Browse

Incorporating Technologies

Posted on: #iteachmsu
Monday, Mar 13, 2023
How to take care of work?
How to take care of work?
Authored by: Vijaya
post image
Posted on: #iteachmsu
post image
How to take care of work?
How to take care of work?
Authored by:
Monday, Mar 13, 2023
Posted on: #iteachmsu
Friday, Mar 10, 2023
What is SDLC?
SDLC is a process followed for a software project, within a software organization. It consists of a detailed plan describing how to develop, maintain, replace and alter or enhance specific software. The life cycle defines a methodology for improving the quality of software and the overall development process.
The following figure is a graphical representation of the various stages of a typical SDLC.

A typical Software Development Life Cycle consists of the following stages −
Stage 1: Planning and Requirement Analysis
Requirement analysis is the most important and fundamental stage in SDLC. It is performed by the senior members of the team with inputs from the customer, the sales department, market surveys and domain experts in the industry. This information is then used to plan the basic project approach and to conduct product feasibility study in the economical, operational and technical areas.
Planning for the quality assurance requirements and identification of the risks associated with the project is also done in the planning stage. The outcome of the technical feasibility study is to define the various technical approaches that can be followed to implement the project successfully with minimum risks.
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define and document the product requirements and get them approved from the customer or the market analysts. This is done through an SRS (Software Requirement Specification) document which consists of all the product requirements to be designed and developed during the project life cycle.
Stage 3: Designing the Product Architecture
SRS is the reference for product architects to come out with the best architecture for the product to be developed. Based on the requirements specified in SRS, usually more than one design approach for the product architecture is proposed and documented in a DDS - Design Document Specification.
This DDS is reviewed by all the important stakeholders and based on various parameters as risk assessment, product robustness, design modularity, budget and time constraints, the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along with its communication and data flow representation with the external and third party modules (if any). The internal design of all the modules of the proposed architecture should be clearly defined with the minutest of the details in DDS.
Stage 4: Building or Developing the Product
In this stage of SDLC the actual development starts and the product is built. The programming code is generated as per DDS during this stage. If the design is performed in a detailed and organized manner, code generation can be accomplished without much hassle.
Developers must follow the coding guidelines defined by their organization and programming tools like compilers, interpreters, debuggers, etc. are used to generate the code. Different high level programming languages such as C, C++, Pascal, Java and PHP are used for coding. The programming language is chosen with respect to the type of software being developed.
Stage 5: Testing the Product
This stage is usually a subset of all the stages as in the modern SDLC models, the testing activities are mostly involved in all the stages of SDLC. However, this stage refers to the testing only stage of the product where product defects are reported, tracked, fixed and retested, until the product reaches the quality standards defined in the SRS.
Stage 6: Deployment in the Market and Maintenance
Once the product is tested and ready to be deployed it is released formally in the appropriate market. Sometimes product deployment happens in stages as per the business strategy of that organization. The product may first be released in a limited segment and tested in the real business environment (UAT- User acceptance testing).
Then based on the feedback, the product may be released as it is or with suggested enhancements in the targeting market segment. After the product is released in the market, its maintenance is done for the existing customer base.
Authored by: Vijaya
post image
Posted on: #iteachmsu
Monday, Feb 20, 2023
The diagnostic term attention deficit/hyperactivity disorder
The diagnostic term attention deficit/hyperactivity disorder (ADHD) refers to individuals who display patterns of inattention, impulsivity, and overactive behavior that interfere with daily functioning (American Psychiatric Association [APA], 2013).
Posted by: Chathuri Super admin..
post image
Posted on: #iteachmsu
Tuesday, Aug 16, 2022
Students and Classroom Considerations
The culture of the classroom can either support or create barriers to student success (Piffner,2011). 

Factors that foster attention, positive behavior, and academic and social success includeestablishing positive relationships with students, adopting classroom management techniques,and creating a physical arrangement that facilitates learning.
It is often a positive relationship with one teacher that facilitates school success for a studentwith ADHD (Piffner, 2011). 
When teachers connect with students and appreciate their unique skills and interests, students are more likely to strive for achievement and positively respond to classroom rules and procedures.In creating peer-mediated activities, the teacher may need to choose students whoseskill levels complement each other. Students with and without attention difficulties andimpulsivity should be considered for peer partnerships.
Peer TutoringPeer tutoring is one of the more effective strategies for students with ADHD, because it provides many of the same supports as one-to-one instruction. It facilitates the acquisition of both academic and social skills. 
Peer tutoring is most effective when training is provided to participating students (Piffner, 2011). Tutors need to be taught how to be prepared with materials needed for the session and howto give positive and corrective feedback to their partner (Greenwood & Delquadri,1995).
Cooperative LearningCarefully structured cooperative learning groups in which each student is assigned a role and has clear expectations for desired outcomes are very helpful for students with ADHD. The more
Authored by: Piffner,
post image
Posted on: #iteachmsu
Tuesday, May 10, 2022
Microprocessor - 8085 Architecture
8085 is pronounced as "eighty-eighty-five" microprocessor. It is an 8-bit microprocessor designed by Intel in 1977 using NMOS technology.
It has the following configuration −

8-bit data bus
16-bit address bus, which can address upto 64KB
A 16-bit program counter
A 16-bit stack pointer
Six 8-bit registers arranged in pairs: BC, DE, HL
Requires +5V supply to operate at 3.2 MHZ single phase clock

It is used in washing machines, microwave ovens, mobile phones, etc.
Authored by: komal
post image
Posted on: #iteachmsu
Thursday, Apr 14, 2022
Advanced Excel
The Format pane is a new entry in Excel 2013. It provides advanced formatting options in clean, shiny, new task panes and it is quite handy too.
Step 1 − Click on the Chart.
Step 2 − Select the chart element (e.g., data series, axes, or titles).
Step 3 − Right-click the chart element.
Step 4 − Click Format <chart element>. The new Format pane appears with options that are tailored for the selected chart element.
Format Axis
Step 1 − Select the chart axis.
Step 2 − Right-click the chart axis.
Step 3 − Click Format Axis. The Format Axis task pane appears as shown in the image below.

You can move or resize the task pane by clicking on the Task Pane Options to make working with it easier.

The small icons at the top of the pane are for more options.

Step 4 − Click on Axis Options.

Step 5 − Select the required Axis Options. If you click on a different chart element, you will see that the task pane automatically updates to the new chart element.
Step 6 − Select the Chart Title.

Step 7 − Select the required options for the Title. You can format all the Chart Elements using the Format Task Pane as explained for Format Axis and Format Chart Title.
Provision for Combo Charts
There is a new button for combo charts in Excel 2013.

The following steps will show how to make a combo chart.
Step 1 − Select the Data.
Step 2 − Click on Combo Charts. As you scroll on the available Combo Charts, you will see the live preview of the chart. In addition, Excel displays guidance on the usage of that particular type of Combo Chart as shown in the image given below.

Step 3 − Select a Combo Chart in the way you want the data to be displayed. The Combo Chart will be displayed.
Authored by: Khushi
post image
Posted on: #iteachmsu
Thursday, Mar 31, 2022
Cloud Computing
Cloud Computing provides us means of accessing the applications as utilities over the Internet. It allows us to create, configure, and customize the applications online.
What is Cloud?
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over public and private networks, i.e., WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship management (CRM) execute on cloud.
What is Cloud Computing?
Cloud Computing refers to manipulating, configuring, and accessing the hardware and software resources remotely. It offers online data storage, infrastructure, and application.

Cloud computing offers platform independency, as the software is not required to be installed locally on the PC. Hence, the Cloud Computing is making our business applications mobile and collaborative.
Basic Concepts
There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing:

Deployment Models
Service Models

Deployment Models
Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access: Public, Private, Hybrid, and Community.

Public Cloud
The public cloud allows systems and services to be easily accessible to the general public. Public cloud may be less secure because of its openness.
Private Cloud
The private cloud allows systems and services to be accessible within an organization. It is more secured because of its private nature.
Community Cloud
The community cloud allows systems and services to be accessible by a group of organizations.
Hybrid Cloud
The hybrid cloud is a mixture of public and private cloud, in which the critical activities are performed using private cloud while the non-critical activities are performed using public cloud.
Service Models
Cloud computing is based on service models. These are categorized into three basic service models which are -

Infrastructure-as–a-Service (IaaS)
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)

Anything-as-a-Service (XaaS) is yet another service model, which includes Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-Service.
The Infrastructure-as-a-Service (IaaS) is the most basic level of service. Each of the service models inherit the security and management mechanism from the underlying model, as shown in the following diagram:

Infrastructure-as-a-Service (IaaS)
IaaS provides access to fundamental resources such as physical machines, virtual machines, virtual storage, etc.
Platform-as-a-Service (PaaS)
PaaS provides the runtime environment for applications, development and deployment tools, etc.
Software-as-a-Service (SaaS)
SaaS model allows to use software applications as a service to end-users.
History of Cloud Computing
The concept of Cloud Computing came into existence in the year 1950 with implementation of mainframe computers, accessible via thin/static clients. Since then, cloud computing has been evolved from static clients to dynamic ones and from software to services. The following diagram explains the evolution of cloud computing:

Benefits
Cloud Computing has numerous advantages. Some of them are listed below -


One can access applications as utilities, over the Internet.


One can manipulate and configure the applications online at any time.


It does not require to install a software to access or manipulate cloud application.


Cloud Computing offers online development and deployment tools, programming runtime environment through PaaS model.


Cloud resources are available over the network in a manner that provide platform independent access to any type of clients.


Cloud Computing offers on-demand self-service. The resources can be used without interaction with cloud service provider.


Cloud Computing is highly cost effective because it operates at high efficiency with optimum utilization. It just requires an Internet connection


Cloud Computing offers load balancing that makes it more reliable.



Risks related to Cloud Computing
Although cloud Computing is a promising innovation with various benefits in the world of computing, it comes with risks. Some of them are discussed below:
Security and Privacy
It is the biggest concern about cloud computing. Since data management and infrastructure management in cloud is provided by third-party, it is always a risk to handover the sensitive information to cloud service providers.
Although the cloud computing vendors ensure highly secured password protected accounts, any sign of security breach may result in loss of customers and businesses.
Lock In
It is very difficult for the customers to switch from one Cloud Service Provider (CSP) to another. It results in dependency on a particular CSP for service.
Isolation Failure
This risk involves the failure of isolation mechanism that separates storage, memory, and routing between the different tenants.
Management Interface Compromise
In case of public cloud provider, the customer management interfaces are accessible through the Internet.
Insecure or Incomplete Data Deletion
It is possible that the data requested for deletion may not get deleted. It happens because either of the following reasons


Extra copies of data are stored but are not available at the time of deletion


Disk that stores data of multiple tenants is destroyed.


Characteristics of Cloud Computing
There are four key characteristics of cloud computing. They are shown in the following diagram:

On Demand Self Service
Cloud Computing allows the users to use web services and resources on demand. One can logon to a website at any time and use them.
Broad Network Access
Since cloud computing is completely web based, it can be accessed from anywhere and at any time.
Resource Pooling
Cloud computing allows multiple tenants to share a pool of resources. One can share single physical instance of hardware, database and basic infrastructure.
Rapid Elasticity
It is very easy to scale the resources vertically or horizontally at any time. Scaling of resources means the ability of resources to deal with increasing or decreasing demand.
The resources being used by customers at any given point of time are automatically monitored.
Measured Service
In this service cloud provider controls and monitors all the aspects of cloud service. Resource optimization, billing, and capacity planning etc. depend on it.



 
Authored by: Komal
post image
Posted on: #iteachmsu
Thursday, Mar 31, 2022
Basics of Computer Science
A computer is basically a programmable machine capable to perform arithmetic and logical operations automatically and sequentially. It is also known as a data processor, as it can store, process, and retrieve data as per the wish of the user.

Data processing involves the following three activities −

Input of data
Manipulation/processing of data
Giving output (i.e. management of output result)
In computer system, data is arranged orderly and systematically.

The term “computer” is derived from a Latin term “compute,” which means ‘to calculate.’ Initially, the computer system had been designed to calculate; it was intended to be a computing device. However, over a period of time, this device technically advanced; at present, it can perform a wide range of desirable works apart from data processing.
Major Functions of Computer System
Following are the core functions of a computer system −


A computer accepts the command and/or data as input given by the user.


A computer follows the instructions and stores the data given by the user.


A computer processes the data as per the instructions given by the user.


A computer gives the desirable results in the form of output.


Salient Features of Computer System
Following are the salient features of a Computer System −


Automation − The operating system of a computer system is automatic, as no human intervention is required; simply you need to give the command and then it will do the work automatically.


Speed − Depending upon the power of the computer, it can perform, it can take Millions of instructions per second.


Storage − A computer system can store enormous quantity of data in different format. The storage capacity of a computer system is normally expressed in terms of Kilobytes (KB), Megabytes (MB), Gigabytes (GB), or Terabytes (TB).


Accuracy − The accuracy of a computer system is very high.


Versatility − A computer system is capable of performing a wide range of tasks.


Diligence − A computer neither get tired nor lose concentration.


Reliability − As a computer system always gives accurate result; therefore, its reliability is very high.


Vast memory − A computer system can have a wide range of memory which can recall the desired data at any point of time.


Evolution of Computer System
The present Computer System has evolved after centuries of efforts from different intellectuals who contributed their works during different periods of time.
Abacus is (most likely) considered as the earlier counting device.
Let us now read about the innovators who contributed immensely in the development of a computer system.
John Napier
Napier was a Scottish mathematician who invented logarithms.
Further, Napier also invented a computing device, which consisted of sticks with numbers imprinted on them. Napier named sticks ‘bones,’ as they were made up of bones.
Blaise Pascal
Pascal was a French mathematician who invented a machine based on gear wheels, which helped greatly in calculation.
Charles Babbage
Babbage was an English Polymath, Mathematician, Mechanical Engineer, Philosopher, and Inventor. In 1822, he developed a machine capable to calculate the successive difference of expression and prepared a table which helped him in his calculations.
Lady Ada Lovelace
Lovelace was an English mathematician, who researched on Babbage’s work. She has given the concept that ‘computers can be programmed’. Her work helped a great deal in the advancement of computer system.
John Atanstoff
With the assistance of Berry, John Atanstoff developed the Atanstoff Berry Computer (more popular as ABC) in 1937. It marked the beginning of the development of electronic digital computer.
John Mauchly and Eckart
In 1947, John Mauchly and Eckart developed the first large scale Electronic Digital Computer. It was called the Electronic Numerical Integrator and Calculator (ENIAC).
Maurice V. Wilkes
In 1949, Wilkes (at Cambridge University) designed Electronic Delay Storage Automatic Calculator (EDSAC). It was the first computer that started its operating system on the stored program concept.



 
Authored by: Komal
post image