JaizzyTech

JaizzyTech Software dev | Website dev | Database dev | Cybersecurity | IT training.

04/01/2024

I have reached 2.5K followers! Thank you for your continued support. I could not have done it without each of you. πŸ™πŸ€—πŸŽ‰

Values await you on this page, very soon I assure you.

WHAT DO YOU KNOW ABOUT PUBLIC WI-FI?Public WiFi enables individuals to connect to the internet and browse. Using public ...
31/10/2023

WHAT DO YOU KNOW ABOUT PUBLIC WI-FI?

Public WiFi enables individuals to connect to the internet and browse. Using public WiFi is convenient and exciting, and can save you normal data costs on your mobile phone plan (data subscription).
These networks are usually provided by businesses or organizations as a complementary service to their customers or visitors. It is a free network, and do you know what? Sometimes I like free things. But, there is a popular statement which states that "na wetin dey sweet goat dey kill am."

However, the convenience of public Wi-Fi can be risky. If you're not careful, hackers may quickly access your connection and compromise sensitive information stored on your device or alter your online identity.

Using public WiFi can pose some risks for individuals. These networks are often unsecured and can be vulnerable to hacking and other security threats. Hackers can potentially intercept the data being transmitted on the network, including passwords, credit card details, social security number, medical information, and other sensitive data.

One of the ways you get attacked via public wifi is through a concept called Man-In-The-Middle.

A man-in-the-middle (MITM) attack is a cyber attack in which threat actors or hackers put themselves in the middle of two parties, typically a user and an application, to intercept their communications and data exchanges and use them for malicious purposes like making unauthorized purchases or hacking.

By secretly standing between the user and a trusted system, such as a website or application, or two parties, a cybercriminal can easily obtain sensitive data. If it happens to you, you may assume you are directly communicating with a trustworthy site or person and willingly release sensitive credentials.

The attacker can be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within the reception range of an unencrypted Wi-Fi access point could insert themselves as a man-in-the-middle.

For easy understanding; assuming you connect to public wifi and you are interacting with your supervisor at work, and he requests your login credentials to update a record on the company's database on your behalf; a hacker might be in the middle of your conversation, and as soon as you send your login credentials, the hacker would quietly and unnoticeably steal your credentials and then use it against your organization: I am sure you know the devastating result if a hacker gain access to your database.

Another example; you might be interacting with a vendor, you place an order of items worth $200,000, then you asked the vendor to send his account details to credit him. Guess what happens here; you guessed right. The man-in-the-middle would intercept your vendor's message, change the vendor account details to his own; and when the transaction is done, you will then discover that you have made a huge and heartbreaking loss that could lead to su***de.

To minimize the danger associated with using public WiFi networks, you should take the following precautions:

βœ… Use a VPN: A VPN, or virtual private network, can help encrypt your messages or interactions on public WiFi networks, making it very difficult for hackers to intercept the information being transmitted.

βœ… Use only trusted networks: you should only connect to trusted public WiFi networks from businesses or organizations you know. Avoid connecting to networks with a suspicious name.

βœ… Turn off file sharing: you should turn off file sharing on your devices when connected to public WiFi networks, as this can make it easier for hackers to access your device and data.

By taking these precautions, you can use public WiFi networks safely and securely, while still enjoying the convenience of internet access. In my opinion, the golden advice is, to avoid public wifi or hotspots entirely.

Remember: no one can secure you unless you secure yourself. So make cyber security your priority.

Click the link below to read more πŸ‘‡
https://medium.com//the-danger-of-using-a-public-wi-fi-ec967a501499

On the battlefield, once you show a sign of weakness, your enemy will launch a full-scale force at you. Always be strong...
18/10/2023

On the battlefield, once you show a sign of weakness, your enemy will launch a full-scale force at you.

Always be strong friends!
Never show a sign of weakness.
Ascertain your weaknesses before your enemy does.
Hide your wounds and let them heal secretly while standing strong enough like nothing ever happened to you.

After the battles and victories, you may show your comrades the scars and teach them life-changing lessons.

It has become a necessity to have a digital skill.
14/10/2023

It has become a necessity to have a digital skill.

DIGITAL SKILLS, A NECESSITY FOR YOU.Digital skills are becoming increasingly important in today's world, where technolog...
14/10/2023

DIGITAL SKILLS, A NECESSITY FOR YOU.

Digital skills are becoming increasingly important in today's world, where technology and digital platforms are transforming the way we live, work, and communicate. Digital skills refer to the ability to use technology and digital tools to perform a variety of tasks.

In the workplace, this is becoming indispensable as businesses rely more and more on technology and digital platforms to communicate and operate. Companies are looking for individuals who are proficient in digital tools, and talents with digital skills have a better chance of landing a well-paying job.

Wandering on social platforms like (Facebook, Instagram, TikTok, WhatsApp, X, etc.) is not a digital skill. Besides, this attitude drains your energy, saps your finances, it places you in captivity in the form of addiction (that's why you cannot go a minute without checking social media.) I am sorry this is not the digital skills I am referring to.

Given the importance of digital skills, individuals need to invest time, money, and effort into learning these skills and staying up-to-date with the latest tools and technologies. Whether through online courses, workshops, or on-the-job training, acquiring and mastering digital skills is essential for anyone who wants to succeed in today's digital age.

You will agree with me that technology has done the world 🌎 good, and at the same time brought frustration to some people. What I mean is that, despite making life easy for people, technology has equally made some people jobless because most tasks performed by humans decades ago are now carried out by technology. Automation is happening in all businesses everywhere every day. This is one reason why you should have digital skills.

During the COVID-19 era, a lot of businesses folded up, a great number of people lost their jobs, and a lot of technologies came to life. Imagine the advent of ATMs, many tellers in banks lost their job; chatbots and AI are gradually making companies send goodbye messages to some of their Customer Support Specialists; a lot of accounting software is available now, and this software can do great accounting and business analysis for you; a lot of unmanned vehicles and drones are being produced and this development places the job of a driver at risk; even robots are being created to act like a human being. But do you know what? πŸ€” Humans are irreplaceable, it is humans that control these technologies, that is why you must be digitally sound to remain valuable and irreplaceable in this digital age.

In my opinion, stop thinking archaically, stop pursuing conventional and outdated courses of study (like Languages, Zoology, Geography, History, etc.) and start going for courses such as;

Cloud Computing
Software Development
Data Analysis
Data Science
IT Support
Digital Marketing
Product Design
Graphics Design
Cybersecurity
Game Development
Project Management
Product Marketing
Etc.

Even if you have gotten a degree in one of those archaic courses or planning to, you could still acquire any digital skill of your choice, and this would place you an edge over your peers. If you are finding it difficult to acquire a digital skill, or you don't know which one to embrace, you could talk to someone, look for a mentor, or ask me and I will be happy to provide you with solutions. There are a lot of formal and informal institutions out there offering free digital courses, check them out and explore.

Technology has come to stay, and new developments are evolving every day. Stop wasting your precious time and hard-earned money watching Netflix, stop spending 5 hours at a stretch chatting on WhatsApp, and don't spend time watching reels on Instagram and TikTok. Spend that time developing yourself every day. You may want to think about this; a time will come when technology will cook for you while you sleep, wash your car while you prepare for work, do house chores for you, and eventually lead you to chronic laziness. Don't you think this is possible?

Shortly, technology will dominate the workplace with artificial intelligence and smart assistants, while the use of augmented and virtual reality continues to increase. Everything will be β€˜smart’ – connected and data-driven. Everything is going digital, even schools are now embracing online studies. Learn a tech skill today, I assure you that, you can never exhaust technology, all you need to do is to keep adapting to changes when it comes.

Prepare yourself for now and the future because a time is coming when a technology skill will be a necessity like food, shelter, clothes, and water.

I am here to help you on that ladder πŸͺœ to digital literacy, just ask me for anything you are curious about, and swiftly shall I attend to you.

DON'T CHASE, ATTRACT!If you spend your time chasing butterflies, they will fly away. But if you spend time making a beau...
11/10/2023

DON'T CHASE, ATTRACT!

If you spend your time chasing butterflies, they will fly away. But if you spend time making a beautiful garden, the butterflies will come to you. We are attracted based on who we are, not what we want.

Similarly, the law of attraction is a theory that suggests that a person's thoughts and emotions can influence their experiences in life. It suggests that we attract what we think about and that by focusing on positive thoughts and feelings we can attract positive experiences into our lives. This conviction is often associated with the idea of visualizing what you want and believing it is already within your grasp, as well as taking actions that align with your desires.

When it comes to personal relationships, we often think about attraction in terms of physical appearances or material possessions. We may believe that having the perfect body or the right car will make us more attractive to others. However, true attraction goes beyond these superficial factors. Irrespective of physical possessions, the most ugly human being on earth, due to his unwavering personal traits and strong character, may look very beautiful in the eyes of men. You can relate to this claim. I have had people say; that if you are not wealthy, be physically appealing, if not, be educated. And if you are ugly, try to accumulate wealth, by so doing you attract people to yourself. But, in my opinion, I don't consider that statement whole true. In my opinion, if you are wealthy, you are beautiful, you have a good physical appearance, you are educated, etc. but you don't have strong character, you have integrity problems, then you may not have true companions attracted to you.

In reality, we are attracted to others based on who they are as individuals – their personality traits, values, and beliefs. Someone kind, compassionate, and honest is likely to be more attractive than someone who is rude, self-centered, and dishonest, regardless of their external appearance.

Similarly, we are also attracted to others who share our values and beliefs. If we have a strong sense of integrity, for example, we are more likely to be drawn to someone who values honesty and transparency. If we are passionate about a particular cause or hobby, we are more likely to connect with others who share that same passion.

Ultimately, attraction is about much more than just physical appearance or material possessions. It is about who we are as individuals, and what we value and believe in. When we focus on being our best selves – living with integrity, kindness, and compassion – we are more likely to attract others who share these same qualities. So, if you want to attract others, focus on being the best version of yourself – the rest will follow.

This can also be applied in a business setting by focusing on the end goal. By clearly visualizing and believing in what we want, whether it's a successful product launch, a profitable quarter, or a new partnership, we can put ourselves in a positive mindset that will help us attract the resources, opportunities, and support we need to achieve our goals.

Another way is by staying positive in the face of challenges and setbacks. By maintaining a positive and resilient attitude towards difficult situations, we are more likely to find creative solutions and overcome obstacles.

Additionally, this can help us make meaningful connections with others in the business world. By focusing on building positive relationships and partnerships, we can attract other like-minded individuals who share our values and vision for success.

While this concept is not a magical cure-all for business success, it can be a powerful tool for achieving our goals and creating the conditions for growth and prosperity in our businesses.

Don't chase, but attract, and develop a charismatic influence on your circle of influence!

NIGERIA WITH RENEWED BLESSINGS TODAY!Usually, it is my normal ritual to wake up at midnight from sleep and develop mysel...
01/10/2023

NIGERIA WITH RENEWED BLESSINGS TODAY!

Usually, it is my normal ritual to wake up at midnight from sleep and develop myself; but, I think this time around it's a different endeavor entirely. I woke up by exactly 1:20AM this moment being 1st October, 2023 with gladness in my heart πŸ’—, happiness in my stomach, and a sense of victory. I could feel great joy and relief going down my spine; it was as if I won a lottery or jackpot, you know the feeling of excitement when it's your birthday right? πŸ˜‡. Not knowing, all these feelings came about because it is our birthday (you and I) πŸŽ‚, my country's birthday, Nigeria Independence, on this day 1st October, 1960.

This is a significant moment for my country; a moment to celebrate victory πŸ™Œ, a moment to celebrate unity πŸ‘¨β€πŸ‘¨β€πŸ‘§β€πŸ‘§ in diversity, a moment to thank God for the natural endowments, a moment to reflect on our past and strategize for the future. Despite many struggles and hiccups, we as a nation triumph in unity and oneness. Let's strive towards unity, progress and harmony as we commemorate this day, and work together towards a better and brighter tomorrow.

Nigeria is a unique nation, with over 223 million population, over 370 ethnic groups, over 500 languages, and more than 3 religious groups. Despite this huge diversity in Nigeria, she still survives. I celebrate my fellow Nigerians today for attaining a remarkable feat despite disturbing odds.
I pray that Nigeria under God, will have a new birth of all forms of freedom, peace and unity, and she shall be a country of compatriots that would survive by her compatriots, and do great and mighty exploits for her compatriots.

Let us arise and obey the call of our nation, to serve her in love ❀️ and unity anywhere we find ourselves in the world 🌍, and we shall attain greater heights and the Nigeria we envision.

HAPPY INDEPENDENCE NIGERIA πŸ‡³πŸ‡¬πŸ‡³πŸ‡¬πŸ‡³πŸ‡¬πŸ‡³πŸ‡¬πŸ‡³πŸ‡¬πŸ‡³πŸ‡¬πŸ‡³πŸ‡¬

DIGITAL SKILLS ACQUISITION FOR 20,000 NIGERIANS BY GOOGLE.It is intriguing how multi-million dollars, multinational, int...
18/08/2023

DIGITAL SKILLS ACQUISITION FOR 20,000 NIGERIANS BY GOOGLE.

It is intriguing how multi-million dollars, multinational, international organizations, NGOs, and philanthropic organizations, etc. are concerned about the digital education and human capital development of the Nigerian youth. Could it be that, these organizations have seen what we may not have seen, or they are seeing what we have no idea about?

Just in case you missed it, the tech giant Google, has committed to train 20,000 (twenty thousand) Nigerian women and youth on Digital Skills, plus a grant of N1.2 billion for the Federal Government to create tech jobs for these youth.

This is indeed another massive opportunity for all, most especially women. I implore you to embrace this opportunity with a zeal like never before. Some time ago I talked about how tech is gradually replacing humans in what we knew as "the traditional work settings." For this reason only, it is thoughtful to join the tech ecosystem no matter the cost, so that you may remain relevant in the future of work.

Nigeria has a growing young population, About half of the total population, a staggering 110 million - is 17 or younger. However, figures from the National Bureau of Statistics put the countryβ€˜s unemployment rate at 33.3%; This means that 33.3 per cent of the labour force in Nigeria or 23,187,389 persons either did nothing or worked for less than 20 hours a week, making them unemployed by our definition of unemployment in Nigeria. You can't be unemployed when you have some level of digital skills, just embrace it and practice it with passion.

Google’s move to empower 20,000 youth with digital skills signifies a good step in enabling Nigeria unravel her human capital potential, which I believe is the greatest asset in the country.

I understand many people are anxious about one thing when you talk about having a digital skill; but I am here to assure you that, you don't need coding or programming knowledge in order to acquire a digital skill. When the training starts eventually, you would see so many digital courses that don't require coding ability, such as; Web Design, Content Marketing πŸ“, Digital Marketing 🎯, Graphic Design, Social Media Communication, Data Analysis πŸ“Š, Project Management, and many more.

Think about "why you should acquire some digital skills today." It's not hard, it doesn't cost much. Seize this opportunity that Google is about to offer, and ADD VALUE TO YOUR LIFE AND CAREER!

HAVE YOU HEARD OF A CYBER WARFARE? πŸ€”"Please it's just a 1 minute read time, kindly read to the end and be enlightened" T...
12/08/2023

HAVE YOU HEARD OF A CYBER WARFARE? πŸ€”

"Please it's just a 1 minute read time, kindly read to the end and be enlightened" Thank you!

Before I give light on Cyber Warfare, let's analyze this below πŸ‘‡

Some days ago, according to TechCabal "anonymous Hacktivist group from Sudan issued warning ⚠️ to the Nigerian government on possible cyber attack. A week after attacking Kenyan companies, the group is claiming responsibility for cyberattacks on MTN Nigeria and Nigeria’s National Information Technology Development Agency (NITDA). This is in response to Nigeria’s proposed military intervention in Niger.
While MTN's confirmation of the cyberattack is pending, NITDA confirmed in a press release that Anonymous Sudan targeted its digital infrastructure and advised Nigerian financial service providers, government bodies, and telcos to prepare for a series of attacks."

Cyberwarfare, as its name suggests, is the use of technology to pe*****te and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services, such as shutting down a power grid.

The main reason for resorting to cyberwarfare is to gain advantage over adversaries, whether they are nations or competitors.

πŸ›‘οΈ To Gather Compromised Information and/or Defense Secrets:
A nation or international organization can engage in cyberwarfare in order to steal defense secrets and gather information about technology that will help narrow the gaps in its industries and military capabilities.

Furthermore, compromised sensitive data can give attackers leverage to blackmail personnel within a foreign government.

πŸ›‘οΈ To Impact Another Nation’s Infrastructure:
Besides industrial and military espionage, a nation can continuously invade another nation’s infrastructure in order to cause disruption and chaos.

For example, a cyber attack could shut down the power grid of a major city. Consider the consequences if this were to happen in Nigeria; roads would be congested, the exchange of goods and services would be halted, patients would not be able to get the care they would need if an emergency occurred, access to the internet would be interrupted. By shutting down a power grid, a cyber attack could have a huge impact on the everyday life of ordinary citizens.

πŸ›‘οΈ To Create Overwhelming Quantity of Traffic Through Denial-of-Service (DoS):
This is when a network, host or application is sent an enormous amount of data at a rate which it cannot handle. This causes a slowdown in transmission or response, or the device or service to crash. Denial-of-Service (DoS) attacks are a type of network attack that is relatively simple to carry out, even by an unskilled attacker. A DoS attack results in some sort of interruption of network service to users, devices or applications.

Let's analyze one example of a Denial-of-Service attack published by Chris Jewers on /dailymail.co.uk/

Hackers targeted a Russian taxi app, sending hundreds of drivers to the same Moscow address causing huge traffic jams in the city centre.

Yandex Taxi, a Russian app similar to Uber that allows users to order cabs to their location, was reported to have been targeted in the morning. As a result of the hack, taxis flooded to Moscow's Kutuzovsky Prospekt - a major road that runs east to west leading into the centre of the Russian capital.

With its eight to ten lanes, Kutuzovsky Prospekt is rarely jammed. However, drivers spent about 40 minutes in traffic due to the fake pick-up orders.

The reason for all these explanations is to give you a vivid understanding of the devastating consequences of a cyber attack whether in a nation, company, or individual. Cyberwarfare can destabilize a nation, disrupt its commerce, and cause its citizens to lose faith and confidence in their government without the attacker ever physically setting foot in the targeted country.

Cyberwarfare is a very serious issue with potentially devastating consequences, and attacks are becoming more widespread. Now, more than ever, nations and governments (especially Nigeria) need cybersecurity professionals to help protect their citizens and infrastructure. An open warning has been issued, it is left for our country (I mean every citizen, government institutions, and companies) to adopt security measures that would help curb vulnerability that may be of advantage to the cyber attackers.

Always keep yourself protected against cyber criminals, they are out there like devils looking for who devour. Your country maybe attacked through you, that's if you are careless and ignorant.

If you care enough about your nation and yourself, let's discuss in the comment section. Don't forget to hit the like πŸ‘ and share button.

ImageSource: Info Stor Limited.

WOULD YOU LIKE TO JOIN THE CYBER SECURITY SPACE? πŸ€”Click the link πŸ”— below πŸ‘‡ by 11:00am today and get insightful discoveri...
25/07/2023

WOULD YOU LIKE TO JOIN THE CYBER SECURITY SPACE? πŸ€”

Click the link πŸ”— below πŸ‘‡ by 11:00am today and get insightful discoveries!

Zoom Meeting Details

Topic: Bridging the Professional Skill Gap: Empowering African Universities with Cybersecurity Technology For Training​
Time: Jul 25, 2023 11:00 AM Africa/Lagos

Join Zoom Meeting

https://us06web.zoom.us/j/88994888060?pwd=cWc4aWp1Z01oMWxKaFJ4bnNPY0lmQT09

Meeting ID: 889 9488 8060
Passcode: 468413

DESIGN A ROBUST SECURITY MEASURES TO COUNTER CYBER ATTACKS.Have you ever experienced cyber attack as an individual or as...
22/07/2023

DESIGN A ROBUST SECURITY MEASURES TO COUNTER CYBER ATTACKS.

Have you ever experienced cyber attack as an individual or as an organization? Have you ever been hacked? πŸ€”

Cyber attackers are amongst the most intelligent people in the world 🌍, they are engineers, the are scientists, they are up to date on trends. In order for you to fight these guys, you need to outperform them, think ahead of them, and know what they know.

It is very pathetic that some people and including organizations still fall for these attackers. Note that, when you are vulnerable you would experience a security breach.

A security breach is an incident that results in unauthorized access to data, devices, systems, applications, services, exposing private information that attackers can use for financial gain or other advantages. But there are many ways to protect yourself and your organization. It's important to be aware of common cyber threats and remain vigilant so that you don't become the next victim. You have to be cybersecurity conscious.

Cybersecurity is a vital field that deals with the protection of systems, networks, and data from digital attacks. Cyberattacks can have serious consequences, such as compromising sensitive information, extorting money, or disrupting normal business operations. Cybersecurity requires a combination of people, processes, and technology to create an effective defense against cyber threats.

Every organization is at risk of a cyber attack and therefore must take appropriate action to protect itself.

Organizations need to invest in improved security practices. This might include:

πŸ›‘οΈ investing in cybersecurity for all staff so that they are aware of and able to spot a cyber attack

πŸ›‘οΈ Enforcing two-factor authentication for employees accessing files and applications that contains sensitive data.

πŸ›‘οΈ Maintaining log files and ongoing monitoring to identify anomalous behavior that might indicate a data breach.

πŸ›‘οΈ storing the passwords of customers using a combination of salting and robust hashing algorithm

πŸ›‘οΈ separating cloud based resources from the public internet into an isolated private network segment.

πŸ›‘οΈ granting employees access to personal data and internal systems only via a secured VPN connection.

Security measures against cyber attackers cannot be overemphasized, you just need to stay up-to-date, you just need to have an eagle πŸ¦… eye πŸ‘οΈ.

Let me know your thoughts on this.

I will greatly appreciate it when you like and share! Together we shall enforce cyber intelligence. πŸ“

I humbly welcome you my newest followers! Excited to have you onboard!There is a lot of education cooking on the backgro...
12/07/2023

I humbly welcome you my newest followers! Excited to have you onboard!

There is a lot of education cooking on the background, so just stay tuned and be expectant of enlightenment in the technology sphere.

Thank you for joining.

Parthasarathi Partha, Stephen Udofa, Kingsley Nnabuogor, Itz Kris's Gasewu

Hello fine people, my great followers!Just to assure you that, I created this platform solely because of you; everything...
29/06/2023

Hello fine people, my great followers!

Just to assure you that, I created this platform solely because of you; everything that would happen here should be engineered and geared by you.

I want to know guys, what do you want to know about computers, technology, Data science, digital marketing, etc.? Tell me your desires in the comment section, and I will humbly supply you with up-to-date and relevant contents.

Thank you!

Please invite one to invite one, to follow and like this page.

Shout out to my newest followers! Excited to have you onboard!I humbly welcome you to my page, and I assure you that, yo...
29/06/2023

Shout out to my newest followers! Excited to have you onboard!

I humbly welcome you to my page, and I assure you that, you are yet to see wonders. Stay tuned new and existing followers.

Thank you!

Chime Victor, Hilary Nwachukwu, Rovinus D. Nzadon, Oko Emeka Isaac, Alex Attah

FREE CERTIFICATE COURSES FROM GOOGLE!This is an expensive opportunity that may not be available again in the near future...
26/06/2023

FREE CERTIFICATE COURSES FROM GOOGLE!

This is an expensive opportunity that may not be available again in the near future. Some of these courses may cost hundreds or thousands of dollars πŸ’΅ in the future. We all know that, the earth 🌍 revolves around the sun β˜€οΈ right? But, right now the earth is revolving around TECHNOLOGY! πŸ›°οΈπŸ–₯️.

There are many courses to get you started in the world of technology such as Python, Machine Learning, Data Science, Digital Marketing, Project Management, Software Development, Game Development, etc.

With Google, here are ten (10) FREE courses πŸ“ you don't want to miss. Explore to your satisfaction and be thankful to yourself later for taking the step.

1. Python Basics For Data Analytics
https://lnkd.in/dKqtkkuC

2. Machine Learning Crash Course
https://lnkd.in/dWEEeaq7

3. Basics of Machine Learning
https://lnkd.in/dssh4YyS

4. Advanced Google Analytics
https://lnkd.in/ds97ZpK6

5. Google Project Management
https://lnkd.in/da7NTxh5

6. Agile Project Management
https://lnkd.in/dKJEsDkq

7. Foundations of Project Management
https://lnkd.in/dwc9ejzv

8. Fundamentals of Digital Marketing
https://lnkd.in/d3qtMUXR

9. Data Science Foundation
https://lnkd.in/dwphdKnD

10. Data Science with Python
https://lnkd.in/dfxDv65B

Note: These are just a few out of hundreds of free certificate courses available by Google.

Imagine getting a certification πŸŽ“ from Google, it would be an open door πŸšͺ for your professional career/development.

Take these courses, and stay relevant.
ADD VALUE TO YOUR LIFE AND CAREER! πŸ€΅πŸ½β€β™‚

TECHNOLOGY - that's where the world 🌎 is headed.

A like and share would make both of us happy 😊, please like, comment, and share for others to see.

Great minds! Good day fine people!I trust we are keeping safe?Guys please be very careful, scammers are on the run to ca...
29/12/2021

Great minds! Good day fine people!
I trust we are keeping safe?

Guys please be very careful, scammers are on the run to cause damages. I got this SMS earlier today. I think I should share it, please also share and be at alert at all times!

The scammer's names are *AFAMEFUNA OKOTO*

Good Day Great Minds!I trust we are all doing fine.I wanted us to reach a reasonable number before we start engagements,...
01/11/2021

Good Day Great Minds!
I trust we are all doing fine.

I wanted us to reach a reasonable number before we start engagements, but as it is right now I am compelled to start something.
This is an educative and interactive platform, no one can grow in isolation and also no one is a custodian of knowledge.

Some of us are business people, we work in different offices, some of us are students, etc. we make use of computers in one way or the other, and new computer technologies evolve everyday and for us to survive in the labor market we need to adapt to technological changes.

I believe we know the essence of this platform, let's make the experience a remarkable one. Bring in your questions, challenges in any area of computing. And if you are questing to learn new things, just bring in the topic and we shall have educative moments.

Thank you in anticipation!

Address

No30 Sokoto Road Kwangila Zaria
Zaria
810281

Alerts

Be the first to know and let us send you an email when JaizzyTech posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to JaizzyTech:

Videos

Share


Other Digital creator in Zaria

Show All