Description
Computer Fundamentals
ISBN 13 | |
---|---|
ISBN 10 | |
Edition | |
No. of Pages | |
Type of book | |
Weight | 360.00 g |
Year | |
Language | |
Publisher | |
Save | ₹19.8 (20% Off) |
Price |
|
Categories | BASIC COMPUTER BOOKS, Computer Books - English |
Condition Type | New |
Country Origin | India |
Out of stock
Computer Fundamentals
Chapter 1: Computer Basics.
Chapter 2: Binary Arithmetic.
Chapter 3: Input/Output Units.
Chapter 4: Memory Organization.
Chapter 5: Input/Output Processors.
Chapter 6: Software and Language Classification.
Chapter 7: Algorithms.
Chapter 8: Boolean Algebra.
Chapter 9: Flip-Flop Shift Register Counter.
Chapter 10: Operating Systems.
Chapter 11: More on Operating Systems.
Chapter 12: Local Area Networks.
Chapter 13: Information Technology.
Chapter 14: An Overview.
Chapter 15: System Analysis and Design.
Chapter 16: Application and Program Development Strategy.
Chapter 17: Computer Management and Virus Protection.
Pearl Software
Computer Fundamentals
Read moreMastering Internet, E-mail, HTML and Front Page is a unique book of web designing. Internet - Gives you and insight of the internet how it was invented its various uses, World Wide Web ( WWW ) and the way of using various browses. Email - Gives you a complete knowledge of various aspects of sending and receiving e-mail. It also tells you how to create your won e-mail acco...
Read moreRead more
Visual basic is such a vast subject that it will take a lot of time to understanding it fully. This book has been written in mind to make you aware of the options available in the software and how they can be used. It is like telling the child about the steps and stairs. You are the one who is to climb the stair. This book will just guide you how to use the stairs.
Read moreLearning Multimedia
Read moreThis book has been divided into two parts. The learning outcomes from each are as follows: PART -1 The reader will gain awareness of how fraudsters: - acquire one-time passwords via social engineering to commit OTP- based crimes. - exploit vulnerabili...
Buy nowComputer Fundamentals
Read moreThis text book o “Applied Chemistry” is development as per AICTE model curriculum ,2018, for compulsory course on Applied Chemistry of first years Diploma Program in Engineering and Technology. Atomic Structure, Chemical Bonding & Solution, Water, Engineering Materials, Chemistry of fuels & Lubricants and Electrochemistry are the five units of this book, comprisin...
Buy nowThis book is meant for diploma & degree student of metallurgical engineering for their academic programs as well as for various competitive examination for securing jobs. This book has been structured in three section. First section contains multiple choice type questions of various subjects of metallurgical engineering. Second section contains chapter wise question of GATE...
Buy nowSet of Two Books : Hacking & Mastering Hacking 1. Hacking is not a trick, it's an art. 2. The more you get into it, the 3. more you will gain from it.
Buy nowThe switched mode power conversion course is a design and application oriented subject with vast employment and career potential. Presently, the subject invariably has no laboratory component at all. When present, the laboratory session is a euphemism for a dry PC based entry and print out sessions linked to some branded circuit simulation software. However, the students rare...
Buy now“Mathematics-l” is included as a paper for the first year Diploma program. Syllabus of this book is strictly aligned as per model curriculum of AICTE, and academic content is combined with the concept of outcome-based education. Book cover five Units Trigonometry, Functions and Limit, Differential Calculus, Complex numbers and partial Fraction, Permutation and Combinatio...
Buy nowHeat transmission is very common and familiarly occurs in our daily life, so much that we tend to accept the process for granted and only think of its glaring manifestations and effects. We use our physical intuition to interpret thermal phenomena, and our reactions to hot and cod substances or the environment becomes voluntary. However, when heat transmission is considered fro...
Buy nowIn today's time where geographical boundaries are easily covered by Internet and computers with click of a button, there are lies risks within the ecosystem. Hacking somebody's details could lead to damages and losses. In this book we have tried to provide a glimpse into the Technology world of the common terms and procedures used by the hackers to intrude into the system. I...
Buy nowWe are exponentially adapting the digital era and moving our business, daily lifestyle and activities towards the world of internet. Digital Assets are continuously increasing, and thus, there is a massive requirement of securing digital assets and protecting information. Especially the young generation is getting much involved in social media and are quickly get into online...
Buy nowWe use cookies to give you a better experience, improve performance, analyze traffic, and to personalize content. By clicking "Allow All Cookies," you agree to allow the storing of cookies in your browser. To learn more, read our cookie policy.
Reviews
There are no reviews yet.