Anda di halaman 1dari 5

HARAMAYA UNIVERSITY

COLLEGE OFCOMPUTING AND INFORMATICS


DEPERTEMENT OF INFORMATION TECHENOLOGY

Prepared by Dagne Walle


ID.NO 1891/06

TITLE:-CHALLENG OF PROGRAMMING IN IT
Description
Information Technology students face a wide variety of programming challenges. Students may
find themselves in unfamiliar territory and these computing fundamentals can prove to be a
learning challenge, particularly introductory programming courses [1].
Computer programs are present in almost all aspects of modern business and other everyday life
aspects. Development and maintenance of these programs is of vital importance and this asks for
rather large number of programming professionals with profound knowledge about programming
concepts. However, it has been noted that education in this area comes with many reoccurring
challenges and difficulties that programming learners experience during their studies. This fact
leads to relatively high failure rates which in years have created negative opinion and fear about
taking programming courses.
In order to solve these problems many attempts throughout the years have been made.
Nevertheless, these problems have persisted to this day. The fact remains that programming
learners have problems in learning even programming languages that are designated as
programming languages for beginners. Programming requires certain way of thinking and

understanding of different programming concepts and structures which are hard for most
programming learners to comprehend and apply in their own programming tasks.
Some other aspects that influence this kind of state in programming education are also important.
There is an important question about the motivation of programming beginners to learn
programming and also the question about the appropriate learning style that programming
beginners require in order to understand certain concepts. There is a need to analyze current
situation and methodology that is predominantly used to teach programming learners
programming in order to determine the best course of action that would address reoccurring
problems of programming learners [2].

TITLE:- Impact of Facebook Usage on Students


Mark Zuckerberg, 23, founded Facebook while studying psychology at Harvard. A keen
computer programmer, Mr. Zuckerberg had already developed a number of social-networking
websites for fellow students, including Coursematch, which allowed users to view people taking
their degree, and Facemash, where you could rate people's attractiveness [1]. In February 2004
Mr. Zuckerberg launched "The Facebook", as it was originally known; the name taken from the
sheets of paper distributed to freshmen, profiling students and staff. Within 24 hours, 1,200
Harvard students had signed up, and after one month, over half of the undergraduate population
had a profile [1].
Facebook is a vast, sprawling network and you can make whatever you want of it. You sign up
by putting some details, and preferably a photo of yourself, on the Facebook website. Then
youre ready to start posting a few updates.
Facebook itself will send notes on people you might know, based on the fact that you went to the
same school or college or shared an employer (you only have to put up as much of this sort of
information as you want)[2].
There are other things Facebook adds on - you can play games across the internet, you can tell it
which book youre reading at the moment, you can rate films and get recommendations. You can
join groups of people with similar interests, you can join Facebook groups representing your
favorites TV or radio programs and chat to like-minded people about them [2].
Most students prefer using Facebook & motives for its use [3].
Same to that Debre Markos university departments of information technology students are the
member of the face book website.

TITLE:- On

Computers in Society in Case of HU


In recent years, computers have permeated our lives. From the office to the living room,
computers are transforming the ways we work and play. It is no surprise that they are also
transforming the ways we learn [1]. The computer is a key technology of the modern era and has
been central and essential to key operations in modern industrial society, including
manufacturing, transport and distribution, government, the military, health services, education
and research. And their impact will most likely increased over the next century. We have also
discovered that we are vulnerable to their malfunction and misuse, creating problems such as
computer crime, software theft, hacking, viruses, and invasions of privacy, an over- reliance on
intelligent machines and workplace stress, each of which has created one or more ethical
dilemmas for the computer profession. Most technological problems these days get blamed on
computers including power supplies failing, phone systems going down, air traffic controls
seizing up, traffic lights on the blink. [2]
Computers have touched every part of our lives: the way we work, the way we learn, the way we
live, even the way we play. It almost is impossible to go through a single day without
encountering a computer, a device dependent on a computer, information produced by a
computer, or a word that was introduced or whose meaning has changed with the advent of
computers. Because of the significance of computers in todays world, it is important to be
computer literate. Being computer literate means you have knowledge and understanding of
computers and their uses [3]. In this research we will develop a proposal that helps to remove
illiteracy by creating awareness for students and other workers which are found in HU University
and which are not educated about computers usage, the effect of computers on society and others
in HU University particularly in main campus.

TITLE:-Data security technologies


Disk encryption
Disk encryption refers to encryption technology that encrypts data on a hard disk drive. Disk
encryption typically takes form in either software (see disk encryption software) or hardware
(see disk encryption hardware). Disk encryption is often referred to as on-the-fly
encryption (OTFE) or transparent encryption.
Software versus hardware-based mechanisms for protecting data
Software-based security solutions encrypt the data to protect it from theft. However, a malicious
program or a hacker could corrupt the data in order to make it unrecoverable, making the system
unusable. Hardware-based security solutions can prevent read and write access to data and hence
offer very strong protection against tampering and unauthorized access.
Hardware based security or assisted computer security offers an alternative to software-only
computer security. Security tokens such as those using PKCS#11 may be more secure due to the
physical access required in order to be compromised. Access is enabled only when the token is
connected and correct PIN is entered (see two-factor authentication). However, dongles can be
used by anyone who can gain physical access to it. Newer technologies in hardware-based
security solves this problem offering full proof security for data.
Working of hardware-based security: A hardware device allows a user to log in, log out and set

different privilege levels by doing manual actions. The device uses biometric technology to
prevent malicious users from logging in, logging out, and changing privilege levels. The current
state of a user of the device is read by controllers in peripheral devices such as hard disks. Illegal
access by a malicious user or a malicious program is interrupted based on the current state of a
user by hard disk and DVD controllers making illegal access to data impossible. Hardware-based
access control is more secure than protection provided by the operating systems as operating
systems are vulnerable to malicious attacks by viruses and hackers. The data on hard disks can be
corrupted after a malicious access is obtained. With hardware-based protection, software cannot
manipulate the user privilege levels. It is impossible for a hacker or a malicious program to gain
access to secure data protected by hardware or perform unauthorized privileged operations. This
assumption is broken only if the hardware itself is malicious or contains a backdoor. The
hardware protects the operating system image and file system privileges from being tampered.
Therefore, a completely secure system can be created using a combination of hardware-based
security and secure system administration policies.

TITLE:-Computer graphics
Computer graphics are pictures and movies created using computers usually referring to image
data created by a computer specifically with help from specialized graphical hardware and
software. It is a vast and recent area in computer science. The phrase was coined by computer
graphics researchers Verne Hudson and William Fetter of Boeing in 1960. It is often abbreviated
as CG, though sometimes erroneously referred to as CGI.
Important topics in computer graphics include user interface design, sprite graphics, vector
graphics, 3D modeling, shaders, GPU design, implicit surface visualization with ray tracing, and
computer vision, among others. The overall methodology depends heavily on the underlying
sciences of geometry, optics, and physics. Computer graphics is responsible for displaying art
and image data effectively and meaningfully to the user, and processing image data received
from the physical world. The interaction and understanding of computers and interpretation of
data has been made easier because of computer graphics. Computer graphic development has had
a significant impact on many types of media and has revolutionized animation, movies,
advertising, video games, and graphic design generally.
In keeping with the retrospective theme of this issue of Computer Graphics, Standards Pipeline
takes a long look back at the history of the development of formal standards for computer
graphics. As is fitting for a retrospective, there is a focus on where we have succeeded and where
we have failed.Three guest authors contributed to this column. First, Andy van Dam takes us
back to the early beginnings of standards for computer graphics and the forces that led to the first
attempts at standards. Andy ends by describing the beginnings of the PHIGS and PHIGS+
standards efforts. Our second contributor, Richard F. Puk, who was the editor of the ISO PHIGS
standard, describes its development in more detail, ending with its successes and its failures and
a vision for the future. Our final contributor, Lofton Henderson brings us up to date on the
development of the Computer Graphics Metafile and its amendments.
Cloud Computing It is the latest technology that has made a huge change in the way data is
stored and processed in servers.
Cloud Computing is not an object in itself, rather it comprises services and database that are
accessed via web or any private network.

Key Cloud Computing providers: IBM, HP, Google, Microsoft, Amazon Web Services,
Salesforce.com, NetSuite, VMware etc.
Examples of Cloud Computing services I ncludes Google Docs, Office 365, DropBox, SkyDrive
etc.
Types of Cloud Computing
Cloud Computing is composed of three service models and four deployment methods.
Cloud Computing Service Models
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
Infrastructure as a Service (IaaS): The IaaS layer offers storage and infrastructure resources that
is needed to deliver the Cloud services. It only comprises of the infrastructure or physical
resource. Top IaaS Cloud Computing Companies: Amazon (EC2), Rackspace, GoGrid,
Microsoft, Terremark and Google.
Platform as a Service (PaaS): PaaS provides the combination of both, infrastructure and
application. Hence, organisations using PaaS dont have to worry for infrastructure nor for
services. Top PaaS Cloud Computing Companies: Salesforce.com, Google, Concur
Technologies, Ariba, Unisys and Cisco.
Software as a Service (SaaS): In the SaaS layer, the Cloud service provider hosts the software
upon their servers. It can be defined as a in model in which applications and softwares are hosted
upon the server and made available to customers over a network. Top SaaS Cloud Computing
Companies: Amazon Web Services, AppScale, CA Technologies, Engine Yard, Salesforce and
Windows Azure.
Cloud Computing Deployment Models
1. Private Cloud
2. Public Cloud
3. Hybrid Cloud
4. Community Cloud
Private Cloud: The cloud infrastructure is operated solely for an organisation. In simple words
we can say that such cloud models are dedicated to a third party who wish to use. It may be
managed by the Cloud Computing provider or any other third party.
Public Cloud: The cloud infrastructure is made available to the general public or a large industry
group and is owned by the Cloud providers.
Hybrid Cloud: Its a combination of two or more clouds (private, community or public).
Community Cloud: This cloud infrastructure is shared by several organisations.

Anda mungkin juga menyukai