I think the course is already perfect and doesnt need any improvements.
Glorious Treats
Thursday, August 8, 2019
GREEN COMPUTING:
To comprehensively and effectively address the environmental impacts of computing/IT, we must adopt a holistic approach and make the entire IT life cycle greener by addressing environmental sustainability along the four following complementary paths:
Green use
Intelligent use of energy and information systems. Reducing the energy consumption of computers and other information systems as well as using them in an environmentally sound manner.
Green disposal
Reduction of waste, reuse and refurbishment of hardware and recycling of out of use peripherals and other items. Refurbishing and reusing of old computers and properly recycling of unwanted computers and other electronics equipment.
Green design
Efficient design of data centres and workstations. Designing energy- efficient and environmentally sound components, computers, servers, cooling equipment and data centres.
Green manufacturing
Informed purchasing of components, peripherals and equipment manufactured with the environment in mind. Manufacturing electronic components, computers and other associated subsystems with minimal impact on the environment.
Evolution of internet and web authorization.
EVOLUTION OF INTERNET:
- The origins of the Internet date back nearly 40 years, with the U.S. military's funding of a research network dubbed Arpanet in 1969.
- Since then, the Internet has undergone more than just a name change. The number of computers connected to the Internet has grown exponentially, while the number of users has risen from a handful of computer scientists to 1.5 billion consumers.
- The network's reach has expanded beyond the United States to every corner of the globe.
EVOLUTION OF WEB AUTHORIZATION:
- Authorization is the process of giving someone permission to do or have something.
- In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use .
- Assuming that someone has logged in to a computer operating system or application, the system or application may want to identify what resources the user can be given during this session.
- Thus, authorization is sometimes seen as both the preliminary setting up of permissions by a system administrator and the actual checking of the permission values that have been set up when a user is getting access
Monday, August 5, 2019
MY NATIVE LANGUAGE
My native language is Tamil which is spoken in the southern parts of India.
TAMIL:
என் பெயர் நிகிதா மீரா
ENGLISH:
TAMIL:
என் பெயர் நிகிதா மீரா
நான் தற்போது மலேசியாவில் வசிக்கிறேன்
எனக்கு பிடித்தமான உணவு பீஸ்ஸா.
எனக்கு பிடித்த நிறம் இளஞ்சிவப்பு.
என் பொழுதுபோக்கு திரைப்படம்.ENGLISH:
My name is Nikita Mira.
I currently live in Malaysia
My favorite food is pizza.
My favorite color is pink.
My hobby is watching movie.
THINGS I LIKE IN MALAYSIA
Malaysia has a multi-ethnic, multicultural, and multilingual society. I like the different cultural events and activities of malaysians. I have visited many places in Malaysia and almost all of them are favourites. I would like to visit Penang Island once again as its my most favourite place in Malaysia.
About Myself
Hi, my name is Nikitha Mira Elango. I am from India. I am studying Diploma in Electrical and Electronics Engineering in UCSI University. My aim is to become a professional engineer.
Subscribe to:
Posts (Atom)
I think the course is already perfect and doesnt need any improvements.
-
I think the course is already perfect and doesnt need any improvements.
-
My native language is Tamil which is spoken in the southern parts of India. TAMIL: என் பெயர் நிகிதா மீரா நான் தற்போது மலேசியாவில் வசிக்...
-
EVOLUTION OF INTERNET: The origins of the Internet date back nearly 40 years, with the U.S. military's funding of a research networ...