Introduction to Computer Science by Max Hailperin, Nguyen Kim Anh, Adrienne Watt PDF free download

Max Hailperin, Nguyen Kim Anh, Adrienne Watt Introduction to Computer Science PDF, was published in 2017 and uploaded for 100-level Science and Technology students of Modibbo Adama University of Technology (MAUTECH), offering CS101 course. This ebook can be downloaded for FREE online on this page.

Introduction to Computer Science ebook can be used to learn Storage System, Operating system, Word Processing, SpreadSheet, Database Management System, Computer Communication, Internet, network, Computer Security Vulnerability, Threat, Control.

Technical Details
Updated at:
Size: 7.16 MB
Number of points needed for download: 19
Number of downloads: 4

Books related to Introduction to Computer Science

Database Systems, 6th edition

Author: Thomas Connolly, Carolyn Begg

School: Edo University

Department: Science and Technology

Course Code: CMP222, CMP214

Topics: Database Systems, database environment, database languages, data definition language, data models conceptual modeling, database architectures, Multi-user DBMS Architectures, teleprocessing, Distributed DBMSs, data warehousing, cloud computing, Oracle Architecture, relational models, relational calculus, SQL, writing SQL commands, data manipulation, advanced SQL, object-relational DBMs, Database System Development Lifecycle, database analysis, database design, database planning, Entity–Relationship Modeling, Enhanced Entity–Relationship Modeling, normalization, Data Redundancy, Advanced Normalization, database security, data administration, database administration, concurrency control, database recovery, query processing, query optimization, distributed DBMs, Distributed Transaction Management, Distributed Concurrency Control, Distributed Deadlock Management, Distributed Database Recovery, data replication, data Replication Architecture, data Replication Schemes, object oriented DBMs, Scripting Languages, web, Common Gateway Interface, HTTP cookies, Microsoft’s Web Platform, JAVA, Oracle Internet Platform, Semi structured Data, XML, XML schema, XML Query Languages, Data Warehouse Architecture, Data Warehousing Tools, Data Warehousing Technologies, Data Warehousing Using Oracle, data mart, Data Warehousing Design, Online Analytical Processing, data mining, oracle data mining

Types and Analysis of Security Threats

Author: Monsuru Adegboyega Kasali

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS244

Topics: Security Threat, Manmade Threats, Information Warfare, Geological Security Threat, Geological Security Threat Hazard, Climatic Security Threat, Climatic Security Hazard, Environmental Security Threat, Environmental Security hazard, Threat Mitigation, risk, Vulnerability, Capacity Assessment, Crime Analysis, Crime Mitigation, Data Mining, Automated Data Analysis, Crime Management

Guide to Computer Network Security, 4th edition

Author: Joseph Migga Kizza

School: University of Ilorin

Department: Engineering

Course Code: ICS308, TCS407, TCS408

Topics: computer network, computer network security, security threats, Computer Network Vulnerabilities, cyber crimes, hackers, scripting, web workers, security assessment, security analysis, security assurance, disaster management, access control, authorization, authentication, cryptography, firewall, intrusion detection, intrusion prevention, computer forensics, network forensics, virus filtering, content filtering, computer network security protocol, wireless networks, wireless devices, sensor network, Virtualization Technology, Virtualization security, cloud computing, cloud computing security, mobile systems, Internet of Things

Fundamentals of Database Management Systems ,2nd Edition

Author: Mark Gillenson

School: Modibbo Adama University of Technology

Department: Engineering

Course Code: TT301, TT304

Topics: DATA MODELING, data, DATABASE MANAGEMENT SYSTEM, Relational Data Retrieval, Relational Database Model, Logical Database Design, Physical Database Design, Object-Oriented Database Management, Data Administration, Database Administration, Data Dictionaries, Database Control Issues, Security, Backup, Recovery, Concurrency, Client Database, Server Database, Distributed Database, Data Warehouse

Operating System Concepts, 10th edition

Author: Abraham Silberschatz, Greg Gagne, Peter Galvin

School: Edo University

Department: Science and Technology

Course Code: CSC212

Topics: Operating System, Computer-System Organization, Computer-System Architecture, Operating-System Operations, Operating-System Structures, Operating-System Services, user interface, operating system interface, distributed systems, kernel data structures, Operating-System Debugging, process management, process scheduling, interprocess communication, Multicore Programming, Multithreading Models, Implicit Threading, CPU Scheduling, Multi-Processor Scheduling, Real-Time CPU Scheduling, Algorithm Evaluation, process synchronization, POSIX Synchronization, dead locks, memory management, Contiguous Memory Allocation, virtual memory, storage management, HDD Scheduling, NVM Scheduling, error detection, storage device management, RAID structure, file system, file-system interface, file-system implementation, file-system structure, file-system operations, directory implementation, Free-Space Management, File-System Internals, File-System Mounting, file sharing, virtual file systems, remote file systems, security, program threats, Cryptography, Role-Based Access Control, access matrix, virtual machines, networks, Distributed File Systems, remote file access, Linux system, Kernel Modules, programmer interface

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Database System Concepts ,7th edition

Author: Abraham Silberschatz, Henry Korth, S Sudarshan

School: Modibbo Adama University of Technology

Department: Engineering

Course Code: TT301, TT304

Topics: Relational Model, Intermediate SQL, SQL, Advanced SQL, Database Design, E-R Model, Relational Database Design, database design, Complex Data Types, Data Analytics, big data, Physical Storage Systems, Data Storage Structures, Indexing, big data analytics, storage management, Query Processing, Query Optimization, Transactions, Transaction management, Concurrency Control, Recovery System, Database System Architectures, Parallel Storage, Distributed Storage, Parallel database, Distributed database, Parallel Query Processing, Distributed Query Processing, Parallel Transaction Processing, Distributed Transaction Processing, Advanced Indexing Techniques, Indexing Techniques, Blockchain Databases

Computer Network and Internet

Author: GA Aderounmu

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: MBF845

Topics: Computer Network, Internet, Transmission Media, Data Communication Interfaces, Multiplexing, Error Detection, Error Control, Medium Access Control, Internetworking, Routing, Network Congestion, Network Security, World Wide Web

Database Systems A Practical Approach to Design, Implementation, and Management ,6th edition

Author: Thomas Connolly, Caroline Begg

School: Modibbo Adama University of Technology

Department: Engineering

Course Code: TT301, TT304

Topics: Database Environment, Database Architecture, Relational Model, Relational languages, Relational Algebra, Relational Calculus, Data Manipulation, Data Definition, Advanced SQL, SQL, Object-Relational DBMSs, Database Analysis, Database Design, Database System Development Lifecycle, Entity–Relationship Modeling, Enhanced Entity–Relationship Modeling, Normalization, Advanced Normalization, Conceptual Database Design, Logical Database Design, Physical Database Design, Database Issues, Data Management, Transaction Management, Query Processing, Distributed DBMSs, Replication, Mobile Databases, Object-Oriented DBMS, Object DBMSs, Web Technology, Semistructured Data, Business Intelligence, Data Warehousing, Data Warehousing Design, OLAP, Data mining

Data Communications and Networking ,4th edition

Author: Behrouz Forouzan, Sophia Chung Fegan

School: National Open University of Nigeria

Department: Science and Technology

Course Code: CIT891

Topics: Data Communications, Networking, data, signals, digital transmission, analog transmission, bandwidth utilization, transmission media, switching, data link layer, error detection, error correction, data link control, multiple access, wireless LAN, ethernet, SONET, SDH, virtual-circuit networks, frame relay, network layer, logical addressing, internet protocol, address mapping, error reporting, multicasting, transport layer, domain name system, remote logging, electronic mail, file transfer, HTTP, network management, SNMP, multimedia, cryptography, network security

CSC222

Author: Uddin Osemengbe

School: Edo University

Department: Science and Technology

Course Code: DATABASE DESIGN AND MANAGEMENT SYSTEMS

Topics: Database management system, database model

Computer networks and security

Author: CPE FUOYE

School: Federal University, Oye-Ekiti

Department: Engineering

Course Code: CPE101

Topics: Computer networks, computer security, Personal Area Network, local area network, Campus Area Network, Metropolitan Area Network, internetwork, intranet, extranet, internet, Network Interface Cards, router, malware, computer virus, trojan horses, logic bombs, spyware, worms, firewall, anti-virus

Information Security Principles and Practice, 2nd Edition

Author: Mark Stamp

School: Edo University

Department: Science and Technology

Course Code: CMP318

Topics: information security, cryptography, access control, crypto, Codebook Cipher, Symmetric Key Crypto, block ciphers, Public Key Crypto, Elliptic Curve Cryptography, public key notation, Public Key Infrastructure, has functions, Advanced Cryptanalysis, Engima, Enigma Cipher Machine, authentication, biometrics, authorization, Access Control Matrix, Multilevel Security Models, firewalls, Intrusion Detection Systems, Simple Authentication Protocols, Authentication Protocols, Real-World Security Protocols, software flaws, malware, botnet, Digital Rights Management, Operating Systems, Operating Systems functions, Trusted Operating System

Computer and applications material

Author: CSC FUTO

School: Federal University of Technology, Owerri

Department: Science and Technology

Course Code: CSC201

Topics: computer hardware, computer software, command prompt, operating system, computer network, computer memory, number system, flowchart, BASIC programming, FORTRAN programming, internet, database system, expert system

Contemporary security studies ,3rd edition

Author: Alan collins

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS381

Topics: realism, liberalism, historical materialism, peace studies, security studies, critical security studies, social constructivism, human security, gender and security, securitization, Military security, regime security, societal security, environmental security, economic security, globalization, development, security, traditional security, non-traditional security, coercive diplomacy, weapons of mass destruction, terrorism, humanitarion intervention, energy security, defence trade, health and security, transnational crime, cyber-security, child soldiers

Contemporary Security Studies, Third Edition

Author: Alan Collins

School: Obafemi Awolowo University

Department: Administration, Social and Management science

Course Code: IRS208

Topics: Contemporary Security Studies, realism, liberalism, historical materialism, peace studies, critical security studies, social constructivism, human security, gender, security, securitization, military security, regime security, societal security, environmental security, economic security, globalization, development, security, traditional security, non-traditional security, coercive diplomacy, weapons of mass destruction, terrorism, humanitarian intervention, energy security, defence trade, health and security, transnational crime, cyber security, child soldiers

Effective Security Management ,Seventh Edition

Author: Charles Sennewald, Curtis Baillie

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS245, CSS744

Topics: security management, Organizational structure, security director’s role, security supervisor’s role, individual security employee, Ethics, conflicts of interest, Security personnel management, Hiring security personnel, Discipline, Promotions, Communication, Operational management, Planning, budgeting, Program management, Problem solving, risk, Crisis management, security survey, International security standards, Office administration, Written policies, Written procedures, effective security management, security management tool, security management, Community relations, Mismanagement, Jackass management traits

Introduction to information theory and applications

Author: CODeL

School: Federal University of Technology, Minna

Department: Science and Technology

Course Code: CIT111, CPT111

Topics: von neuman, data, information, information processing, generations of computer, classifications of computer, number system, computer language, database, communication system, transmission impairment, analog signal, digital signal, Signal Modulation, Signal to Noise Ratio, data encoding, data decoding, transmission media, communication technique, computer network, internet

Applications of Computer in Business

Author: Gerald Okeke

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: SMS208, CIT202

Topics: computer applications, computer hardware, computer software, computer operations, operating systems, Computer Application Systems, Database Management System, Systems Development Life Cycle, computer networks, internet, computer security, Information Communication Technology, Processing Devices, storage, input Devices output Devices

Upgrading and Repairing PCs, 22nd Edition

Author: Scott Mueller

School: Edo University

Department: Science and Technology

Course Code: CMP317

Topics: electronic computers, computer components, Microprocessor, address bus, Processor Manufacturing, Intel processors, AMD processors, Processor Cooling, over clocking, motherboards, chipsets, BIOS, Motherboard ROM BIOS, ROM hardware, memory, ROM, DRAM, memory standards, memory modules, RAM upgrades, magnetic storage, Flash Memory Devices, removable storage, Solid-State Drives, USB Flash Drives, optical storage, optical technology, DVD, video hardware, Video Display Interfaces, monitors, audio hardware, speaker, microphone, input devices, keyboard, Touchscreen Technology, Internet Connectivity, Local Area Networking, Network Protocols, power supply, Power-Protection Systems, computer System Components, computer diagnostics, boot process

Past Questions related to Introduction to Computer Science

Enterprise and Perimeter Security

Year: 2021

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB206

Topics: Active network attacks, cloud computing, passive network attacks, network security, Enterprise Security, Perimeter Security

Information security policy

Year: 2021

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB208

Topics: Cyber security consultant, chief information Security officer, Nigeria Data Protection Regulation, General Data Protection Regulation, information Security projects, information Security Policy

Introduction to Computer Science E Test Questions and solution By Sir Lake

Year: 2019

School: Federal University of Technology, Owerri

Department: Science and Technology

Course Code: CPT111

Topics: database management, Generations of computer, data, operating system

COMPUTER AND APPLICATIONS 1-TEST&EXAM

Year: 2019

School: Federal University of Technology, Owerri

Department: Science and Technology

Course Code: CSC201

Topics: cache, EEPROM, APROM, PROM, ELPROM, EXCEL, binary, UNIX, MS Word, QBasic, MS Word, Router, RAM, ASCII

OPERATING SYSTEMS 1

Year: 2019

School: Federal University of Technology, Owerri

Department: Science and Technology

Course Code: CSC307

Topics: memory management, device manager, operating system, multitasking, multiprocessing, parallel processing, buffering, spooling, service pack

Introduction to Computer Science Possible question and answers by Ndukwe chimezirim Joseph

Year: 2019

School: University of Nigeria, Nsukka

Department: Science and Technology

Course Code: COS101

Topics: Algorithm, history of computer, Network, Algorithm design, data design, BASIC, computer, JAVA, Memory, operating system, optical disk

Data communications

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: COE513

Topics: Data communication, fibre optic cable, communication protocol, ping signal, TCP sliding window, packet tracer, NVRAM, data communication network, packer-switching, TRACERT, switches, routers, LAN topologies, circuit switching, packet switching, IP address, MAC address, backbone network, dedicated virtual private network, asymmetrical internet access, symmetrical internet access, broadband access

Psychometric Success Verbal Ability - Comprehension,Critical Reasoning,Spelling,Word Meaning,Word Relationship Practice Tests 1

Year: 2012

School: Scholarships

Department:

Course Code: VERBAL ABILITY

Topics: Comprehension, Critical Reasoning, Spelling, Word Meaning, Word Relationship

Introduction to Computer Science 1 study questions

Year: 2017

School: University of Ilorin

Department: Science and Technology

Course Code: CSC111

Topics: data, information, storage device, memory, flowchart, pseudo code, number system, boolean algebra, Karnaugh map, logic gate, operating system, system software, application software

FSB Scholarship Question and Answer on Computer, Internet, IT and Telecom

Year: 2019

School: Scholarships

Department:

Course Code: FSB

Topics: Computer, Internet, Information Technology

Basic Question and Answer on Computer, Internet and Information Technology For MTN by mypastquestion

Year: 2019

School: Scholarships

Department:

Course Code: MTN

Topics: Computer, Internet, Information Technology

Communication engineering studio 2

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: COE503

Topics: Communication engineering studio, intercom system, side tone connection, communication process, transmission media, communication setup, communication system software, honey spot, service denial, eavesdropping, spoof, information leakage, data lose, hardware failure, telephone system, full duplex communications, wireless communication, telephone system side tone connection, communication systems software, information protection strategies, Antenna, Antenna radiation patterns, optical fiber, Friis transmission formula, communication systems security, communication systems protection

Optical fiber transmission

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: COE505

Topics: Optical fiber transmission, cladding, optical fiber, single mode fiber, rise time budgeting, power budgeting, single mode fiber optic communication link, fiber optic network regeneration amplifier, fiber optic network optical amplifier, fiber optic communication link, fiber optic network active coupler, fiber optic network passive coupler, switching communication network

Introduction to computer science 2007-2017

Year: 2017

School: Nnamdi Azikiwe University

Department: Science and Technology

Course Code: CSC101

Topics: Computer science, BASIC programming, binary system, logic gate, flow chart, compilers, storage device, input device, memory, number system, CPU, computer generation

Tests related to Introduction to Computer Science

Biology (JAMB)

School: WAEC, JAMB & POST UTME

Department:

Course Code: JAMB

Topics: JAMB, UTME, biology, Plant cell, fern, plant biology, nutrition, circulatory system, osmoregulation, ecology, variation, hereditary, gene, chromosome, evolution

Mathematics (JAMB)

School: WAEC, JAMB & POST UTME

Department:

Course Code: JAMB

Topics: Mathematics, JAMB, Logarithm, standard form, permutation, combination, number system, set, ratio, indices, factorization, inequality