|
Computers and Technology Discuss computer issues, topics, and technology. Ask your questions about computer related problems, software, gadgets, computer science & emerging technologies. |
Share Thread: Facebook Twitter Google+ |
|
LinkBack | Thread Tools | Search this Thread |
#21
|
|||
|
|||
Quote:
Respected teacher! What about your 2017 planning, were enjoying April fool, or something, duuuuuddd! |
#22
|
||||
|
||||
Include it as well in your assignment questions.
__________________
Or do you think that the Fellows of the Cave and the Inscription were of Our Signs wonderful? |
#23
|
|||
|
|||
Already included,
I want some intro from you as well. Lagta he assignment ab month pe jae g.(student bhag jae ga)dedupppp Oh, April fool is already included in assignment as well. More than welcome, let's share your outline that we're going to "cover". Last edited by Man Jaanbazam; Friday, April 01, 2016 at 11:41 PM. Reason: merge chain posts |
The Following User Says Thank You to ursula For This Useful Post: | ||
mustansar~hussain (Friday, April 01, 2016) |
#24
|
||||
|
||||
[Try to explore things by yourself]
You have to go through following 11 levels. This whole process can take approximately 01 to 03 years. Levels: 1) Java Programming: An Introduction to Software | Coursera 2) Full Stack Web Development 3) HTML, CSS, and Javascript for Web Developers - Johns Hopkins University | Coursera 4) Android App Development | Coursera 5) Search Engine Optimization (SEO) | 7 march - 1 Aug 6) Cybersecurity and Its Ten Domains | Coursera 7) Cybersecurity | Coursera 8) Interaction Design | Optional 9) PHP and MySQL Tutorial in Urdu / Hindi Complete - Lecture 1 - YouTube 10) Introduction to Research for Essay Writing | Coursera 11) How to Write and Publish a Scientific Paper (Project-Centered Course) | Coursera For each level, I will be providing you its description and guidance. You will have to update me with your progress regularly. Level 01: Java Programming: An Introduction to Software | Coursera Deadline for whole specialization: 31 August. Assignment 01: Submit your review about this specialization. Your review should answer following questions: 1) what is this specialization about? 2) How many sub-levels, it encompasses? 3) Short intro about its each sub-level. Deadline for Assignment 01: 09:30 P.M; 03 April 2016 "Failure will never overtake you if your determination to succeed is strong enough." Best of Luck.
__________________
Or do you think that the Fellows of the Cave and the Inscription were of Our Signs wonderful? |
The Following User Says Thank You to mustansar~hussain For This Useful Post: | ||
ursula (Friday, April 01, 2016) |
#25
|
|||
|
|||
insahllah, i will meet the goal.
just one question, the brief introduction of these courses that are four in number? the problem is that it is not free of cost, please help me in this regard. Can i register free of cost???? Last edited by Man Jaanbazam; Friday, April 01, 2016 at 11:42 PM. Reason: merge chain posts |
The Following User Says Thank You to ursula For This Useful Post: | ||
mustansar~hussain (Friday, April 01, 2016) |
#26
|
||||
|
||||
Quote:
Courses are free of cost. They charge money for providing a certificate only. Search each course individually in the search bar, then join that freely.
__________________
Or do you think that the Fellows of the Cave and the Inscription were of Our Signs wonderful? |
The Following User Says Thank You to mustansar~hussain For This Useful Post: | ||
ursula (Saturday, April 02, 2016) |
#27
|
|||
|
|||
Quote:
Now, alhamdollillah got your assignment and answer is! i'm very excited, though late night disappointments has haunted me, which has vanished away Assignment first, what is web: an address used in the virtual world for example www.google.com second;how this web page is created, for example if i wanted to create www.ursula.com (it is created through CS and html) third:java script programming (that is used to manipulate imaging, computing and algorithms), which is understood by programmers only. Fourth: the most important part that how and where to use these informations in our daily life i.e. in projects formation etc. |
The Following User Says Thank You to ursula For This Useful Post: | ||
mustansar~hussain (Saturday, April 02, 2016) |
#28
|
||||
|
||||
[Try to explore things by yourself]
Quote:
All courses provide assignments in the same way weekly with a deadline. They all have separate discussion groups as well. Now, you have to accomplish each course, individually, with its assignments. Its 2nd of April today and you have to finish whole specialization before 31 August to proceed for LEVEL 02 . Moreover, try to interact with other members and place your queries there in the concerned group of the course. Here, you should precisely type your progress only. Your questions should be raised there only in the concerned discussion forum. Assignment 02: Completely finish first level of specialization, Programming and the Web for Beginners, with its assignments and helpful readings. Raise questions in the discussion forum and assist others there. Make notes out of each lecture in any way you feel comfortable. I took snapshot of each slide and compiled a complete ppt file to make notes. Then, printed that ppt file with 04 pages per one side. Deadline: 20 April 9 P.M Wish You Very Best Luck.
__________________
Or do you think that the Fellows of the Cave and the Inscription were of Our Signs wonderful? |
The Following User Says Thank You to mustansar~hussain For This Useful Post: | ||
ursula (Saturday, April 02, 2016) |
#29
|
|||
|
|||
Yeah, I got it! Inshallah I will try, Thanks again.
|
The Following User Says Thank You to ursula For This Useful Post: | ||
mustansar~hussain (Saturday, April 02, 2016) |
#30
|
||||
|
||||
Quote:
The thing you are referring to, is NSA (National Security Agency), not NASA, but before telling about NSA, I would like to explain about how an internet works and some history of it, so that you can understand the bigger picture. Before internet there was ARPANET, which helped researchers to visualize the need of a bigger network for future, which led to the creation of internet. Basically, ARPANET was the first very small network of computers, comprising of a few computers, and it was designed for military purposes. Slowly, ARPANET was started growing, and was then renamed as an internet later. But security was never a priority in the first place for researchers, but to build a simple communication medium which let computers to talk to each other. If we look around now then today’s internet is expanded all over the world, but still the problem is of security, which is a great threat to everyone who is a consumer of this technology. Now let me explain you about how internets works. Basically, it is a network of computers which are connected by some medium, like wire or wireless. Computers actually talk to each other because of a common protocol that is defined for communication. For example, you and I, can understand each other because of common languages, like Urdu, English. Similarly computers do have a common language (or protocol) for commutation with other computers, and for communication they need to be connected to some network by some medium, like wire or wireless, and there are special networking devices, which are part of a network to carry messages from one place to another. So you think that data (or message) that goes out of our computer has to travel through many networking devices to reach at destination. But the message being sent out to another networking device or computer, is not just a plain data, but actually it is encoded or encrypted by our computer before sending it to the internet, and when it reaches at destination then it again gets decoded or decrypted(means to transform it to its initial form). So this is how computers work while sending data to one another. Basically, the story I told you, is just one way of accessing someone’s data. There are hundred other ways that can be used to look into someone’s digital life/activity. Considering NSA, let’s be clear that it is a part of a US govt., and they can go to any level to achieve their goals, whether they have to spy on their citizens, or the rest of the world. They have their own their own team, researchers, programmers, security professionals which are of fine quality, and have enormous computing power to collect data and analyze it. So the question you were asking me about how they gain access to our data may have different answers, but I will tell you what I know. The one who developed the software system, knows the loop holes of it, which can be exploited, like Microsoft knows what the loop holes in Windows operating system are. Similarly every software product has some loop holes, and can be exploited for various purposes. NSA tries to exploit those loop holes to get into someone’s computer, not only this, they have even asked big technology giants for “backdoors”, like Twitter, Facebook, Google, etc. Backdoor gives the whole access to the system. It’s like a “chor darwaza” but by the consent of the maker of the software. Like if Facebook provides backdoor to NSA, then they don’t have to exploit the loop holes, because they have now backdoor, which gives access of all the data of Facebook’s user to them. I have read the news somewhere a year back, that NSA was asking Facebook, and Google for backdoor, and I don’t know to what extent this news was true. There’s another way of gaining access to data, by intercepting the data which goes through ISP (Internet Service Provider). Like if had an access to the networking devices of PTCL, then I would try to intercept the data, and try to decode it, as you know once the data goes out of your computing device, whether it be computer, or cell phone, it is encrypted and coded. So if someone intercepts the data that flows through networking device, then they have to decode or encrypt it to make it readable. So NSA may have an access to the big ISPs and they may have intercepted the data of many users, and then have decoded by the super computers they have, which have enormous power of computing to process data, and even decode the data. NSA may have developed their own hacking tools to fulfill their needs. So I would lastly say that your computing device is secure as long as it is not connected to the internet. I have never heard that computers are hacked by using metadata. This concept sounds weird to me. |
The Following 2 Users Say Thank You to quantumX For This Useful Post: | ||
mustansar~hussain (Saturday, April 02, 2016), ursula (Saturday, April 02, 2016) |
Thread Tools | Search this Thread |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
WEb Building GLossary Terms | Janeeta | Computer Science | 3 | Monday, November 04, 2019 12:09 AM |
EDS- notes | Predator | General Science Notes | 70 | Sunday, February 28, 2016 12:05 PM |