Sunday, September 14, 2014

What Is Word Processing & Processer

The process of creating & editing text document is known as word processing.It also includes formatting & printing documents in different ways.Word processing is used by business organizations, government departments and individuals for creating different types of documents.
Word processing is one of the most common applications in computer.More than 90% people using personal computers also use word processing.

Word processing is used for the following purposes:
  • Preparing notes
  • Writing books
  • Writing letters
  • Designing resumes
  • Preparing newspapers, Magazines & Advertisement etc.

Word Processor

Word processor is type of application software.It provides useful tools for creating all kinds of text documents.Word processor can manipulate text.It can also be used to add images, sounds, charts & graphics in documents.word processor can also be used to create documents for publishing on the world wide web,

Advantages Of Word Processor Over Typewriter:

Word processing has many advantages over typewriter.These are as follows:
  • A document can be changed without retyping the entire document
  • A typing mistake can be corrected easily.
  • A paragraph can be deleted without any trace
  • It is easy to insert word, sentence or paragraph in middle of a document
  • word processor can move section of text from one place to another easily
  • The text can be moved within a document or between different documents
  • The text can be duplicated easily without type it again

Wednesday, September 10, 2014

Different Security Threats To Data Security With Solutions To These Threats

Computer security is useed to protect computer system & data.It protects to computer system from damage as well as unauthorized access.Different methods are used to ensure the security of a computer system.
Security Threats:
  1. Intentional threats
  2. Unintentional threats

  1. Intentional threats

A user can intentionally delete important data.The intentional threats may occur for the following reasons:
  • A hacker can delete your data on a computer
  • An angry employee of the organization can delete the dat

2.Unintentional threats

An authorized user of a data may delete or change the sensitive data accidentally 

  • A technical failure of the hardware may damage the data
  • A sudden power failure may also cause data loss
Solutions To Data Threats
1. User Rights: 
2. Passwords
Data is an important and valuable asset of any organization It is more important than hardware.There are different threats to data security.The data can be damaged in two ways:
The unintentional threats to data security are as follows:
The data can be protected using different methods.Some important way to minimize security threats are as follows:
The users must be assigned proper rights to minimize security threats.Every authorized user should not be allowed to change or delete data.The users wuth certain rights may be allowed to delete or modify data after following a step-by-step process.


Sunday, September 7, 2014

Regisitering A Domain With Go Daddy (Video Tutorial)


How To Perchase/Buy A Domain From Go Daddy?

For this purpose,please follow the below steps:
  • Open the browser & type www.Godaddy.com
  • Click on" Search Domain" button 
  • Type the Domain Name who do get (e.g yoursite.com)
  • If your site available then Godaddy say that Good News your site is available and if your site is not available then Go daddy give you suggestions e.g yoursite.net or yoursite.co or yoursite.org and etc.
  • If yoursite Domain name is available and then click on "Continue To Cart" .
  • When you click on continue to cart then go daddy give you three steps namely as Privacy,Options & E-Mail.In 1st step, you select any option but we say that please choose "Privacy Protection".Therefore, your personal information shall save.
  • In the 2nd step, go daddy give you two packages. 1st package is Website Builder + Hosting & 2nd is Hosting.If you are make basic or small business website and select 1st package.If you are web designer & web developer then select 2nd package. If you set a domain name on Blogger & Wordpress & then please not choose in two packages.
  • In 3rd step, If you are get business email on your domain name & choose business email or unlimited business email.It's you@yourdomain.com.If you're not get email for business and select "No Thanks".
  • At last click on " Continue To Cart "
  • When you click on continue to cart and next screen is review screen you can select duration from 1 year to 5 years for domain name (e.g I select 1 year for domain name) and click on " Check Out " 
  • If you're new customer & then click on "Continue" to below on new customer.So, click on new customer.
  • Go Daddy give you a new page and you fill up your correct info (e.g Your Name & Address) and next step is User Name & Password.It is very importan step.  You fill up user name & password carefully.
  • And next step is payment methods.You can pay payment through PayPal,Master & Visa card and Union Pay.When you fill up the boxes & click on " Continue ".
  • And next step is review your order and confirm your purchase and press "Place Your Order".So, your domain name is successfully registered & go to your email inbox. Open email who Go Daddy send on your email address and click on confirmation order.
     Congratulation!


    If you see in details so, please watch the video 




    In the next video tutorial I tell you about how to set domain name on blogger blog.

      Tuesday, September 2, 2014

      Creating a Custom Search Engine in PHP & MySQL (Video Tutorials)

      After so  many projects & video tutorials on PHP & MySQL we released that I work on PHP & MySQL to "Creating Custom Search Engine In PHP".In the previous tutorials learn complete training on PHP & MySQL.I hope that you'll learn PHP.So,Today we'll learn how to make search engine using PHP & MySQL.
      As you know that PHP is a web development programming language


      What will we learn in this tutorial series?
      We shall learn in this course as following as
      • Using PHP to create search engine
      • MySQL using as database
      In the following tutorial we tend to square measure getting to create a PHP search engine with a MySQL database. we tend to square measure building our program on PHP.
      If you're a beginner of PHP then I powerfully advocate you to look at the video. The video can show you step by step guideline of a way to use the ASCII text file. Hope all of you may relish it.
      please follow the instruction given in our video tutorial





      Monday, September 1, 2014

      Complete PHP & MySQL Training For Bigginers (Video Tutorials)


      PHP is a  short form of  "HyperText Preprocessor” formally “Personal Home Page"
      PHP could be a server-side scripting language designed for web development however conjointly used as a general programming language.It is very different and most popular program language to other programming languages like ASP.net and Perl.The most  beautiful and nice thing in learning PHP is; it is open source and free to use.I have brought to you a basic complete PHP video tutorials step by step.

      In this video training, We'll learn how to work with PHP and MySQL.We shall also learn MySQL as a database

      What will learn in this video training series?

      • Introduction
      Database
      • Connecting
      • Getting Results
      • Updating and Deleting
      • Inserting Records
      • Binding
      • Example Application
      • Joins
      Now let’s start watching the course right now: