function is applied to (selected fields of) a tuple to determine its processor. Hash partitioning has the additional virtue that it keeps data
evenly distributed even if the data grows and shrinks over time.
3. Range partitioning: Tuples are sorted and ranges are chosen for the sort key values so that each range contains roughly the same number of tuples, tuples in
range, I reassigned to processor i. Range Partitioning can lead to data skew.
1. High Performances
2. Speed
3. Reliability
4. Capacity
General evaluation
Reading assignment
Understanding Data Processing for senior secondary schools by Dinehin Victoria pages 269 – 271
Weekend assignment
1. ………..system seeks to improve performance through parallelization of various operations. (a) Parallel database (b) distributed database (c) relational database (d) flat
database.
2. The architecture where multiple processors are attached to an interconnected network and access a common region of memory is called ………. (a) shared memory
(b) shared disk system (c) share nothing(d) all of the above
3. In ……….partitioning, tuples are sorted and ranges are chosen for the sort key values. (a) round-robin (b) hash (c) range (d) table
4. ………..Partitioning is suitable for efficiently evaluating queries that access the entire relation. (a) range (b) round-robin (c) hash (d) query
5. The following are examples of parallel database except. (a) implementation is highly expensive (b) speed (c) reliability (d) capacity
Theory
In our next class, we will be talking more about Parallel And Distributed Database. We hope you enjoyed the class.
Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.
Access Fun Video Lessons to Pass WAEC, NECO, JAMB, POST-UTME in One Sitting
← Previous Lesson
Crash Recovery
Next Lesson →
Parallel And Distributed Database II
AYI2GREAT
OCTOBER 28, 2021 AT 10:51 AM
Reply
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
Website
Save my name, email, and website in this browser for the next time I comment.
Post Comment
Student’s Menu
Dashboard
My Courses
My Achievements
Edit Account
Sign Out
PRIMARY 6
First Term
Second Term
Crash Recovery
Parallel and Distributed Database
Parallel And Distributed Database II
Networking
Networking II
Computer Virus
Computer Virus II
Career Options in Data Processing
Career Options In Data Processing II
08051544949, 09032253648
08051544949
COMMUNITY
About CN
Teach for CN
Testimonials
Faculty
Careers
Blog
A liate
Press
Terms of use
Privacy Policy
WEEKLY NEWSLETTER
Name
Your Email
SUBSCRIBE
REGISTER LO G I N
Microso
Welcome to class!
In today’s class, we will be talking more about parallel and distributed database. Enjoy the class!
Distributed Database
A Distributed database (DDB) is a collection of multiple, logical interrelated database distributed over a computer network.
A Distributed database management system (DDBMS) is the software that manages the DDB and provides an access mechanism that makes this distribution transparent to
the users. A distributed database system is a system that permits physical data storage across several sites and each site/node is managed by a DBMS that is capable of
running independently of the other sites. It is a database in which storage devices are not all attached to a common processing unit as the CPU, controlled by a distributed
database management system. It may be stored in multiple computers, located in the same physical location; or may be dispersed over a network of interconnected
computers. System administrators can distribute collections of data (e. g in a database) across multiple physical locations. A distributed database can reside on network
servers on the internet, on corporate intranets, or other company networks.
Microso Install
Two processing ensure that the distributed database remain up- to date and current:
Replication: involves using specialized software that looks for changes in the distributed database. Once the changes have been identified, the replication process
makes all the databases look the same. The replication process can be complex and time –consuming depending on the size and number of the distributed
databases
Duplication: This process has less complexity, it basically identifies one database as a master and then duplicates that database. The duplication process is normally
done at a set time hour. This is to ensure that each distributed location has the same data. In the duplication process, users may change only the master database,
which ensures that local data will not be overwritten.
A Distributed Database management system is designed for heterogeneous database platforms that focus on heterogeneous database management systems. The
following property is considered desirable:
1. Distributed Data Independence: Users should be able to ask queries without specifying where the referenced relations or copies or fragments of the relations are
located.
2. Distributed Transaction Atomicity: User should be able to write transactions that access and update at several sites just as they would write transactions over
purely local data
There are two major types of distributed database systems: they are:
Evaluation
Client-Server
Collaborating Server
Middleware
1. Client-Server Architecture: In this architecture, the Client (front end) does data presentation or processing, while the Server (back- end) does storage, security and
major data processing. The client is held responsible for user-interface issues and servers manage data and execute transactions. A client-server system has one or
more client processes and one or more server processes, and a client process can send a query to any one server process. Thus a client process could run on a
personal computer and send queries to a server running on a mainframe.
Clients characteristics
Servers characteristics
1. Very easy to implement because of its clear separation of functionally and a centralized server.
2. Allow user to run a graphical user interface.
3. It enables the roles and responsibilities of a computing system to be distributed among several independent computers known to each other only through the
network. It also provides greater ease of maintenance.
4. Servers provide better security control access and resources to guarantee that only those clients with the appropriate permissions may access and change data.
5. Since data storage is centralized, updates to that data are much easier for administrators.
6. Many advanced client-server technologies are designed to ensure security, user-friendly interfaces and ease of use.
7. It works with multiple different clients of different specifications.
Disadvantages of client-server
1. The client-Server architecture does not permit a single query to span multiple servers.
2. Some times to separate and distinguish between clients and server architecture become harder.
3. The problem of overlapping, the client process and the server.
4. Networks traffic blocking is one of the problems related to the client-server model.
2. Collaborating server system: This is a collection of database servers, each capable of running transactions against local data, which cooperatively execute
transactions spanning multiple servers. This overcomes the problem of client-server architecture.
3. Middleware architecture: All web transactions take place on the servers. The web server is responsible for communicating with the browser while the database
server is responsible for storing the required information.
1. Fragmentation
2. Replication
3. Fragmentation: This is a process of splitting a relation into smaller relation or fragments, and storing the fragment possibly at different sites. In horizontal
fragmentation, each fragment consists of a subset of rows of the original relation. While in vertical fragmentation, each fragment consists of a subset of columns of
the original relations.
4. Replication: This means that several copies of a relation or relation fragment can be stored. An entire relation can be replicated at one or more sites. Similarly, one
or more fragments of a relation can be replicated at other sites. For example, if a relation R is fragmented into R1, R2 and R3, there might be just one copy of R1,
whereas R2 is replicated at two other sites and R3 is replicated at all sites.
Parallel Distributed System: seeks to improve performance through parallelization of various operations, such as data loading, index building and query evaluating.
Distributed Database System: Data is physically stored across several sites, and each site is typically managed by a DBMS capable of running independently of the
other sites. The distribution of data is governed by factors such as local ownership and increased availability.
1. System component:
Distributed DBMS consists of many Geo-distributed, low –bandwidth link connected, autonomic site. While parallel DBMS consists of tightly coupled, high- bandwidth link
connected, non- autonomic node.
2. Component role:
Sites in distributed DBMS can work independently to handle local transaction or work together to handle global transactions. While nodes in parallel DBMS can only work
together to handle global transactions.
3. Design purposes:
Distributed DBMS is for sharing data, local autonomy, high availability, while parallel DBMSA is for high-performance high availability.
General evaluation
In our next class, we will be talking about Networking. We hope you enjoyed the class.
Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.
Access Fun Video Lessons to Pass WAEC, NECO, JAMB, POST-UTME in One Sitting
← Previous Lesson
Parallel and Distributed Database
Next Lesson →
Networking
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
Website
Save my name, email, and website in this browser for the next time I comment.
Post Comment
Student’s Menu
Dashboard
My Courses
My Achievements
Edit Account
Sign Out
PRIMARY 6
First Term
Second Term
Crash Recovery
Parallel and Distributed Database
Parallel And Distributed Database II
Networking
Networking II
Computer Virus
Computer Virus II
Career Options in Data Processing
Career Options In Data Processing II
Downtime &
Data Loss
Real Impact of Any
Disaster
Practical tools to
implement Disaster
Recovery Solution in
your IBM i environment.
maxava.com
OPEN
08051544949, 09032253648
08051544949
COMMUNITY
About CN
Teach for CN
Testimonials
Faculty
Careers
Blog
A liate
Press
Terms of use
Privacy Policy
WEEKLY NEWSLETTER
Name
Your Email
SUBSCRIBE
REGISTER LO G I N
Networking
Back to: DATA PROCESSING SS 3
Welcome to class!
Networking
A computer network is a system that connects two or more computers using a communication link. It describes a processing system with several independent, relatively low
speed, online, simultaneously usable work stations. In a network, remotely located computer stations are connected to a centrally located sophisticated, high-speed
processor via a communication link (telephone lines, microwave links, satellite) for purpose of sharing resources like printers, processor, programs and some other
information.
1. Work station/Client: Each computer in a network is often referred to as a work station or clients. Clients are the computers that can access the shared network
resources provided by a server.
2. Server: A server provides shared resources and data over a network. It is usually a high-performance micro-computer with several drives often given several
gigabytes of capacity and perhaps a few CD-ROM drivers, the server allows all the microcomputer to have access to an external network via the network
communication system.
3. Media: The computers are linked to each other by hardware components such as cables (UTP, STP, coaxial and fibre optics)
4. User: This is any person that uses a client to access resources on the network.
5. Resources: These are files, printers, modem or other items that can be used by network users. These can be hardware or software resources.
6. Protocol: They are written rules used for communication. They are the language that computers used to talk to each other over a network e.g. TCP/IP, AppleTalk.
Evaluation
Computer networks are categorized according to how they are organized, how they are used, and the limit of distance covered in the area of operation. These include:
This is a popular form of the network which refers to the connection of computers within a limited geographical area or within the same building or different building on
the same site. Several LANs can be connected by the use of bridges and routers.
This is a network between a large geographical area. It is a global connection of computers. They are more sophisticated and use superior transmissions channel like
microwave and satellite transmission to reach users over a very long distance. One of the most widely used of WANs is the Internet, which allows users to connect to other
users worldwide.
Network Topology
Topology is the term used to describe the physical arrangement of computer in networks. A computer network can be arranged or configured in several different ways:
Star Topology
Bus Topology
Ring Topology
Hierarchical Topology
Star topology:
In a star network, many small computers are connected to the central resources usually called a host computer or file server. The star is a common arrangement for linking
several microcomputers to a mainframe and providing a tine sharing system. This arrangement provides high security because every communication between work stations
must be via the central node computer (servers)
1. It is most reliable because if a node or a node cable fails it does not affect the other nodes.
2. New nodes or devices can easily be connected without affecting the rest of the network.
3. Performance of the network is dependent on the capacity of the central hub, adding further nodes do not greatly affect the overall performance.
4. Existence of centralized management helps in monitoring the network.
5. Ease of installation and upgrading from a hub to a switch.
6. Simple and cheap.
1. If the server or the link to the server fails, the whole network is bound to fail.
2. The additional devices such as hubs or switch increase the overall cost.
3. The addition of more nodes depends on the capacity of the central device.
4. Reconfiguration, fault isolation and installation of new devices tend to be difficult.
Bus topology:
It has a common cable to which all the computers on the network are linked. The common cable usually terminated at each end. One or more of
the station on the network acts as the file server. An example of the bus system is ETHERNET.
Ring topology:
It uses one network cable to connect all the workstation in an arrangement that looks like a ring. Ring networks are less secure because data
intended for a particular machine may have to pass by other machines before it gets to its destination in the network.
1. This is an orderly network, where every device has access to token and the privilege to transmit and this helps to reduce chances of collisions.
2. Equal access to the resource by each computer or node.
3. The performance of the network is not affected by additional components
4. Installation and reconfigure is made easy since the addition or deletion of a device requires moving just two components.
5. No need of a central server to manage the connectivity between the computers or nodes.
1. The hardest of all topology to troubleshoot because it can be hard to track down where in the ring, the failure has occurred.
2. Addition, changing and moving the nodes can affect the network.
3. For the node to communicate with one another there is a need for all the nodes to be switched on.
4. The entire network is affected if one workstation or port goes down.
5. The whole network will fail if any one of the cables fails anywhere in the ring.
Hierarchical topology:
This is a specialized kind of bus topology, the terminals are connected in the same fashion as the branches of a tree. It is very easy to extend and if one of the branches
fails, it can easily be removed.
Disadvantages
1. It depends heavily on the hub and its failure affects the entire system.
2. Maintenance is not easy and the cost is high.
General evaluation
Reading assignment
Understanding Data Processing for senior secondary schools by Dinehin Victoria pages 280 – 282
Weekend assignment
1. ………… is the language that computers used to talk to each other over a network (a) Media (b) user (c) Protocol (d) server
2. An example of the bus system is the ………… (a) Ethernet (b) intranet (c) ring (d) star
3. ……….. is the term used to describe the physical arrangement of computer in networks. (a) Internet (b) Topology (c) Ethernet (d) hub
4. The network configuration in which the terminals are connected in the same fashion as the branches of a tree is called ……… (a) Flat (b) relational (c) Hierarchical
(d) network
5. In a star ………, several small computers are connected to the central resources usually called a host computer or file server (a) Star (b) Ring (c) Hierarchical (d) Flat
In our next class, we will be talking more about Networking. We hope you enjoyed the class.
Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.
Access Fun Video Lessons to Pass WAEC, NECO, JAMB, POST-UTME in One Sitting
← Previous Lesson
Parallel And Distributed Database II
Next Lesson →
Networking II
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
Website
Save my name, email, and website in this browser for the next time I comment.
Post Comment
Student’s Menu
Dashboard
My Courses
My Achievements
Edit Account
Sign Out
PRIMARY 6
First Term
Second Term
Crash Recovery
Parallel and Distributed Database
Parallel And Distributed Database II
Networking
Networking II
Computer Virus
Computer Virus II
Career Options in Data Processing
Career Options In Data Processing II
Microso
Install
08051544949, 09032253648
08051544949
COMMUNITY
About CN
Teach for CN
Testimonials
Faculty
Careers
Blog
A liate
Press
Terms of use
Privacy Policy
WEEKLY NEWSLETTER
Name
Your Email
SUBSCRIBE
REGISTER LO G I N
Microso
Networking II
Back to: DATA PROCESSING SS 3
Welcome to class!
In today’s class, we will be talking more about networking. Enjoy the class!
Networking II
Benefits of networking
Internet
The Origins of the internet dates back to 1960s when the United State funded research projects of its military agencies to build a robust, fault-tolerant and distributed
computer network.
The internet is a global system of interconnected computer network that use the standard internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a
network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope that is linked by a broad array of
electronic and optical networking technologies. The internet carries a vast array of information resources and services, most notably the interlinked hypertext documents of
the World Wide Web (www) and the infrastructure to support electronic mail. One of the simplest definitions of the internet is that it is a collection of computer linked
together.
1. http://www.hiitplc.com
2. http://www.microsoft.com
3. http://www.cpn.gov.ng
1. http://www.unaids.org
2. http://www.who.int/hiv/
Educational bodies:
1. http://www.waeconline.org.ng/
2. http://myafrilearn.com/
1. http://wwwndlea.gov.ng/
2. http://www.nafdacnigeria.org/
Individual website:
1. https://samadeyemi.net/
Evaluation
1. Define internet.
2. Mention 5 terms associated with the internet and explain them.
1. Internet Explorer
2. Firefox
3. Opera
4. Netscape Navigator
5. Google Chrome
Internet Explorer:
Firefox:
Mozilla Firefox is a free and open-source web browser managed by Mozilla Corporation. Firefox is one of the widely used browsers.
Opera:
The opera browser is a web browser developed by opera software. It is the smallest and fastest browser in the world.
Netscape Navigator:
Evaluation
Title Bar:
The title bar is at the very top of the browser windows. In both Firefox and Internet Explorer web browser is normally seen on the blue bar at the top. The title of the web
page is displayed on the title bar.
Menu Bar:
The menu bar contains menus such as File, Edit, View, History, etc. it is the bar underneath the title bar.
ToolBar:
The toolbar and its icon are displayed at the top of the browser windows underneath the menu bar. This is where the Back button, the Home button, the Refresh button, etc
are found.
Address Bar:
The address bar is the box at the top of the browser windows that displays the entire URL or web site
address.
The internet plays a major role in the society in the following application areas:
1. Education/E-learning: With the internet, people can get educational materials and read them in preparation for examinations, or use them for school assignments.
The internet also enhances electronic learning whereby courses or subjects are taught online using audio and, or visual material.
2. E- Registration: The internet provides users with facilities for online registration of examinations like WAEC, NECO and JAMB.
3. Entertainment: The internet kills boredom and enhances leisure by providing its users with the latest entertainment in the form of movies, games, news, and many
more.
4. Communication: This is one of the key benefits of the internet. The internet provides many means by which users can communicate with friends, family, colleagues,
and more through emails and other social sites like Facebook, yahoo massager, 2go, twitter etc.
5. E-Banking: The internet can be used as a tool to carry out transactions with banks irrespective of the user’s location.
6. E-Commerce: Internet is also a tool for E-commerce. It allows users to buy and sell their goods and services online regardless of their location.
Internet security
Internet security is the practice of protecting and preserving private resources and information on the internet. It is a protection to your personal computer from any
harmful and malicious spyware.
Its objective is to establish rules and measures to use against attacks over the internet. Different methods have been used to protect the transfer of data including,
encryption, use of antivirus software, using a firewall, use of passwords that are not disclosed to unauthorized users etc.
Abuse of internet
Internet abuse is the inappropriate usage of the internet. Below are some of the common internet abuse:
1. Computer crime: A computer crime is any unlawful activity that is done using a computer. This definition can extend to traditional crimes that are committed with
the machine, such as counterfeiting money, but it also includes more tech-savvy crimes, such as phishing or logic bombs use of computers in criminal activity.
2. Cyber-bulling: Is the use of technology to harass, threaten, embarrass, or target another person.
3. Spam: Unsolicited e-mail often of a commercial nature.
4. Malware: These are software designed to harm a user’s computer, including computer viruses. Malware is short for malicious software which includes computer
viruses, worms, Trojans, adware, spyware, crimeware, scar ware, rootkits, etc.
Communication channel/media
There are kinds of channels/ media used to transmit data. Transmission media are physical paths for carrying information like a pair of wire. These are telephone lines,
coaxial cable, fibre optic cable, microwaves and satellite.
1. Intranet: This is a private network within an organization that resembles the internet.
2. Extranet: It is a private network that connects more than one organization. It is actually intranet that is partially accessible to authorized outsiders.
General evaluation
1. Define Networking.
2. State four benefits of Networking.
3. Differentiate between intranet and extranet.
Weekend assignment
1. One of the disadvantages of the hierarchical network is that it depends heavily on the hub and its failure affects the entire system. (a) entire system (b) part of the
system (c) single system (d) partial system.
2. One of the following is a communication medium. (a) coaxial cable (b) book (c) typewriter (c) windows (d) episode.
3. This is a term used to refer to the process of accessing and viewing web pages on the internet is called (a)Browse:
4. is a private network within an organization that resembles the internet. (a) internet (b) Intranet (c) WAN (d) server
In our next class, we will be talking about the Computer Virus. We hope you enjoyed the class.
Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.
Access Fun Video Lessons to Pass WAEC, NECO, JAMB, POST-UTME in One Sitting
← Previous Lesson
Networking
Next Lesson →
Computer Virus
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
Website
Save my name, email, and website in this browser for the next time I comment.
Post Comment
Student’s Menu
Dashboard
My Courses
My Achievements
Edit Account
Sign Out
PRIMARY 6
First Term
Second Term
Crash Recovery
Parallel and Distributed Database
Parallel And Distributed Database II
Networking
Networking II
Computer Virus
Computer Virus II
Career Options in Data Processing
Career Options In Data Processing II
Install
08051544949, 09032253648
08051544949
COMMUNITY
About CN
Teach for CN
Testimonials
Faculty
Careers
Blog
A liate
Press
Terms of use
Privacy Policy
WEEKLY NEWSLETTER
Name
Your Email
SUBSCRIBE
REGISTER LO G I N
Microso
Computer Virus
Back to: DATA PROCESSING SS 3
Welcome to class!
In today’s class, we will be talking about computer virus. Enjoy the class!
Computer Virus
Computer virus is a software program written with malicious intentions. They are intentionally written by some software developer to cause severe damage for the
computer, programs, and data files in which it found itself. A computer virus has the ability to replicates itself by changing other programs to include a copy of itself.
Examples of computer viruses include form, cascade, virus 101, phoenix, stimulate, involuntary, proud, disk killer, multipartite, flip, Trojan horse, sleeper, logic bombs,
Alabama virus, Christmas virus, worm, data crime, Jerusalem virus, April 1st virus etc.
There are basically three ways in which the virus will infect micro-computers:
1. Boot sector
2. Executable file viruses
3. Document
Boot sector virus: They affect hard drives and flash disks by making itself available on the boot sector of the disk. Booting up from an infected flash disk can cause
damage to the hard drive. Examples of boot sector viruses are polyboot.B, AntiEXE
Executable file viruses: They spread infection by attacking the code to executable files (EXE, COM) in this way, the virus program will be executed before the host
program is executed.
Document virus: Virus can affect the document by moving from a disk partition table to a different sector and replace with its own code, therefore. Infecting
document as they are accessed.
Resident virus: This type of virus dwells in the RAM memory is permanent in nature. Its effect of existence is to overcome and interrupt all the operations executed
by the system. For instance, corrupt files and programs that are opened, closed, copied etc.
1. Micro Virus: This type of virus infects files that are created by making use of a certain program or application that have macros. Examples are Relax, Melissa. A
Bablas, 097M/Y2K
2. Overwrite Virus: Overwrite virus deletes the information contained in the files, it duplicates itself by rendering information partially or totally useless. The only way
to clean a file infected is to delete the file totally, thus losing the original content.
3. Directory Virus: This virus changes the paths that indicate the location of a file. When you execute a program that has been infected with this virus, indirectly you
are running the virus program, and meanwhile, the original file and program has been displaced by the virus. It is then impossible to locate the original location of
file or program.
4. Polymorphic viruses: They change themselves through different ways.eg. Encryption and this act make it impossible for antiviruses to find them using string or
signature searches. They have the ability of duplicating themselves in large numbers. Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
5. Fat virus: This is part of a disk that is used to connect information and it is a vital part of the normal function of the computer. They prevent access to a certain
section of the disk where important files are stored and the damage caused can result in information losses from individual files or entire directories.
Evaluation
There are other types of destructive programs not purely classified as virus but are equally threats to internet e.g. Worm
Worms:
Worm is considered to be a sub-class of a virus. It spreads from one computer to another without any human action and they have the capability of reproducing itself on
the system at any point in time. For example, worm can spread itself to everyone listed in your email address book. Worm consumes or occupy a large part of computer
memory thereby causing network servers and individual computers to stop responding. Worms travel across the network. Examples are, PSWBBugbear.B, Lovegate.F, Trile.C,
Sobig.D, Mapson, Blaster.
Trojans do not reproduce themselves by infecting other files nor can they replicate like a worm but they will actually do damage once installed in the system. Sometimes
they appear to be useful software but when it is activated the result can be annoying (adding silly active desktop icons), or deletion of files and information on the system.
Hacker utilizes viruses or Trojans to gain access to your computer, to steal data, invade privacy or use the computer for their evil purposes. e.g., Netbus, subseven, Beast,
Zeus, Flashback Trojan, ProRat, ZeroAccess etc.
Logic bombs:
They are not really a virus parse because they lack the ability to replicate themselves. They can camouflage segments of other programs, even though they are not
programs. They aim to destroy data on the computer once certain conditions have been met.
They usually come together with other programs that seem to be harmless. These programs are not as dangerous as a virus but also collect data of your computer and
send it “home” which is in most cases a company uses this information to spam you with advertising E-mails. Spyware can track internet searching habits and possibly
redirect web site activity. e.g. The red sheriff and BESS.
General evaluation
READING ASSIGNMENT
Understanding Data Processing for senior secondary schools by Dinehin Victoria pages 287 – 289
WEEKEND ASSIGNMENT
1. …………is a software program written with malicious intentions. (a) Computer virus (b) infection (c) e-scan (d) Antivirus
2. ………… deletes the information contained in the files. (a) Fat virus (b) micro virus (c) Overwrite virus (d) Polymorphic virus
3. ……… utilizes viruses or Trojans to gain access to your computer, to steal data, invade privacy or use the computer for their evil purposes. (a) Hackers (b) files (c)
human (d) detector.
4. Examples of computer virus include the following except …………….. (a) disk killer (b) e-scan (c) tequila (d) cascade
5. A virus that can track internet searching habits and possibly redirect web site activity is called …………. (a) logic bomb (b) fat virus (c) spyware (d) worm
In our next class, we will be talking more about Computer Virus. We hope you enjoyed the class.
Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.
Access Fun Video Lessons to Pass WAEC, NECO, JAMB, POST-UTME in One Sitting
← Previous Lesson
Networking II
Next Lesson →
Computer Virus II
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
Website
Save my name, email, and website in this browser for the next time I comment.
Post Comment
Student’s Menu
Dashboard
My Courses
My Achievements
Edit Account
Sign Out
PRIMARY 6
First Term
Second Term
Crash Recovery
Parallel and Distributed Database
Parallel And Distributed Database II
Networking
Networking II
Computer Virus
Computer Virus II
Career Options in Data Processing
Career Options In Data Processing II
08051544949
COMMUNITY
About CN
Teach for CN
Testimonials
Faculty
Careers
Blog
A liate
Press
Terms of use
Privacy Policy
WEEKLY NEWSLETTER
Name
Your Email
SUBSCRIBE
REGISTER LO G I N
Microso
Computer Virus II
Back to: DATA PROCESSING SS 3
Welcome to class!
In today’s class, we will be talking more about the computer virus. Enjoy the class!
Computer Virus II
There are various ways in which viruses can attack the computer system;
1. When you download or open attachment in an e-mail message or by instant messaging messages
2. Installing an unknown program from unreliable and suspicious-looking web sites
3. Illegal duplication of software from one computer to another e.g. computer games etc.
4. When you use infected flask h drive or CD-ROMS or DVD on your system
5. Viruses can be transmitted from one computer to another e.g. through infected diskettes
6. Viruses can infect your computer when you download from the internet
7. Virus infection can happen through an infection flash disk, hard disk or optical disk. Computers on the internet are more prone to virus infection as different types of
virus are constantly released and can be downloaded easily into the system.
8. Another source of infection can be bad handling of the computer which can cause critical system malfunction e.g. exposing the computer to a heat source, severe
power fluctuation etc.
Computer antivirus
Antivirus is a program developed to destroy computer virus wherever it is found in the system. Examples of antivirus software are:
1. Norton antirust
2. McAfee virus scan
3. Dr Solomon Trolled
4. Penicillin
5. Microsoft Antivirus
6. Checkpoint Antivirus
7. Central point Antivirus
8. Avast
9. Kaspersky
10. E-scan
General evaluation
Reading assignment
Understanding Data Processing for senior secondary schools by Dinehin Victoria pages 290 – 292
Weekend assignment
1. Virus warning sign includes the following except ……………(a) Presence of tiny dots. (b) Incomplete saving of the file. (c) e-scan (d) Slowing down of the response time
2. ………… deletes the information contained in the files. (a) Fat virus (b) micro virus (c) Overwrite virus (d) Polymorphic virus
3. …………………. prevent access to a certain section of the disk where important files are stored and the damage caused can result in information losses from individual
files or entire directories (a) Polymorphic virus (b) micro virus (c) overwrite virus (d) Fat virus
4. …………..is a program developed to destroy computer virus. (a) Antivirus (b) malware (c) spyware (d) virus
5. ……………… consumes or occupy a large part of computer memory thereby causing network servers and individual computers to stop responding. (a) Trojan horse (b)
worm (c) spyware (d) malware
Theory
In our next class, we will be talking about Career Options In Data Processing. We hope you enjoyed the class.
Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.
Access Fun Video Lessons to Pass WAEC, NECO, JAMB, POST-UTME in One Sitting
← Previous Lesson
Computer Virus
Next Lesson →
Career Options in Data Processing
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
Website
Save my name, email, and website in this browser for the next time I comment.
Post Comment
Student’s Menu
Dashboard
My Courses
My Achievements
Edit Account
Sign Out
PRIMARY 6
First Term
Second Term
Crash Recovery
Parallel and Distributed Database
Parallel And Distributed Database II
Networking
Networking II
Computer Virus
Computer Virus II
Career Options in Data Processing
Career Options In Data Processing II
08051544949, 09032253648
08051544949
COMMUNITY
About CN
Teach for CN
Testimonials
Faculty
Careers
Blog
A liate
Press
Terms of use
Privacy Policy
WEEKLY NEWSLETTER
Name
Your Email
SUBSCRIBE
REGISTER LO G I N
Personal Assistant Estate Manager Project Manager (P2P) Network (Cloud) Engineer
Welcome to class!
In today’s class, we will be talking about career options in data processing. Enjoy the class!
Computer professionals
Computer personnel are those who assemble, install, repair and operate the computer system. The term equally includes those people who make their living out of the
computer industry. They include the following:
1. Database Administrator
2. Software programmer
3. Hardware Engineers
4. System analysts
5. Web developers
6. Computer support specialist
7. Network Administrator
8. Network Engineers
9. Computer Technician
10. Microsoft office specialist
11. Computer Educators
Evaluation
Database administrator:
A Database administrator is in charge of storing, organizing, presenting, using and analyzing data and database management software. A database administrator set up
new computer databases or integrating data from an old system to new systems. Performs routine tests and modifications to ensure that a database is performing and
running correctly. A database administrator troubleshoots the programs and hardware based on the findings, repairs or changes can be made to fix the problems.
Primary functions
Software programmer:
A Software Programmer is the one that writes a set of instructions to be executed by the computer. He designs, builds and tests software before releasing any software for
public consumption.
Functions
1. He plans, writes, tests and maintains all programs and packages installations.
2. Installation and testing of routines application are carried out by him.
3. He codes, debugs tests and keeps routine application programs.
4. He writes a program once the system analyst designs a system after much consultation with the system manager.
5. Training of the subordinate in programming and program coding is done by him.
6. He assists users with procedural or minor technical problems
7. He enters test data and programs code into the system
8. He assigns coordinates and review work of programming personnel.
9. Collaborates with computer manufactures and other users to develop new programming methods.
Hardware engineer:
System Engineer: Is in control of all installation of hardware of the computer system. He is in charge of servicing, repairing and general maintenance of the system.
Computer hardware engineers design and develops computer hardware and support peripherals. They are the brain behind any computer-generated technology.
Computer Software Engineer: He or she focuses on the development and design of computer software. The software design includes the design of applications and
programs that create and store text documents to the operating systems used in personal computers.
System Analyst: A system analyst carries out a feasibility study on a system. He is the person who thinks of likely problems that may arise from the system and application
software and he proffers solutions. He works closely with computer manager and his counterpart in the programming department.
Primary functions
1. He is responsible for collecting information to analyze and evaluate the existing system.
2. Preparation of Flowchart and Diagrams explaining system capability and processes.
3. Specifying and designing Computer system as well as implementing and maintaining them.
4. He undertakes research and recommends hardware and software development, purchase and use.
5. He ensures that new technical requirements are properly integrated with the existing ones.
Web developers:
A web developer is a programmer whose primarily function is to develop and write a program development on worldwide web applications or distributed network
applications that can run over HTTP from a web server to a web browser.
Primary functions
Data analyst:
They are professionals, who collect, maintain and troubleshoot problems generated from the storage of digital information. A data analyst works in the information
technology field in assessing and organizing data generated from research, customer relations or business relations. They develop tools or software programs that present
data in a useful format for business needs.
Data entry clerk, also known as Data Entry Keyers, compile and transfer information for business, government agencies and other organizations. Data entry clerks compile
orders, invoices and memo in an organized manner and input the relevant information into computers using software and templates.
Network administrator:
They install, configure, expand, protect, upgrade, tuning and repairing the networks. Network Administrators install, manage and maintaining ICT infrastructures such as
hubs, switches, routers, cables, server and clients as well as network software operating systems e.g mail server, backup software, database servers and application software.
This is a professional that install, manage and maintaining of ICT cabling/ transport network and architecture. He develops and implements IT security and data centre as
regards to the overall network.
Computer educator:
A computer educator trains up user to know about computer hardware and software.
He provides technical assistance to computer system users, resolve computer problems in person, through telephone or from remote locations. He also renders service
concerning the use of computer hardware and software, including printing, installation, word processing, electronic mail and operating services.
1. Excellent analytical skills that can be applied to solve problems or develop new ideas.
2. Must pay attention to detail to ensure everything works correctly and efficiently.
3. Show commitment to learning to keep abreast to the latest trend in information technology.
4. Must possess good communication skills.
5. He or she must have a strong interest in math which is useful in many computer applications like programming.
6. Must have the ability to learn and memorize programming languages.
7. Must possess the ability to handle multitasking i. e.g. ability to perform many tasks at once and must be able to manage all his responsibilities simultaneously.
8. Computer professionals should be able to solve or troubleshoot problems with network, software and other programs.
9. A good computer professional must possess technical writing skill.
General evaluation
Reading assignment
Understanding Data Processing for senior secondary schools by Dinehin Victoria pages 298 –302
Weekend assignment
1. ………….are those who assemble, install, repair and operate the computer system. (a) Computer personnel (b) Mechanic (c) Doctor (d) Lawyer
2. A good computer professional must possess ……….. writing skill. (a) logical (b) technical (c) physical (d) little
3. A ………….. is the one that writes a set of instructions to be executed by the computer. (a) software programmer (b) data analyst (c) computer operator (d) data entry
clerk
4. The ………………. a professional that install, manage and maintaining of ICT cabling/ transport network and architecture. (a) computer educator (b) enterprise system
administrator (c) database administrator (d) programmer
5. …………. He provides technical assistance to computer system users, resolve computer problems in person, through telephone or from remote locations. (a)
Computer support specialist (b) database administrator (c) computer user (d) system analyst
Theory
In our next class, we will be talking more about Career Options in Data Processing. We hope you enjoyed the class.
Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.
Access Fun Video Lessons to Pass WAEC, NECO, JAMB, POST-UTME in One Sitting
← Previous Lesson
Computer Virus II
Next Lesson →
Career Options In Data Processing II
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
Website
Save my name, email, and website in this browser for the next time I comment.
Post Comment
Student’s Menu
Dashboard
My Courses
My Achievements
Edit Account
Sign Out
PRIMARY 6
First Term
Second Term
Crash Recovery
Parallel and Distributed Database
Parallel And Distributed Database II
Networking
Networking II
Computer Virus
Computer Virus II
Career Options in Data Processing
Career Options In Data Processing II
08051544949, 09032253648
08051544949
COMMUNITY
About CN
Teach for CN
Testimonials
Faculty
Careers
Blog
A liate
Press
Terms of use
Privacy Policy
WEEKLY NEWSLETTER
Name
Your Email
SUBSCRIBE
REGISTER LO G I N
MPOWER Financing
Welcome to class!
In today’s class, we will be talking more about career options in data processing. Enjoy the class!
The following are some of the prominent computer professional bodies in Nigeria.
The Nigeria Computer Society (NCS) formed in 1978 as Computer Association of Nigeria (COAN) and changed into NCS in 2002 as an aftermath of harmonization with
other stakeholders and interest groups. NCS is the umbrella organization of all Information Technology Professionals, Interest Groups and Stakeholders in Nigeria.
Nigerian Computer Society is a place where people interested in Computing Technology within Nigeria gather to share ideas and knowledge. You can become a member
by completing the form online.
Functions of NCS
1. To promote the education and training of computer and information scientists, computer engineers, information architects and information technology and system
professionals.
2. To actively encourage research in the advancement of computer and information sciences.
3. To promote the interchange of information about the science and arts of information processes.
4. To develop the competence of members and encourage the practice of computing.
5. To promote and protect the professional interest of the member.
6. To work for the recognition by the government of ‘Digital Divide’ and to collaborate with relevant governments.
ITAN was founded in 1991 to promote IT literacy and penetration in Nigeria and to promote the interest of the members in the area of policy formulation and negotiations
with the government on IT policy matters.
Functions
1. The ITAN provides learning opportunities within the engineering sciences research and technology.
2. The goal of the ITAN education programs is to ensure the growth of skill and knowledge among the technician profession and to foster individual commitment to
continuing education among ITAN members, the engineering and scientific community and the general public.
Computer Professionals Registration Council of Nigeria is a corporate entity charged with the control and supervision of the computing profession in the country. The
computer professionals were established through Act No. 49 of 1993 promulgated on June 10 and gazette on August 9.
Functions of CPN
1. The body is charged with the responsibility of determining the standards of knowledge and skills to be attained by persons seeking to become members of the
profession and improve those standards from time to time as circumstances permit.
2. It is also part of the responsibility of CPN to maintain a register of persons seeking to be registered under the Act to practice computing profession and the
publication from time to time of the list of such.
3. They conduct exams known as Computer Professionals Examinations to other professionals that are interested in building a career in Information Technology (IT).
Upon completion of the exam, the person will be registered under a full member category.
Evaluation
The institute for the management of information system exists to promote and support the professional use, application, and management of information system.
The institute for the management of the information system is the teaching of the independent professional association for both users and developers of today’s
information technologies.
Vision/function IMIS
The IMIS vision is to see that information system management is recognized as one of the key professionals influencing the future of the world. The mission is to further
the course of professional in the cause of professionalism in the use of information system through life-long learning and to increase the awareness by the public as an
individual or as an organization of the advances, implication and potential in the information system.
Nigeria Internet Group (NIG), established in 1995, is a non-profit, non-governmental organization, promoting the internet group. The activities of the group have led to an
increase in awareness about the internet within Nigeria. In the largest online community of youth interested in global issues and creating positive changes.
Objectives
1. To advance the development of local internet content through the adoption of online services such as government, e-health, learning, commerce.
2. To promote the formulation of appropriate policies and legislation that ensures the growth and development of the internet in Nigeria.
3. To promote the internet as a tool for personal and national development.
General evaluation
Reading assignment
Understanding Data Processing for senior secondary schools by Dinehin Victoria pages 303 –305
Weekend assignment
1. ____ the institute for the management of information system exists to promote and support the professional use, application, and management of information
system. (a) IMIS (b) NIG(c) ITAN(d) CPN
2. ITAN was founded in ……. to promote IT literacy and penetration in Nigeria and to promote the interest of the members in the area of policy formulation and
negotiations with the government on IT policy matters. (a) 1890 (b)1891 (c) 1991 (d)1990
3. ____ is a corporate entity charged with the control and supervision of the computing profession in the country. (a) CPRCN (b) IMIS (c) NCS (d) NIG
4. ____ is a non-profit, non-governmental organization, promoting the internet group. (a) NIG(b) IMIS(c) CPN(d) ITAN
5. ____ is a place where people interested in Computing Technology within Nigeria gather to share ideas and knowledge. (a) IMIS(b) NCS (c) ITAN (d) CPN
Theory
Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.
LEARN TO CODE IN 8 WEEKS. Pay Only ₦25000 To Join Class
Access Fun Video Lessons to Pass WAEC, NECO, JAMB, POST-UTME in One Sitting
← Previous Lesson
Career Options in Data Processing
Back to Course →
DATA PROCESSING SS 3
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
Website
Save my name, email, and website in this browser for the next time I comment.
Post Comment
Student’s Menu
Dashboard
My Courses
My Achievements
Edit Account
Sign Out
PRIMARY 6
First Term
Egypt
Petroleum
Show
The Egypt Petroleum
Show EGYPS
Learn new skills and
improve your knowledge
through our conferences
egyps.com
OPEN
Second Term
Crash Recovery
Parallel and Distributed Database
Parallel And Distributed Database II
Networking
Networking II
Computer Virus
Computer Virus II
Career Options in Data Processing
Career Options In Data Processing II
08051544949, 09032253648
08051544949
COMMUNITY
About CN
Teach for CN
Testimonials
Faculty
Careers
Blog
A liate
Press
Terms of use
Privacy Policy
WEEKLY NEWSLETTER
Name
Your Email
SUBSCRIBE