Posts

Showing posts from December 20, 2020

A letter to the campus head of your university and divert the attention towards the unhygienic food being sold in canteen.

  A letter to the campus head of your university and divert the attention towards the unhygienic food being sold in canteen. The Class Representative, BS (Computer Science) 2 nd Semester, Muhammad Hassan Ali   August 08, 2020   The Director, Gujrat Institute of Management Sciences, Gujrat Pakistan. Muhammad Amir                                           Subject: unhygienic food being sold in canteen Dear Sir, I am writing to you to bring your kind attention towards the fact that most of the food items that are being sold at the canteen are either canned, packed, processed items or fast food. This is seriously affecting the health of the students. Besides, the quality of the food items at times is ignored. Not only our money is wasted but our health is also being affected. Moreover the workers are rude to students. They shout at us and use foul language whenever they get angry. They also do not clean the dustbins and rubbish daily. This is very unhygienic. As a

Resume Writing Example for a Computer Scientist Job

  Make the Resume for the job Computer Scientist in a company? BASIC REQUIREMENTS: All applicants must have a bachelor's degree in Computer Science. Must able to Perform system and network procurement, installation, administration and security Able to develop and use basic computing environments for analysis Skilled person who can stay current with major new advances in relevant technology-related topics; provides guidance on tools and methods related to these advances Must able to Coordinate with private sector and other divisions to resolve technical and other relevant issues                                                         Muhammad Hasnain Town Sultanabad Street# 66, Gujrat, India Cell: (+92) 7833643 Email: mh0000@gmail.com Professional Achievement Quality-focused Software Specialist specializing in front end development. Experienced with all stages of development cycle for dynamic customer projects. Well-versed in several

Write down about at least three companies which were the victim of Computer or Internet crime.

Image
  Write down about at least three companies which were the victim of Computer or Internet crime. Apple Company:   Apple's iPhones enjoy a reputation for being ultra-secure and hard to hack, so most cybercriminals don't bother trying. However, you shouldn't think of your iPhone as a device that's totally safe from hackers. In February, a team of researchers at Google alerted Apple to vulnerabilities that persisted for two years and allowed hackers to embed malware on iPhones after people visited particular websites. What Happened? Even though researchers at Google found these issues months ago and reported them to Apple at that time, the team  only recently went public  with the discoveries. They revealed five so-called exploit chains that link security vulnerabilities together and allow hackers to get through each layer of the security protections built into an operating system. The exploit chains took advantage of 14 total security flaws that allowed cybercrimina