Computer was invented by Charles Babbage in 1822. The computer is the most wonderful gift of science to the modern man. The computer can do all the works of man. Thus‚ after the invention of computer‚ the gap between man and machine has been bridged up.The dictionary meaning of the word "Computer" is an electronic calculating machine. Though a machine‚ it contains and provides innumerable informations. It may seem strange‚ but it is true that the memory and intelligence of a computer can be greater
Premium Computer Charles Babbage
IT Programs Faculty Name Email ID Program Diploma in Computer Application - DCA ; Advanced Diploma in Computer Application – ADCA; Integrated - Master of Computer Application – MCA D.I.T. - Diploma in Information Technology; B.Sc. ITBachelor of Science in Information Technology Diploma in Graphics and Web Design (DGWD); Advance diploma in Animation & Audio visual effects ADAAE ; Bachelor of Science in Multimedia & Animation – BSc MM & A Post Graduate Diploma in Information Technology – PGDIT; Master
Premium Academic degree Management Bachelor's degree
able of to analyze any company’s financial statement by the help of their annual report. So it helps us to learn about the practical knowledge of a company and now we are able to analyze a company properly by applying these method. 1.4 Scope of the study: We know that our main aim is to earn practical knowledge. By the help of this subject we have earned some practical knowledge about a company. We have know how they perform
Premium Financial ratio Financial ratios Balance sheet
With increasing popularity of computer games‚ and multimedia home PC users often need an unexpensive computer system upgrade. By building a custom computer one is able to combine componenets‚ and operating system to provide maximal gaming performance. Computers are often called number manipulators‚ because of their ability to run millions of mathematical operations per second (White 43). Computers use binary system of numbers‚ which allows them to operate system of microscopic switches called transistors
Premium Computer Personal computer
COMPUTER Q1- a ________ is approximately a million bytes. a) Gigabytes b) Kilobytes c) Megabyte d) Terabyte e) None of these Q2- The programs which are as permanent as hardware and stored in ROM is known as- a) Hardware b) Software c) Firmware d) ROMware e) None of these Q3- Memory is made up of a) Set of wires b) Set of circuits c) Large number of cells d) Set of optical fiber e) All of these Q4- Primary memory stores a) Data
Premium Twisted pair Input device
Latest Fashion Trend in Bangladesh-A Perspective Study Fashion changes with the march of time in modern ages throughout the world. What is fashion today becomes past tomorrow and new and new fashions emerge. Evidently fashion becomes modern and ultra modern day by day. Bangladesh is no exception of that change of fashion. Obviously we have to study fashion changes in Bangladesh. We know fashion is a combination of styles right from the hair down to the everyday wears including shoes. Modern
Premium Bangladesh Fashion Trousers
Mukbang: Let’s Eat! In increasingly virtual South Korea‚ the latest bizarre fad is watching someone eat online. The fad called‚ “mukbang‚” roughly translates to “eating broadcasts‚” where online channels live-stream people eating enormous servings of food while chatting away to those who are watching. Korean viewers are so enthralled to be watching strangers binge eating that the live-streamers consuming calories in front of webcams are becoming minor celebrities in Korean society. Rachel Ahn
Premium Korea Eating Reality television
Lin‚ H. (2012). Why computer scientists should care about cyber conflict and U.S. national security policy. Communications of the ACM; Vol. 55 Issue 6‚ p41-43‚ 3p. DOI: 10.1145/2184319.2184334 This article discusses why computer scientists should be aware of cyberconflict and U.S. National Security policies regarding cyberconflict. It presents information on cyberterrorism‚ espionage‚ and the cyberattacks reported by Computer Network Emergency Response Coordination Centers in order to attribute
Premium National security Science Security
of the military and industry in the development of electronics‚ computers‚ and information theory. After the 1940s‚ the military remained the major source of research and development funding for the expansion of automation to replace manpower with machine power. Since the 1950s‚ four generations of computers have evolved. Each generation reflected a change to hardware of decreased size but increased capabilities to control computer operations. The first generation used vacuum tubes‚ the second used
Premium Computer Personal computer Computer software
The purpose of this paper is to answer questions about various data input and output methods‚ various storage types and devices‚ and the speed of a computer. Each of the four questions is divided into a corresponding section below. In the input device section‚ this paper focuses primarily on user input‚ rather than the input devices used to extract information entered by a user. In all of the presented cases‚ electronic scanning methods are the best method‚ and the method routinely used‚ to extract
Premium Computer data storage USB flash drive Computer