Computers & IT (Non-Engg)

Get insights from 29.4k questions on Computers & IT (Non-Engg), answered by students, alumni, and experts. You may also ask and answer any question you like about Computers & IT (Non-Engg)

Follow Ask Question
29.4k

Questions

8

Discussions

154

Active Users

116.2k

Followers

New answer posted

8 years ago

0 Follower 68 Views

P
Puneesh Rawat

Contributor-Level 6

CATIA job are at plenty in Hyderabad, India. You can give try at manufacturing hubs like Pune, Bangalore also. Very good chances are there if you mail your CV to some companies at these places. Very nice growth would also be there. Don't hesitate to work in small companies initially. You need to take small steps to reach high goals. Whatever the field you are going to choose, it is very much essential to have working knowledge of mechanical design softwares like Autocad, Pro-E, Catia, Solid works, Solid edge and unigraphics. Learn all the software related to design of mechanical engineering. Then only you can compare them and find out
...more

New answer posted

8 years ago

0 Follower 67 Views

G
Garvit Kumar

Contributor-Level 9

BCAT is an entrance exam for admission into the MCA program at Bharati Vidyapeeth Deemed University (BVDU), Pune. The course has a full regular duration of three years and this exam also allows lateral entry into the second year of MCA at the same university.
The eligibility for the exam is a minimum of 50% at graduation level with maths as a subject in graduation or in 12th.
For the lateral entry one needs to be a pass out with at least 50% in BCA/BE/B.Tech/B.Sc IT, with the same maths at 12th level.
For the preparation of the exam one needs to prepare on the basis that this is a multiple choice exam paper with 200 questions. An advantag
...more

New answer posted

8 years ago

0 Follower 65 Views

P
Piyush Rawat

Contributor-Level 10

Pre-requisites for admission to Karnataka State open university MCA
Admission is open to those candidates who have successfully completed their Graduation in any discipline from a recognized University with Mathematics in 10+2
OR
Admission is open to those candidates who have successfully completed their Graduation in any discipline from a recognized University have completed their 6 moths IT/CS Course from a recognized Institute.
Lateral Entry Scheme:
Admission to Third Semester:
Admission is open to those candidates who have successfully completed their Graduation in any discipline from a recognized along with 1 year PGDCA/PGDIT/GNIIT or
...more

New answer posted

8 years ago

0 Follower 56 Views

Shiksha Ask & Answer
Rishi Broto Chakraborty

Guide-Level 15

Hello,
I cannot predict whether the company will grant you an internship or not, but I can surely say that they will surely lodge a complaint against you and in no time, you will have the cops chasing you. To be an intern in a company, you need to respect the company's effort, the pain taken by the company owners to establish it, and its culture. Hacking into the company's website to seek an internship shows that you disrespect the company, threatening them to provide you a certain advantage and in this case, you are more likely to receive no as an answer even though how deserving you are.
Further, no company is interested in hiring hack
...more

New answer posted

8 years ago

0 Follower 110 Views

Shiksha Ask & Answer
Rishi Broto Chakraborty

Guide-Level 15

Hello,
You should not get too fascinated with ethical hacker as they show in movies. Most of the institutes provide just a basic fancy certification course under the name of ethical hacking, just to attract students and earn more.
I would rather recommend you to go for security specialist professionals. These jobs are highly payable and in high demand as most companies need them to protect their own data.
You can go to some reputed computer training institutes like NIIT, etc. You can go for Java courses followed by networking courses and CCNA/ CCNB (CISCO) courses. After this, you can also option for CEH (Certified Ethical Hacker) certifi
...more

New answer posted

8 years ago

0 Follower 56 Views

Shiksha Ask & Answer
Siddharth BhardwajQuantitative Analyst (Credit Risk)

Guide-Level 14

Hello,
There are more than 100s of fully operational IT companies in Delhi-NCR which makes Delhi-NCR an attractive place to all computer science and IT students. The list is quite large, so I am presenting some of the best/big/great/titan/giant.
(1) Google India (Gurugram): There is no need to much explain about this company. Google India is located at the heart of Gurugram, which is also known as cyber city. It's a good place to work for those who are working as software engineers and in web development.
(2) HCL India Ltd. (In Noida Sec -125): The brand name among IT and Tech companies. The good place to work for those who are looking f
...more

New answer posted

8 years ago

0 Follower 58 Views

Shiksha Ask & Answer
Siddharth BhardwajQuantitative Analyst (Credit Risk)

Guide-Level 14

Hello!
The demand for project management professionals is gradually increasing with every passing day. Project management is now generally considered a critical business skill. By some estimates, over 60% of business is conducted in the form of projects. And yet, a lot of projects in both the public and private sectors are persistently late and over budget. The foremost objective to learn this course is to understand the essential ingredients of project success roles, responsibilities, organization, team work, and processes. This is the reason why this course is in great demand nowadays. The benefits to pursue this course is that from
...more

New question posted

8 years ago

0 Follower 18 Views

New answer posted

8 years ago

0 Follower 140 Views

Shiksha Ask & Answer
Prerit KohliI'm creative, passionate and hard working

Contributor-Level 10

Hello,
IT Security or Cyber Security is t e set of tools, knowledge and technology that is used to protect and guard systems and information from attack or from being hacked. Ethical hacking is one of the tool set used to test how secure the network is and is generally employed by the enterprise. In this with all the current functionality ethical hackers try to control the network to test if there is any flaws in the system, and later fix them.
There are many courses available for the same. Ethical Hacker tries to get into the network without using any organisation power and passwords. They detect if any foreign element can use the syst
...more

New answer posted

8 years ago

0 Follower 50 Views

Shiksha Ask & Answer
Prerit KohliI'm creative, passionate and hard working

Contributor-Level 10

Hello,
There are particularly two aspects, one when you look from the normal consumer point of view other from the company/industry point of view.
When we say of technology, no technology will be thrown away its just the tools will become much more advanced and powerful.
These cloud services have the back end supported by lots of codes and programming languages. For example if one needs to create a PaaS (Platform as a Service) to simplify a SQL database, then the system is most likely to be made with the help of Mongo. The value of the PaaS is that some of the common DB Administration tasks and System Administration tasks will be absorbed
...more

Get authentic answers from experts, students and alumni that you won't find anywhere else

Sign Up on Shiksha

On Shiksha, get access to

  • 66k Colleges
  • 1.2k Exams
  • 690k Reviews
  • 1850k Answers

Share Your College Life Experience

×

This website uses Cookies and related technologies for the site to function correctly and securely, improve & personalise your browsing experience, analyse traffic, and support our marketing efforts and serve the Core Purpose. By continuing to browse the site, you agree to Privacy Policy and Cookie Policy.