Cascading Style Sheets (CSS)
Used to specify the presentation
of elements separately from the
structure of the document
PHP, or PHP: Hypertext Preprocessor,
has become one of the most popular
server-side scripting languages for
creating dynamic web pages.
PHP is open source and platform
for all major UNIX, Linux
MARKUP LANGUAGE (XHTML)
What Is XHTML?
XHTML stands for EXtensible
HyperText Markup Language
XHTML is almost identical to HTML
XHTML is a stricter and cleaner
version of HTML
XHTML is HTML defined as an XML
Chapter 4 - NETWORK
Forensic Computer SFR2083
Network forensics is the capturing, recording,
and analysis of network events in order to
discover the source of security attacks.
Capturing network traffic over a network is simple
In this chapter you will learn:
Relational database concepts.
To use Structured Query Language
(SQL) to retrieve data from and
manipulate data in a database.
To install and configure MySQL.
To create a MySQL database.
Chapter 3 - Disk
Forensic Computer SFR 2083
To extract data from computers, the person in
charge must carefully understand the basic
principles of how and where data can be
stored in a computer.
The forensic science of using the pro
Chapter 2 - Collecting and Preserving Digital
Computer Forensic - TCF2033
Evidence is fragile and can easily be destroyed by
something as simple as the normal operation of the
History of the Internet
and World Wide Web
Implemented in late 1960 s by ARPA
(Advanced Research Projects Agency of DOD)
Networked computer systems of a dozen
universities and institutions with 56KB
Chapter 5 - Security, Management And
Forensic Computer - SFR2083
Responding to Hacker Incidents
Hacker incidents require a somewhat different response
than do virus incidents.
Some hackers are highly skilled, employ sophisticated
Special Topics / Issues
Definitions and Concepts
Electronic Commerce (EC)
The process of buying, selling, or exchanging
products, services, or information via computer networks
A broader definition of EC that in
Chapter 1 - Introduction to Computer
Lecturer : Dr. Asif Iqbal
Electronic evidence and information gathering have
become central issues in an increasing number of
conflicts and crimes.
A web server responds to client requests (typically
from a web browser) by providing resources such as
XHTML documents. When users enter a Uniform Resource
Locator (URL) address, such as www.deitel.com, into a
Consumer Behaviour Final: Attitudes
The Kuala Lumpur City Council is planning an advertising campaign that encourages
people to switch from private cars to public transport like buses, the light rail transit
and the mass rapid transit. Give examples of ho
INTRODUCTION TO MULTIMEDIA
Bachelor Sc. ICT (Multimedia), MSU; Master Sc. in IT ,UiTM
INTRODUCTION TO IT
IN THIS CHAPTER YOU WILL LEARN HOW TO:
Define common multimedi
1.1 UNDERLYING ISSUES
HAM-RPM is a dialogue system which converses with a human partner in colloquial
German about limited, but interchangeable scenes.
Recently, much AI research even in non-linguistic areas has been seeking contact with
Describe Direct Manipulation and Natural Language Dialogue giving advantages and
disadvantages of each?
Direct manipulation dialogues- Direct manipulation involves selecting and moving objects
presented on a display screen, changing their physical charact
A keyboard is the set of typewriter-like keys that enables you to enter data into a computer.
Computer keyboards are similar to electric-typewriter keyboards but contain additional keys.
The keys on computer keyboards are often classified as fo
An LED display is a flat panel display, which uses light-emitting diodes as a video display. An
LED panel is a small display, or a component of a larger display. They are typically used
outdoors in store signs and billboards, and in recent years have
MIDLANDS STATE UNIVERSITY
Systems Analysis Design
24 March 2015
MIDLANDS STATE UNIVERSITY
Evelyn Chipangura (MIG001)
System Analysis Design
3 February 2015
COMPUTER FORENSIC II CCF10203
CHAPTER /TOPIC: Topics on E-mail Investigation
1. All questions MUST be answer with relevant justification.
2. Each student is required to submit written report not more than ONE (1) page for
Computer Forensics Tools
Computer Forensic Tools
Tools are used to analyze digital data
& prove or disprove criminal activity
Used in 2 of the 3 Phases of Computer
Acquisition Images systems & gathers
Chap 2: Data
Management & Science University
What is Data Recovery?
How can it be used?
Private vs. Government services
Software vs. Hardware Solutions
What can you do?
Management & Sci
COMPUTER FORENSIC 11
TCF0033 COMPUTER FORENSIC II
Chapter 1: Overview Of
Hardware And Operating
TCF0033 COMPUTER FORENSIC II
Software Reverse Engineering
What is Reverse Engineering?
Reverse engineering (RE) is the process of
extracting the knowledge or design blueprints
from anything man made.
The difference between RE and scientific research
is that with RE the artif
Write a complete Java code to produce the following Output 1.Use 3 panels and
layout manager: BorderLayout() and GridLayout()
public class p
LAB EXERCISE 2
This assignment is to achieve CO:
1. write simple Java program using the fundamental components and control structures
Lab exercise OOP 2
Inheritance and polymorphism
Create a class named Box with default instance variables as shown below:
private int width= 10;
private int height= 10;
private int depth= 10;
In the class Box, create a default constructor and a construc