You are on page 1of 23

COMPUTER NOTES

Data warehousing is a method of organizing and compiling data into one database,
whereas data mining deals with fetching important data from databases. Data
mining attempts to depict meaningful patterns through a dependency on the data
that is compiled in the data warehouse.

(Data warehouse process)

a database is used to store current transactions in a business process that is called


online transaction processing

FEATURES OF DATA WAREHOUSES:

1. Subject Oriented:
2. Integrated:
3. Time-Variant:
4. Nonvolatile:
APPLICATIONS OF DATA WAREHOUSES:

1. Consumer goods
2. Banking services
3. Financial services
4. Manufacturing
5. Retail sectors
DATA MINING:
Data mining uses statistics, artificial intelligence, machine learning systems, and
some databases to find hidden patterns in the data. It supports business-related
queries that are time-consuming to resolve.

ADVANTAGES OF DATA MINING:


1. Fraud Detection:-It is used to find which insurance claims, phone calls, debit
or credit purchases are fraud.
2. Trend Analysis:-Existing marketplace trends are analyzed,which provides a
strategic benefit as it helps in reduction of costs, as in manufacturing per
demand.
3. Market Analysis:-It can predict the market and therefore help to make
business decisions. For example: it can identify a target market for a retailer,
or certain types of products desired by types of customers.

DATA MINING TECHNIQUES:


Classification:
It is used to fetch the appropriate information from the dataset and to segregate
different classes that are present in the dataset. Below are the classification
models.
1. K-nearest neighbors
2. Support Vector Machine
3. Gaussian Naïve Bayes, etc.

Clustering:
It is used to find similarities in data by putting related data together and helping to
identify different variations in the dataset. It helps to find hidden patterns. An
example of clustering is text mining, medical diagnostics, etc.
Association Rules:
They are used to identify a connection of two or more items. For example, if-then
scenarios of items that are frequently purchased in tandem in a grocery store can
calculate the proportion of items that are bought by customers together. Lift,
confidence, and support are techniques used in association rules.
Outlier Detection:
It is used to identify patterns that do not match the normal behavior in the data, as
the outlier deviates from the rest of the data points. It helps in fraud detection,
intrusion, etc. Boxplot and z-score are ways to detect outliers
What exactly is big data?
This is also known as the three Vs.Put simply, big data is larger, more complex data
sets, especially from new data sources.

The three Vs of big data


Volume The amount of data matters. With big data, you’ll have to process high
volumes of low-density, unstructured data. This can be data of unknown
value, may be hundreds of petabytes.

Velocity Velocity is the fast rate at which data is received and (perhaps) acted on.
Normally, the highest velocity of data streams directly into memory
versus being written to disk.

Variety Variety refers to the many types of data that are available. Traditional
data types were structured and fit neatly in a relational database. With
the rise of big data, data comes in new unstructured data types.
Unstructured and semistructured data types, such as text, audio, and
video, require additional preprocessing to derive meaning and support
metadata.

The value—and truth—of big data


Two more Vs value and veracity. Data has intrinsic value.
Today, big data has become capital.Recent technological breakthroughs have
exponentially reduced the cost of data storage and compute, making it easier and
less expensive to store more data than ever before.

The history of big data


go back to the 1960s and ‘70s when the world of data was just getting started with
the first data.
Around 2005, people began to realize just how much data users generated.Hadoop
(an open-source framework created specifically to store and analyze big data sets)
was developed that same year.The development of open-source frameworks, such
as Hadoop (and more recently, Spark) Cloud computing has expanded big data
possibilities even further, And graph databases are becoming increasingly
important as well, with their ability to display massive amounts of data in a way that
makes analytics fast and comprehensive.

Big data use cases

Product Companies like Netflix and Procter & Gamble use big data to anticipate
development customer demand.
Predictive Factors that can predict mechanical failures may be deeply buried in
maintenance structured data, such as the year, make, and model of equipment, as well as
in unstructured data that covers millions of log entries, sensor data.By
analyzing these indications of potential issues before the problems happen.

Customer
experience

Fraud and Big data helps you identify patterns in data that indicate fraud and aggregate
compliance large volumes of information to make regulatory reporting much faster.

Machine The availability of big data to train machine learning models makes that
learning possible.

Operational With big data, you can analyze and assess production, customer feedback and
efficiency returns, and other factors to reduce outages and anticipate future demands.

Drive Big data can help you innovate by studying interdependencies among
innovation humans, institutions, entities, and process and then determining new ways to
use those data insights.

Data analytics: Key concepts

There are four key types of data analytics:-


1. Descriptive analytics tell us what happened.
2. Diagnostic analytics tell us why something happened.
3. Predictive analytics tell us what will likely happen in the future.
4. Prescriptive analytics tell us how to act.

Data analytics skills

Data analytics requires a wide range of skills to be performed effectively. these are
the top in-demand data science skills:-
 Structured Query Language (SQL), a programming language commonly used for
databases
 Statistical programming languages, such as R and Python, commonly used to create
advanced data analysis programs
 Machine learning, a branch of artificial intelligence that involves using algorithms to
spot data patterns
 Probability and statistics, in order to better analyze and interpret data trends
 Data management, or the practices around collecting, organizing and storing data
 Data visualization, or the ability to use charts and graphs to tell a story with data
 Econometrics, or the ability to use data trends to create mathematical models that
forecast future trends based

Difference between centralization and decentralization in the following table.

Decentralization Centralization

Definition

Decision-making capabilities delegated across Decision-making capability rests with the


multiple levels top management

Flow of Information

Open and free Vertical

Ideal for

Decentralization is ideal for large-sized Centralization is ideal for small-sized


organizations organizations

Decision-making speed

Significantly faster Comparatively slow

People Involved
In decentralization, a higher number of people In centralization, only a few handpicked
from each level are involved in the decision- people are involved in the decision-
making process making process

Employee Motivation

Highly motivated employee Demotivated employee

Conflict in Decision

Most likely to occur Least likely to occur

Burden

The burden gets shared among many levels Only one group is carrying the burden

Stability

Prone to instability due to multiple conflicting Relatively stable as decisions are made
decisions by a central authority sharing a common
ideology

How is data transmitted over long distances?:-


Transmission over Long Distances (< 4000 feet)

Because multiconductor cable is expensive, bit-serial transmission is almost always


used when the distance exceeds 20 feet. In either a simple extension cable or a LAN,
a balanced electrical system is used for transmitting digital data through the channel

Data transmission refers to the process of transferring data between two or more


digital devices. Data is transmitted from one device to another in analog or digital
format. Basically, data transmission enables devices or components within devices
to speak to each other.

How does data transmission work between digital devices:-

Data is transferred in the form of bits between two or more digital devices. There
are two methods used to transmit data between digital devices: serial transmission
and parallel transmission. Serial data transmission sends data bits one after another
over a single channel. Parallel data transmission sends multiple data bits at the
same time over multiple channels.

Types of Serial Transmission 

There are two types of serial transmission-synchronous and asynchronous both


these transmissions use ‘Bit synchronization‘
Synchronous Transmission
• Synchronous transmission does not use start and stop bits.
• In this method bit stream is combined into longer frames that may contain
multiple bytes.
• There is no gap between the various bytes in the data stream

Asynchronous Transmission

• Asynchronous transmission sends only one character at a time where a character


is either a letter of the alphabet or number or control character i.e. it sends one
byte of data at a time.
• Bit synchronization between two devices is made possible using start bit and stop
bit.
• Start bit indicates the beginning of data i.e. alerts the receiver to the arrival of new
group of bits. A start bit usually 0 is added to the beginning of each byte.
• Stop bit indicates the end of the data.

Difference Between LAN, MAN, and WAN

Parameter LAN MAN WAN


Full Form LAN is an acronym for MAN is an acronym WAN is an acronym
Local Area Network. for Metropolitan for Wide Area
Area Network. Network.

Definition and LAN is a network that MAN is a The WAN network


Meaning usually connects a comparatively wider spans to an even
small group of network that covers larger locality. It has
computers in a given large regions- like the capacity to
geographical area. towns, cities, etc. connect various
countries together.
For example, the
Internet is a WAN.

Network The LAN is private. The MAN can be The WAN can also be
Ownership Hospitals, homes, both private or both private or public.
schools, offices, etc., public. Many
may own it. organizations and
telecom operators
may own them.

Maintenance and Very easy to design Comparatively Very difficult to design


Designing and maintain. difficult to design and maintain.
and maintain.

Speed LAN offers a very high MAN offers a WAN offers a low
Internet speed. moderate Internet Internet speed.
speed.

Delay in It faces a very short It faces a moderate It faces a high


Propagation propagation delay. propagation delay. propagation delay.

Faulty Tolerance The LAN exhibits a The MAN exhibits a The WAN also exhibits
better fault tolerance lesser fault a lesser fault
than the rest of the tolerance. tolerance.
networks.

Congestion The congestion in the It exhibits a higher It exhibits a higher


network is very low. network congestion. congestion in the
network.

Communication LAN typically allows a MAN allows multiple A huge group of


Allotment single pair of devices computers to computers can easily
to establish a interact interact with each
communication. But it simultaneously with other using the WAN.
may also support each other.
more computers.

Uses Schools, homes, It basically covers a It covers an entire


colleges, hospitals, city, a small town, or country, a
offices, etc., can any given area with subcontinent, or an
privately use it. a bigger radius than equivalent area.
the LAN.

What are Network Devices?


Network devices are physical hardware components that link computers, printers,
fax machines, and other electronic devices to a network. These devices quickly,
securely, and accurately transfer data over the same or separate networks. Network
equipment can be either intra or inter-networked. A NIC card or RJ45 connection is
an installed device, whereas a router, switch, or another network device is a
network component. Let’s take a closer look at a few of these tools.

Modem
A computer may send and receive data through phone or cable lines with the help of
a modem. In contrast to a telephone line or cable wire, which can only carry analog
data, the data saved on a computer is digital.
The modem’s primary job is to transform digital signals between analog and digital
and vice versa. Combining a modulator and a demodulator creates a modem. When
digital data is sent by the computer, the modulator turns it into analog data. When
analog data signals are received by the computer, they are demodulated into digital
data.

Types of Modem
The direction in which a modem can transfer data, the type of connection it has to
the transmission line, the manner of transmission, etc., are all ways in which it can
be classified.
There are several different types of modems depending on the direction of data
transmission:

 Simplex − Using a simplex modem, data can only be transferred from a digital
device to a network (modulator) or from a network to a digital device in one
direction (demodulator).
 Half duplex − While a half-duplex modem can transport data in both ways, it
can do so only in one direction at a time.
 Full duplex − A full duplex modem may simultaneously send data in both
directions.

RJ45 Connector
Registered Jack 45 is referred to as RJ45. Devices physically connect to Ethernet-
based local area networks using the 8-pin RJ45 connector (LANs). Ethernet is a
technology that specifies LAN setup procedures. Twisted pair cables with RJ45
connector pins are used for Ethernet LANs. These pins fit into the appropriate
socket on the device and link it to the network.

Ethernet Card
A network interface card (NIC), commonly referred to as an Ethernet card, is a piece
of hardware that computers use to connect to Ethernet LANs and communicate with
other LAN-connected devices. Earlier, Ethernet cards required manual installation
because they were external to the system. It is a piece of internal hardware in
contemporary computers. The network connection is physically inserted into the
NIC’s RJ45 socket.
The protocols an Ethernet card supports may affect its speed. The top speed of older
Ethernet cards was 10 Mbps. Modern cards, however, support 100 Mbps-capable
fast Ethernets. Some cards even have a 1 Gbps capacity.

Router
If both LANs implement the same set of protocols, a router would be a network layer
hardware device that transports data from one LAN to another. Therefore, the ISP
(internet service provider) and at least two LANs are commonly connected to a
router. Data frames with the destination address added are called packets, and this
is how it receives data. Before sending the signals, the router also amplifies them.
Because of this, it is also known as a repeater.

Routing Table
A router consults its routing table to determine the fastest and most precise path a
packet can take to get to its destination. There are two different types of routing
tables:

 Static − A static routing table requires manual feeding of the routes.


Therefore, it is only appropriate for extremely small networks with a
maximum of two to three routers.
 Dynamic − In the case of a dynamic routing table, the router uses protocols to
communicate with other routers to find out which routes are open. This
works well in bigger networks where the sheer number of routers could
make hand feeding impractical.

Switch
A switch is a type of network equipment that utilises twisted pair wires to join other
devices to Ethernet networks. To receive, store and forward data packets across the
network, it employs packet switching technology. All of the connected devices’
network addresses are kept on file by the switch.
When it receives a packet, it examines the destination address before transmitting it
to the appropriate port. The packets are examined for network issues such as
collisions before being forwarded. Full duplex transmission is used for the data.
Switches have the potential to transmit data twice as quickly as other networking
equipment like hubs. This is due to the switch’s shared maximum speed with all
connected devices. This aids in keeping network speed even during periods of heavy
traffic. In reality, using several switches allows networks to operate at larger data
rates.
Gateway
A network device called a gateway is used to link two or more diverse networks.
Networks that use various protocols are referred to as dissimilar networks. A
computer with numerous NICs connected to various networks serves as a gateway
most of the time. The software can also be used to set up a gateway fully. These
gateways, which allow networks to connect to other networks, are typically hosts or
the endpoints of a network.
Gateways transmit data from any network to another using the packet switching
mechanism. It is comparable to a router in this regard, with the exception that a
router can only transport data over networks that employ the same protocols.

Wi-Fi Card
Wireless fidelity is known as Wi-Fi. Any network can be connected wirelessly using
Wi-Fi technology. Any device can connect wirelessly to the local network using a Wi-
Fi card. The term “Wi-Fi hotspot” refers to the actual area of the network that offers
internet access via Wi-Fi. Any public area, including your house or office, can host a
hotspot. The hotspots themselves are wired into the network.
An outdated device can be upgraded with a Wi-Fi card to add features like
teleconferencing, image transfer from a digital camera, video chat etc. The wireless
network adaptor is built into most modern gadgets

Difference between Internet and Intranet

INTERNET INTRANET

Simultaneously link computers on Owned by local or private organisations /


different network / global network companies

Support multiple users Users are limited

Unsafe, not protected Protected and secured

It’s a public network with more traffic A private network and traffic is less
Can transfer unlimited data Can transfer only limited data

Can be widely accessed and used Company or organisation employees or admin with
access to login details can only use this

More data or information can be Data or information accessible over intranet will be
accessed or availed limited and specific to the company records or
detail
Difference between Client-Server and Peer-to-Peer Network

S.NO Client-Server Network Peer-to-Peer Network

1. When it comes to a Client-Server Network, When it comes to the Peer-to-Peer


clients and servers are distinguished because Network, both clients and servers
of the distinctive servers and clients present. are not distinguished.

2. It majorly concentrates on sharing the It majorly concentrates on the


information. connectivity part.

3. Here, we mainly prefer the centralised server Here, every peer stores its own
to keep the data. data.

4. In the case of the Client-Server network, the In the case of a Peer-to-Peer


server replies to the services which are asked network, every node can
by the client. accomplish both request and
response.

5. The Client-Server network is expensive as The Peer-to-Peer network is


compared to the Peer-to-Peer network. affordable as compared to the
Client-Server network.

6. They are a more stable network form. They are comparatively less stable.

7. These can be used both in small and large It is mostly preferred for short
networks. networks.

OPERATING SYSTEM:-
An Operating System is the interface between the computer hardware and the end-
user. Processing of data, running applications, file management and handling the
memory is all managed by the computer OS. Windows, Mac, Android etc. Are
examples of Operating systems which are generally used nowadays.
All modern computing devices including Laptops, Tablet, mobile phones, etc.
comprise an Operating System which helps in the smooth working of the device.
Types of Operating System
1. Batch Operating System

 There is no direct communication between the computer and the OS


 There is an intermediate, the Operator, which needs to distribute the work
into batches and sort similar jobs
 Multiple users can use it
 Can easily manager a large amount of work
2. Real-Time Operating System

 It has a data processing system


 The processing time is very small between the user’s command and the
output
 Used in fields where the response needs to be quick and rapid
3. Time-Sharing Operating System

 Multiple people at various terminals can use a program at the same time 
 The main motive is to minimize the response time
4. Distributed Operating System

 When two or more systems are connected to each other and one can open
files which are not present in their system but in other devices connected in
the network
 Its usage has now increased over the years
 They use multiple central processors to serve real-time applications
 Failure of one system does not affect the other systems connected in the
network
5. Embedded Operating System

 These special Operating systems are built into larger systems


 They generally are limited to single specific functions like an ATM
6. Network Operating System

 They have one main server which is connected to other client servers
 All the management of files, processing of data, access to sharing files, etc. are
performed over this small network
 It is also a secure operating system for working with multiple users
7. Mobile Operating System
 With the advancement in the field of technology, smartphones now are
released with an Operating system. 
 They are designed in a manner that they can help a small device work
efficiently

Functions of Operating System

1. It helps with memory management. It keeps a track of the files being saved in
the Main memory and the primary memory of the computer device
2. Whenever a computer is turned on, the Operating system automatically starts
to work. Thus, the booting and rebooting process of a computer device is also
an important function of the OS
3. It provides a user interface
4. Managing of basic peripheral devices is done by the operating system
5. Using the password protection option of an operating system, the data in the
device can be kept secure
6. It coordinates with the software and the user
7. Easy navigation and organisation of files and programs are managed by the
OS
8. Any kind of program which needs to be run through the system is done by the
operating system
9. If any kind of error or bug is found during the program is detected using the
operating system

What is Multi-Factor Authentication (MFA)?

Multi-factor Authentication (MFA) is an authentication method that requires the


user to provide two or more verification factors to gain access to a resource such as
an application, online account, or a VPN. MFA is a core component of a
strong identity and access management (IAM) policy. Rather than just asking for a
username and password, MFA requires one or more additional verification factors,
which decreases the likelihood of a successful cyber attack.

Most MFA authentication methodology is based on one of three types of


additional information:

1. Things you know (knowledge), such as a password or PIN


2. Things you have (possession), such as a badge or smartphone
3. Things you are (inherence), such as a biometric like fingerprints or voice
recognition
Other Types of Multi-Factor Authentication

Machine learning and artificial intelligence (AI), authentication methods become


more sophisticated, including:

Location-based
Location-based MFA usually looks at a user’s IP address and, if possible, their geo
location. This information can be used to simply block a user’s access if their
location information does not match what is specified on a whitelist .

Adaptive Authentication or Risk-based Authentication


Another subset of MFA is Adaptive Authentication also referred to as Risk-based
Authentication

 From where is the user when trying to access information?


 trying to access company information? During your normal hours or during
"off hours"?
 What kind of device is used? Is it the same one used yesterday?
 Is the connection via private network or a public network?

What's the Difference between MFA and Two-Factor Authentication (2FA)?

MFA is often used interchangeably with two-factor authentication (2FA). 2FA is


basically a subset of MFA since 2FA restricts the number of factors that are required
to only two factors, while MFA can be two or more.
What is MFA in Cloud Computing:-With the advent of Cloud Computing, MFA has
become even more necessary. As companies move their systems to the cloud they
can no longer rely upon a user being physically on the same network as a system as
a security factor.

MFA for Office 365:-Office 365 by default uses Azure Active Directory (AD) as its
authentication system. And there are a few limitations. For example, you only have
four basic options when it comes to what type of additional authentication factor
they can use: Microsoft Authenticator, SMS, Voice and Oauth Token. You also might
have to spend more on licensing depending on the types of options you want
available

1. Malware attack

Attacks use many methods to get malware into a user’s device, most often social
engineering. Users may be asked to take an action, such as clicking a link or
opening an attachment.Once malware is installed, it can monitor user activities,
send confidential data to the attacker, assist the attacker in penetrating other
targets within the network, and even cause the user’s device to participate in a
botnet leveraged by the attacker for malicious intent.

Malware attacks include:

 Trojan virus — tricks a user into thinking it is a harmless file. A Trojan can
launch an attack on a system and can establish a backdoor, which attackers
can use.
 Ransomware — prevents access to the data of the victim and threatens to
delete or publish it unless a ransom is paid. Learn more in our guide
to ransomware prevention.
 Wiper malware — intends to destroy data or systems, by overwriting
targeted files or destroying an entire file system. Wipers are usually
intended to send a political message, or hide hacker activities after data
exfiltration.
 Worms — this malware is designed to exploit backdoors and vulnerabilities
to gain unauthorized access to operating systems. After installation, the
worm can perform various attacks, including Distributed Denial of Service
(DDoS).
 Spyware — this malware enables malicious actors to gain unauthorized
access to data, including sensitive information like payment details and
credentials. Spyware can affect mobile phones, desktop applications, and
desktop browsers.
 Fileless malware — this type of malware does not require installing
software on the operating system. It makes native files such as PowerShell
and WMI editable to enable malicious functions, making them recognized as
legitimate and difficult to detect.

2. Social engineering attacks include:

 Phishing — attackers send fraudulent correspondence that seems to come


from legitimate sources, usually via email. The email may urge the user to
perform an important action or click on a link to a malicious website,
leading them to hand over sensitive information to the attacker, or expose
themselves to malicious downloads. Phishing emails may include an email
attachment infected with malware.
 Spear phishing — a variant of phishing in which attackers specifically
target individuals with security privileges or influence, such as system
administrators or senior executives.
 Malvertising — online advertising controlled by hackers, which contains
malicious code that infects a user’s computer when they click, or even just
view the ad.
 Drive-by downloads — attackers can hack websites and insert malicious
scripts into PHP or HTTP code on a page. When users visit the page,
malware is directly installed on their computer; or, the attacker’s script
redirects users to a malicious site, which performs the download. Drive-by
downloads rely on vulnerabilities in browsers or operating systems.
 Scareware security software — pretends to scan for malware and then
regularly shows the user fake warnings and detections. Attackers may ask
the user to pay to remove the fake threats from their computer or to register
the software.
 Baiting — occurs when a threat actor tricks a target into using a malicious
device, placing a malware-infected physical device, like a USB,
 Vishing — voice phishing (vishing) attacks use social engineering
techniques to get targets to divulge financial or personal information over
the phone.
 Whaling — this phishing attack targets high-profile employees (whales),
such as the chief executive officer (CEO) or chief financial officer (CFO). The
threat actor attempts to trick the target into disclosing confidential
information.
 Scareware — a threat actor tricks the victim into thinking they
inadvertently downloaded illegal content or that their computer is infected
with malware. Next, the threat actor offers the victim a solution to fix the
fake problem, tricking the victim into downloading and installing malware.
 Pharming — an online fraud scheme during which a cybercriminal installs
malicious code on a server or computer. The code automatically directs
users to a fake website, where users are tricked into providing personal
data.
4. Advanced persistent threats (APT)

When an individual or group gains unauthorized access to a network and remains


undiscovered for an extended period of time, attackers may exfiltrate sensitive
data, deliberately avoiding detection by the organization’s security staff.

Difference between RDBMS and DBMS


RDBMS DBMS

Data stored is in table format Data stored is in the file format

Multiple data elements are accessible together Individual access of data elements

Data in the form of a table are linked together No connection between data

Normalisation is not achievable There is normalisation

Support distributed database No support for distributed database


Data is stored in a large amount Data stored is a small quantity

Here, redundancy of data is reduced with the help of Data redundancy is common
key and indexes in RDBMS

RDBMS supports multiple users DBMS supports a single user

It features multiple layers of security while handling There is only low security while
data handling data

The software and hardware requirements are higher The software and hardware
requirements are low

Oracle, SQL Server. XML, Microsoft Access

DATABASE MANAGEMENT:-INSERT, UPDATE, and DELETE, as well as SELECT and


MERGE, are known as Data Manipulation Language (DML) statements, which let SQL
users view and manage data.

Introduction
Encryption is a security method in which information is encoded in such a way that
only authorized user can read it. It uses encryption algorithm to generate ciphertext
that can only be read if decrypted.
There are two types of encryptions schemes as listed below:
 Symmetric Key encryption
 Public Key encryption
Symmetric key encryption algorithm uses same cryptographic keys for both
encryption and decryption of cipher text.
Public Key encryption
Public key encryption algorithm uses pair of keys, one of which is a secret key and
one of which is public. These two keys are mathematically linked with each other.

Hashing
In terms of security, hashing is a technique used to encrypt data and generate
unpredictable hash values. It is the hash function that generates the hash code,
which helps to protect the security of transmission from unauthorized users.
Hash function algorithms
Hashing algorithm provides a way to verify that the message received is the same
as the message sent. It can take a plain text message as input and then computes a
value based on that message

Difference between server-side scripting and client-side scripting


Server-side Scripting
 It helps work with the back end.
 It doesn’t depend on the client.
 It runs on the web server.
 It helps provide a response to every request that comes in from the
user/client.
 This is not visible to the client side of the application.
 It requires the interaction with the server for the data to be process.
 Server side scripting requires languages such as PHP, ASP.net, ColdFusion,
Python, Ruby on Rails.
 It is considered to be a secure way of working with applications.
 It can be used to customize web pages.
 It can also be used to provide dynamic websites.
Client-side Scripting
 It helps work with the front end.
 It is visible to the users.
 The scripts are run on the client browser.
 It runs on the user/client’s computer.
 It depends on the browser’s version.
 It doesn’t interact with the server to process data.
 Client side scripting involves languages such as HTML, CSS, JavaScript.
 It helps reduce the load on the server.
 It is considered to be less secure in comparison to client side scripting.

You might also like