18 September 2009

new computer definations

  • E-commerce hosting:E-commerce hosting is a business in which a company provides other companies whatever they need to sell their products and services on the World Wide Web.
  • EDFA: An erbium amplifier, also called optical amplifier or an erbium-doped fiber amplifier or simply EDFA, is an optical or IR repeater that amplifies a modulated laser beam directly, without opto-electronic and electro-optical conversion.
  • Ubuntu: Ubuntu is an open source Debian-based Linux distribution. Sponsored by Canonical Ltd, Ubuntu is considered a good distribution for beginners. The operating system was intended primarily for personal computers (PCs) but it can also be used on servers.
  • Ubiquitious computing: Ubiquitious computing is the trend towards increasingly ubiquitous, connected computing devices in the environment, a trend being brought about by a convergence of advanced electronic and particularly wireless technologies and the Internet.
  • Ultra HDTV: Ultra HDTV, also referred to as full-HDTV, true HDTV and 1080p, is a television display technology that surpasses the video quality and sharpness of the original high-definition television ( HDTV ) technology, providing an image resolution of 1920 by 1080 pixels.
  • XDMA: XDMA (Xing Distributed Media Architecture) is a network architecture for multicast streaming media transmissions. Streaming media enables live viewing of a transmission as compared to processes that require that files be completely transferred to the user's computer before their data can be viewed.
  • Typo squatting: Typo squatting, also called URL hijacking, is a form of cyber squatting based on the probability that a certain number of Internet users will mistype the name of a Web site (or actually its URL) when surfing the Web.
  • Cyber squatting: The practice of purchasing a domain name that contains a well-known trademark or commercial name. The cyber squatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.
  • Aircard: Aircard is a device that plugs into a laptop computer, typically through a USB connection or PC Card slot that uses a cell phone signal to provide high-speed Internet access.
  • Google Dance: Google dance refers to the Google search engine and their process of re-arranging the rankings of Web sites, and how they are placed in the serps. This happens every 6 - 10 weeks, when Google re-indexes their databases of web-sites.
  • Cyberagents: Cyberagents refers to the growing trend of shifting many jobs so that the employee works out of his or her home instead of the office.
  • Social bookmarking: Social bookmarking allows consumers to share their favorite bookmarks, Web sites, or content with others by submitting links to a public or semi-public forum.
  • Digital footprint: Digital footprint specifically describes the trail which a person leaves behind in cyberspace or on any form of digital communication.
  • Hacktivism: A hacktivist is one who combines hacking skills with activism in order to attack (shut down or deface) certain Web sites as a form of political protest.
  • CDMA One: CDMA One, also written cdmaOne, refers to the original ITU IS-95 (CDMA) wireless interface protocol that was first standardized in 1993. It is considered a second-generation (2G) mobile wireless technology.
  • WCDMA: W-CDMA is a third-generation (3G) mobile wireless technology that promises much higher data speeds to mobile and portable wireless devices than commonly offered in today's market.
  • CDMA2000: CDMA2000, also known as IMT-CDMA Multi-Carrier or 1xRTT, is a CDMA version of the IMT-2000 standard developed by the International Telecommunication Union (ITU).
  • B GAN: BGAN (Broadband Global Area Network) is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface except the regions immediately surrounding the north and south geographic poles.
  • DVB-H: Digital Video Broadcast - Handheld (DVB-H) is the technology driving mobile TV. A combination of conventional digital video and IP, DVB-H scales for smaller devices a technology that's already in place in millions of TV sets worldwide.
  • BREW :BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • Cellular Telephone: A Wi-Fi cell phone is a cellular telephone that can automatically switch between conventional cellular and Wi-Fi VoIP modes, even during the course of a conversation. A Wi-Fi LAN acts, in effect, as a cellular repeater for such a phone.
  • 4G: 4G is the short term for fourth-generation wireless, the stage of broadband mobile communications that will supersede the third generation (3G). End-to-end IP and high-quality streaming video will be among 4G's distinguishing features.
  • UMTS:Universal Mobile Telecommunications Service(UMTS) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps).
  • HSPDA: High Speed Downlink Packet Access (HSDPA) is a new protocol for mobile telephone data transmission. It is known as a 3.5G (G stands for generation) technology.
  • Optical Character Recognition: OCR, optical character recognition refers to the branch of computer science that involves reading text from paper and translating the images into a form that the computer can manipulate. All OCR systems include an optical scanner for reading text and sophisticated software for analyzing images.
  • Multi-Function Devices: Devices that combine the functionality of a printer and scanner are called Multi-Function devices. Some multifunction devices can also add additional facilities like that of a dial up modem that can used to fax images scanned with scanner
  • Resolution: In computers, resolution is the number of pixels (individual points of color) contained on a display monitor, expressed in terms of the number of pixels on the horizontal axis and the number on the vertical axis.
  • Compression: Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors.
  • Optical Devices: An optical mouse is an advanced computer pointing device that uses a light-emitting diode (LED), an optical sensor, and digital signal processing (DSP) in place of the traditional mouse ball and electromechanical transducer.
  • Flatbed Scanner: A flatbed scanner is usually composed of a glass pane (or platen), under which there is a bright light (often xenon or cold cathode fluorescent) which illuminates the pane, and a moving optical array, whether CCD or CIS.
  • ATA / IDE: ATA is a standard interface for connecting storage devices such as hard disks, solid state disks and CD-ROM drives inside personal computers.Many synonyms for ATA exist, including abbreviations such as IDE and ATAPI.
  • Mega Pixel:A megapixel refers to one million pixels and is commonly used in reference to digital cameras as an indication of resolution capability. Greater numbers of dots or pixels allow for more refinement of the image, which results in higher, truer image replication.
  • Buffer: A Buffer is a temporary storage area, usually in RAM. The key purpose of most buffers is to act as a holding area, so that the CPU can manipulate data before transferring it to a device.
  • SATA:Serial Advanced Technology Attachment (SATA) is a computer bus primarily designed for transfer of data between a computer and mass storage devices such as hard disk drives and optical drives.SATA is based on serial signaling technology, unlike current IDE hard drives that use parallel signaling.
  • Buffer Underrun Protection: Buffer Underrun Protection is a common problem that occurs when burning data into a CD. It happens when the computer is not supplying data quickly enough to the CD writer for it to record the data properly.
  • NAND / NOR FLASH:Flash Memory products are based on two technologies namely NAND and NOR Flash. NAND is used in memory cards such as the Compact Flash cards.NOR is found in lower end set-top boxes, mobile handsets, and BIOS chips.
  • Page per Minute (PPM):PPM or Page per Minute is a common method of measuring the output of a printer, as it determines the speed a printer is capable of printing. PPM between different printers cannot be compared on a one-to-one ratio, as you can expect a different PPM number between different types of printers
  • Switched-mode power supply(SMPS): A switched-mode power supply or SMPS, is an electronic power supply unit (PSU) that incorporates a switching regulator. This rapidly switches a power transistor between saturation (full on) and cutoff (completely off).
  • PictBridge: PictBridge is a standardized technology that allows printing images from a memory card in a digital camera directly to a printer, regardless of brand.The technology completely bypasses the need for a computer.
  • Analog-to-digital converter(ADC): An analog-to-digital converter is an electronic integrated circuit, which converts continuous analogue signals to discrete digital numbers or form.The digital output may be using different coding schemes, such as binary, Gray code or two's complement binary.
  • Charge-coupled device (CCD):CCD is a light-sensitive integrated circuit that stores and displays the data for an image in such a way that each pixel in the image is converted into an electrical charge the intensity of which is related to a color in the color spectrum.
  • Photo Printers: A photo printer is usually an inkjet printer that is specifically designed to print high quality digital photos on photo paper. These printers usually have a very high number of nozzles and are capable of printing droplets as small as 1 picoliter.
  • HD-DVD / AOD: High-Definition DVD is a new format of optical storage that primarily intended to store High Definition video data. It was also referred to as Advanced Optical Disk.
  • Memory Stick: A Memory Stick is an IC (Integrated Circuit) which is stored in a compact and rugged plastic enclosure. Memory Sticks are designed to store data and to enable the transfer of data between devices equipped with Memory Stick slots
  • Bad Sector: Hard drives contain millions of sectors. It is very normal for some of these sectors to be bad sectors, even when the drive is first manufactured. In addition, a small number of sectors will normally go bad during the lifespan of a drive
  • BIOS/CMOS: BIOS(Basic Input Output System) refers to asset of instructions that are critical for the functioning of the system.CMOS (Complementary Metal Oxide Semiconductor) refers to the chip on which the BIOS instructions are stored.
  • Composite Video: Composite video is the most common type of video interface for sending or receiving an analog video signal to or from a television set. In a layman’s language, a type of video signal in which all information—the red, blue, and green signals (and sometimes audio signals as well)—are mixed together.
  • Response time: In LCD’s, since the source of light is always on, the concept of refreshing is not applicable. Response time refers to the time it takes the liquid crystal to change shape. Since changing that shape also changes the light passing to the screen, response time is defined in two alternative ways. Black-to-black response time and Grey-to-grey response time
  • Ghosting: This phenomenon is seen in LCD’s with a low response time. When dealing with any scene that involves fast motion, pixels that are not quickly updated retains their previous state for a brief moment even as the adjoining pixels have been updated, causing the eye to detect a double image, or “ghost”.
  • Hybrid Drives: These are hard drives that include both rotating disks as well as Flash memory based storage. This is an attempt to combine the benefits of the two types of storage media: the inexpensiveness of rotating platters and the non-volatility of Flash memory. The data in a Hybrid Drive is finally written onto the disk as the Flash memory component is a temporary storage area.
  • Charge-coupled device (CCD) :CCD is a light-sensitive integrated circuit that stores and displays the data for an image in such a way that each pixel in the image is converted into an electrical charge the intensity of which is related to a color in the color spectrum.
  • Photo Printers: A photo printer is usually an inkjet printer that is specifically designed to print high quality digital photos on photo paper. These printers usually have a very high number of nozzles and are capable of printing droplets as small as 1 picoliter.
  • HD-DVD / AOD: High-Definition DVD is a new format of optical storage that primarily intended to store High Definition video data. It was also referred to as Advanced Optical Disk.
  • Memory Stick: A Memory Stick is an IC (Integrated Circuit) which is stored in a compact and rugged plastic enclosure. Memory Sticks are designed to store data and to enable the transfer of data between devices equipped with Memory Stick slots
  • Bad Sector: Hard drives contain millions of sectors. It is very normal for some of these sectors to be bad sectors, even when the drive is first manufactured. In addition, a small number of sectors will normally go bad during the lifespan of a drive
  • BIOS/CMOS: BIOS(Basic Input Output System) refers to asset of instructions that are critical for the functioning of the system.CMOS (Complementary Metal Oxide Semiconductor) refers to the chip on which the BIOS instructions are stored.
  • Composite Video: Composite video is the most common type of video interface for sending or receiving an analog video signal to or from a television set. In a layman’s language, a type of video signal in which all information—the red, blue, and green signals (and sometimes audio signals as well)—are mixed together.
  • Response time: In LCD’s, since the source of light is always on, the concept of refreshing is not applicable. Response time refers to the time it takes the liquid crystal to change shape. Since changing that shape also changes the light passing to the screen, response time is defined in two alternative ways. Black-to-black response time and Grey-to-grey response time
  • Ghosting: This phenomenon is seen in LCD’s with a low response time. When dealing with any scene that involves fast motion, pixels that are not quickly updated retains their previous state for a brief moment even as the adjoining pixels have been updated, causing the eye to detect a double image, or “ghost”.
  • Hybrid Drives: These are hard drives that include both rotating disks as well as Flash memory based storage. This is an attempt to combine the benefits of the two types of storage media: the inexpensiveness of rotating platters and the non-volatility of Flash memory. The data in a Hybrid Drive is finally written onto the disk as the Flash memory component is a temporary storage area.
  • GoogleWhack: The goal of a GoogleWhack is to perform search queries that will produce only one single search result in the Google search engine.
  • Solid State drive: A solid state drive (SSD) is a data storage device that uses solid state memory to store persistent data. With no moving parts, a solid state drive is usually more robust, effectively eliminating the risk of mechanical failure, usually silent, and usually enjoys reduced seek time and latency by removing mechanical delays associated with hard disk drives.
  • Blu-ray Disc: Blu-ray Disc is a next generation optical disc storage media format developed by Sony and others.
  • Spoofing: In the IT world, spoofing refers tricking or deceiving computer systems or other computer users.
  • Microsoft Surface: Microsoft Surface is a forthcoming multi-touch product from Microsoft which is developed as software and hardware combination technology
  • MobileTV?: Mobile TV means bringing the content that is available on TV to mobile phones via mobile telecommunications networks.

diffrance between lan and wan


LAN stands for local area network.
WAN stands for wide area network.
LAN (Local Area Network) is a computer network covering a small geographic area, like a home, office, or group of buildings
WAN (Wide Area Network) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries
EX: Network in an organization can be a LAN
Internet is the best example of a WAN
Typically owned, controlled, and managed by a single person or an organization
WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management
LANs have a high data transfer rate
WANs have a lower data transfer rate as compared to LANs
A LAN is cheaper than WAN.
WAN is more expensive than LAN.
LAN is note connection oriented.
WAN is connection oriented.
LAN uses the Ethernet standard.
WAN uses the T1 standard.

30 August 2009

Internet amazing Facts

  • Google got its name from the mathematical figure googol, which denotes the number 'one followed by a hundred zeros'.
  • Yahoo! derived its name from the word Yahoo coined by Jonathan Swift in Gulliver's Travels. A Yahoo is a person who is repulsive in appearance and action and is barely human!
  • Researchers consider that the first search engine was Archie, created in 1990 by Alan Emtage, a student at McGill University in Montreal, Canada.
  • Marc Andreessen founded Netscape. In 1993, he had already developed Mosaic, the first Web browser with a GUI.
  • It was once considered a letter in the English language. The Chinese call it a little mouse, Danes and Swedes call it 'elephant's trunk', Germans a spider monkey, and Italians a snail. Israelis pronounce it 'strudels' and the Czechs say 'rollmops's...What is it? The @ sign.
  • In the Deep Web, the part of the Web not currently catalogued by search engines, public information said to be 500 times larger than on the WWW.
  • The first search engine for Gopher files was called Veronica, created by the University of Nevada System Computing Services group
  • Tim Berners-Lee predicted in 2002 that the Semantic Web would "foster global collaborations among people with diverse cultural perspectives", but the project never seems to have really taken off.
  • In February 2004, Sweden led the world in Internet penetration, with 76.9 percent of people connected to the Internet. The world average is 11.1 per cent.
  • The top visited websites in February2004, including affiliated sites, were Yahoo!, MSN, the Warner Network, EBay, Google, Lycos and About.com.
  • The search engine "Lycos" is named for Lycosidae, the Latin name for the wolf spider family.
  • The US International Broadcasting Bureau created a proxy service to allow Chinese, Iraians and other 'oppressed' people to circumvent their national firewalls, relaying forbidden pages behind silicon curtains.
  • Lurking is to read through mailing lists or news groups and get a feel of the topic before posting one's own messages.
  • SRS stands for Shared Registry Server. The central system for all accredited registrars to access, register and control domain names.
  • WAIS stands for 'Wide Area Information Servers' - a commercial software package that allow the indexing of huge quantities of information, the makes those indices searchable across the Internet.
  • An anonymiser is a privacy service that allows a user to visit Web sites without allowing anyone to gather information about which sites they visit.
  • Archie is an information system offering an electronic directory service for locating information residing on anonymous FTP sites.
  • On the Internet, a 'bastion host' is the only host computer that a company allows to be addressed directly from the public network.
  • 'Carnivore' is the Internet surveillance system developed by the US Federal Bureau of Investigation (FBI), who developed it to monitor the electronic transmissions of criminal suspects.
  • Did you know that the original URL of Yahoo! was http://akebono.stanford.edu/ ?
  • Developed at the University of Nevada, Veronica is a constantly updated database of teh names of almost every menu item on thousands of gopher servers.
  • The Electrohippies Collective is an international group of 'hacktivists' based in Oxfordshire, England.
  • UIML (User Interface Markup Language) is a descriptive language that lets you create a Web page that can be sent to any kind of interface device.
  • In Internet terminology, a demo is a non-interactive multimedia presentation, the computer world's equivalent of a music video.
  • Did you know that the name of the famous search engine AltaVista came into existence when someone accidentally read and suggested the word 'Vista' on an unclean whiteboard as 'Alta Vista'?
  • Boeing was the first airline to discover the Y2K problem, way back in 1993.
  • Did you know that Domain registration was free until an announcement by the NAtional Science Foundation on 14th September, 1995, changed it?
  • The Internet was initially called the 'Galactic network' in memos written by MIT's J C R Licklider in 1962.
  • Shokyu Ishiko, a doctorate in agriculture and chief priest of Daioh Temple in Kyoto has created an online virtual temple which will perform memorial services for lost information.
  • A 55 kg laddu was made for Lord Venkateswara at Trumala as a Y2K prayer offering.
  • The morning after Internet Explorer 4 was released, certain mischievous Microsoft workers left a 10 by 12 foot letter 'e' and a balloon with the message, "We love you", on Netscape front lawn.
  • If you were a resident of Tongo, a monarchy in the southwest Pacific, you could own domains as cool as 'mail.to' and 'head.to'.
  • The American Registry for Internet Numbers (ARIN) began the administration of Internet IP address in North and South America in MArch 1998.
  • The testbed for the Internet's new addressing system, IPv6, is called the 6bone.
  • The first Internet worm was created by Robert T.Morris, Jr, and attacked more than 6000 Internet hosts.
  • According to The Economist magazine, the first truly electronic bank on the Internet, called First Virtual Holdings, was opened by Lee Stein in 1994.
  • The French Culture Ministry has banned the word 'e-mail' in all government ministries, documents, publications and Web sites, because 'e-mail' is an English word. They prefer to use the term 'courriel'.
  • The German police sell used patrol cars over the Internet, because earlier auctions fetched low prices and only a few people ever showed up.
  • Rob Glasser's company, Progressive Networks, launched the RealAudio system on April 10, 1995.
  • 'Broswer safe colours' refer to the 216 colours that are rendered the same way in both the PC and Mac operating systems.
  • Though the world Wide Web was born in 1989 at CERN in Switzerland, CERN is mainly involved in research for particle physics.
  • The first computer company to register for a domain name was Digital Equipment Corporation.
  • The 'Dilbert Zone' Web site was the first syndicated comic strip site available on the Internet.
  • Butler Jeeves of the Internet site AskJeeves.com made its debut as a large helium balloon in the Macy's Thanksgiving Day parade in 2000.
  • Sun Microsystems sponsors NetDay, an effort to wire American public schools to the Internet, with help from the US government.
  • In Beijing, the Internet community has coined the word 'Chortal' as a shortened version of 'Chinese portal'.
  • Telnet is one of the oldest forms of Internet connections. Today, it is used primarily to access online databases.
  • Domain names can be really sell at high prices! The most expensive domain name was 'business.com', which was bought by eCompanies for $7.5 million in 1999.
  • The first ever ISP was CompuServe. It still exists, under AOL Time Warner.
  • On an average, each person receives 26.4 e-mails a day.
  • Ray Tomlinson, a scientist from Cambrige, introduced electronic mail in 1972. He used the @ to distinguish between the sender's name and network name in the e-mail address.
  • Transmission Control Protocol/Internet Protocol (TCP/IP) was designed in 1973.
  • The Apple iTunes music store was introduced in the spring of 2003. It allows people to download songs for an affordable 99 cents each.
  • Satyam Online become the first private ISP in December 1998 to offer Internet connections in India.
  • The number of UK Internet users increase by an estimated 75 percent each yearThe Internet is the third-most used advertising medium in the world, closely catching up with traditional local newspapers and Yellow Pages.
  • It took 13 years for television to reach 50 million users- it took the Internet less than 4 years.
  • As of now, there are over 260 million people with Internet access worldwide.
  • 1 out of 6 people used the Internet in North America and Europe, as per a 1999 survey.
  • The average computer user blinks 7 times a minute.
  • In 1946, the Merriam Webster Dictionary defined computer as 'a person who tabulates numbers; accountant; actuary; bookkeeper.'
  • An estimated 2.5 billion hours were wasted online last year as people waited for pages to download, according to a study sponsored by Nortel Networks.
  • AOL says spam is the number one complaint of its customers, and that it has to block over one billion unsolicited e-mails every day.
  • In 2002, the average Internet user received 3.7 spam messages per day. The total rose to 6.2 spam messages per day in 2002. By 2007, it is expected to reach 830 messages per day.
  • A terminology industry research firm called Basex says that unsolicited e-mail cost $ 20 billion in lost time and expenses worldwide in 2000.
  • In 2003 an Atlanta- base ISP called Earthlink won a lawsuit worth $16.4 million (US) against a spammer in Buffalo NY, and a $25 million (US) lawsuit against a spammer in Tennessee.

30 July 2009

ECMA International

  • ECMA International was founded in 1961.
  • The ECMA organization is dedicated to the standardization of Information and Communication Technology (ICT) and Consumer Electronics(CE).
  • ECMA has developed standards for
    • JavaScript
    • C# Language
    • International Character Sets
    • Optical Disks
    • Magnetic Tapes
    • Data Compression
    • Data Communication
    • and much more

27 July 2009

Web Services take Web-applications to the Next Level

  • By using Web services, your application can publish its function or message to the rest of the world.
  •  Web services use XML to code and to decode data, and SOAP to transport it
    • (using open protocols).
  • With Web services, your accounting department's Win 2k server's billing system can connect with your IT supplier's UNIX server.

Web Services have Two Types of Uses

  • Reusable application-components. 
    • There are things applications need very often.So why make these over and over again?
    • Web services can offer application-components like: currency conversion,weather reports, or even language translation as services. 
  • Connect existing software. 
    • Web services can help to solve the interoperability problem by giving different applications a way to link their data.
    • With Web services you can exchange data between different applications and different platforms.

What is RSS?

  • RSS stands for Really Simple Syndication
  • RSS allows you to syndicate your site content
  • RSS defines an easy way to share and view headlines and content
  • RSS files can be automatically updated
  • RSS allows personalized views for different sites
  • RSS is written in XML

Interoperability has Highest Priority

  • When all major platforms could access the Web using Web browsers, different platforms could interact. For these platforms to work together, Web-applications were developed.
  • Web-applications are simple applications that run on the web. These are built around the Web browser standards and can be used by any browser on any platform.

What IS CSS? What is HTML 4?

  • What IS CSS?
CSS is the W3C standard style and layout model for HTML.
CSS allows web developers to control the style and layout of web pages.
HTML 4 allows dynamic changes to CSS.
DHTML is about using JavaScript and DOM to change the style and positioning of HTML elements.

  • What is HTML 4?
The W3C HTML 4 standard has rich support for dynamic content: HTML supports JavaScript
HTML supports the Document Object Model (DOM)
HTML supports HTML EventsHTML supports Cascading Style Sheets (CSS)DHTML is about using these features to create dynamic and interactive web pages.
What is SOAP?

* SOAP stands for Simple Object Access Protocol
* SOAP is a communication protocol
* SOAP is for communication between applications
* SOAP is a format for sending messages
* SOAP communicates via Internet
* SOAP is platform independent
* SOAP is language independent
* SOAP is based on XML
* SOAP is simple and extensible
* SOAP allows you to get around firewalls
* SOAP is a W3C recommendation

Why SOAP?

It is important for application development to allow Internet communication between programs.

Today's applications communicate using Remote Procedure Calls (RPC) between objects like DCOM and CORBA, but HTTP was not designed for this. RPC represents a compatibility and security problem; firewalls and proxy servers will normally block this kind of traffic.

A better way to communicate between applications is over HTTP, because HTTP is supported by all Internet browsers and servers. SOAP was created to accomplish this.

SOAP provides a way to communicate between applications running on different operating systems, with different technologies and programming languages.

What is HTML?

HTML is a language for describing web pages.

  • HTML stands for Hyper Text Markup Language
  • HTML is not a programming language, it is a markup language
  • A markup language is a set of markup tags
  • HTML uses markup tags to describe web pages

HTML Tags

HTML markup tags are usually called HTML tags

  • HTML tags are keywords surrounded by angle brackets like
  • HTML tags normally come in pairs like and
  • The first tag in a pair is the start tag, the second tag is the end tag
  • Start and end tags are also called opening tags and closing tags.


HTML Documents = Web Pages

  • HTML documents describe web pages
  • HTML documents contain HTML tags and plain text
  • HTML documents are also called web pages

The purpose of a web browser (like Internet Explorer or Firefox) is to read HTML documents and display them as web pages. The browser does not display the HTML tags, but uses the tags to interpret the content of the page:

What is WML?

WML stands for Wireless Markup Language. It is a mark-up language inherited from HTML, but WML is based on XML, so it is much stricter than HTML.

WML is used to create pages that can be displayed in a WAP browser. Pages in WML are called DECKS. Decks are constructed as a set of CARDS.

Examples of WAP use

  • Checking train table information
  • Ticket purchase
  • Flight check in
  • Viewing traffic information
  • Checking weather conditions
  • Looking up stock values
  • Looking up phone numbers
  • Looking up addresses
  • Looking up sport results

WAP Micro Browsers

To fit into a small wireless terminal, WAP uses a Micro Browser.

A Micro Browser is a small piece of software that makes minimal demands on hardware, memory and CPU. It can display information written in a restricted mark-up language called WML.

The Micro Browser can also interpret a reduced version of JavaScript called WMLScript.

WAP


What is WAP?


The wireless industry came up with the idea of WAP. The point of this
standard was to show internet contents on wireless clients, like mobile phones.



  • WAP stands for Wireless Application Protocol

  • WAP is an application communication protocol

  • WAP is used to access services and information

  • WAP is inherited from Internet standards

  • WAP is for handheld devices such as mobile phones

  • WAP is a protocol designed for micro browsers

  • WAP enables the creating of web applications for mobile devices.

  • WAP uses the mark-up language WML (not HTML)

  • WML is defined as an XML 1.0 application

The Wireless Application Protocol

The WAP protocol is the leading standard for information services on wireless terminals like digital mobile phones.

The WAP standard is based on Internet standards (HTML, XML and TCP/IP). It consists of a WML language specification, a WMLScript specification, and a Wireless Telephony Application Interface (WTAI) specification.

WAP is published by the WAP Forum, founded in 1997 by Ericsson, Motorola, Nokia, and Unwired Planet. Forum members now represent over 90% of the global handset market, as well as leading infrastructure providers, software developers and other organizations.

27 June 2009

what is BIOS?


The Basic Input Output System or as it is commonly referred to as
“BIOS” is considered to be a major command set which is mandatory for
any computer in order to function properly. It rests second in the line
of authority with the computer operating system itself being in first
place. The BIOS is a firmware installation which consists of a
customized standard designed to define a specific programmed interface.
Actually, it is basically a booted firmware which is intended to be the
initial code necessary to run a computer upon activation and initial
turn on.



  • Basically, the BIOS’s primary functions are designed to
    test, initialized and identify the various system devices that reside
    inside the computer. These devices can range from the hard drives, the
    floppy drives, the video card and any other installed hardware that
    could be found inside your machine. These tasks are absolutely
    necessary in order to prepare your computer for your intended purpose.
    The BIOS sets your machine to a stable state where the installed
    software can effectively be loaded, properly controlled and executed in
    its intended purpose. The initial running and operation of the BIOS
    with your computer is officially termed bootstrapping but for
    simplicity is has been referred often to merely booting or booting up
    the operating system.





  • The needed commands and programs found
    in the computer’s BIOS system are safely stored in a small microchip on
    the mother board. These programs are designed by the manufacturer to
    work effectively with many of the devices which are found on the modern
    machines. You may find several complimentary chipset within your
    computer system. In short, these BIOS programs are similar to
    mini-libraries composed of fundamental input and output functions which
    the operating system can instantly invoke anytime the need arises for a
    particular hardware capability. As an example, suppose you have a need
    to control the computer keyboard, the hard drives and any other device
    in the machine then the BIOS would send the necessary signals and
    commands to the microprocessor and active the hardware. In some types
    of PC’s such as the IBM or the older AT versions a few of the devices
    such as the hard drives and some video adapters could perhaps have
    their own BIOS.





  • In our modern day computer
    systems most BIOS have the capability to be upgraded which is a very
    vital aspect of computer design. You can readily appreciate this idea
    when you consider all the updated hardware that arrives at the market
    place daily. Your computer would need to have some immediate way of
    knowing the critical details concerning this new equipment. This
    process is known as flashing the BIOS. It is a procedure that must be
    accomplished carefully and it is vital that you understand exactly what
    you are doing.

What is a Gigahertz?


  • How often have you watched a TV commercial advancing the benefits of
    their computer in terms of the word Gigahertz and not fully understood
    the meaning of it? In this brief article we will attempt to provide you
    with a short introduction to that word.

  • As a shopper who may
    be on the look out for a new and more advanced personal computer, you
    should be aware of the term gigahertz as it applies to your potential
    machine. While reviewing the specification listings relating to your
    possible new computer you will soon notice that the word Gigahertz
    appears prominently on the spec sheet. This is a very important aspect
    relating to any computer.

  • Let’s first determine what a
    gigahertz actually is before we venture into its meaning with personal
    computers. Technically, one gigahertz is the equivalent of 1,000
    megahertz or MHz. Going even lower on the measurement chart we could
    say that it is equal to 1,000,000,000 Hz. In either case the higher the
    rated number of gigahertz that is specified for your potential computer
    the better the machine will perform in terms of computing speed. This
    higher figure refers to the processing speed that is associated with
    the computer – the higher the gigahertz the faster the machine and the
    faster the machine the better its performance will be.

  • There
    was a period of time in the past when gigahertz was not used as the
    measurement associated with personal computer speeds. At that time the
    speed of the PC’s were measured in terms of megahertz which is really
    very slow by today’s standards. During the late 1990’s the speeds of
    the microprocessors were drastically improved moving way past the 1,000
    MHz level. Since it was necessary to establish a higher level for the
    speed measurement the gigahertz was selected for this task. Today this
    is the standard by which all computer processing speeds are calculated.

  • The
    choice of selecting the GHz was also for convenience purposes as well.
    It is much simpler and easier to merely state that a machine has a 3.0
    gigahertz speed as opposed to saying the speed was 3,000 megahertz.Although
    most people may perhaps believe that the term gigahertz is merely used
    as a means of measuring the processor speed of personal computers it is
    in reality used as a form of measurement concerning speeds relating to
    other parts of the computer as well. As an example, this particular
    measurement can readily be used to relate the performance of the
    systems RAM and also for the backside cache.  Just keep in mind that
    the higher the gigahertz of these various components is then the better
    performance that your computer will have. This boils down to the bottom
    line of better productivity for the end users

What is Bluetooth?



  • If you were to perform a quick check upon many of the online market places
    which deal with electronic-communications equipment and gadgets you
    would readily notice a common form of technology. The technology of
    which I am referring to is universally known as Bluetooth. This
    technology is simply a certain specification that must be incorporated
    within the devices to enable that device to function and communicate
    over very short distances. As an example you may have two specific
    gadgets like a computer and a wireless telephone. These devices can
    work effectively together and even swap files with the use of a low
    power communications system assuming that both of these units
    incorporate and are equipped with the Bluetooth technology.



  • Initially
    when this technology was first introduced to the industry and placed on
    the marketplace it was first viewed as a viable alternative to the once
    popular RS232 data transfer system. Unfortunately, the Bluetooth
    technology was unable to upset the current trend for RS232 and failed
    to replace the system. This failure was principally because the
    technology of the RS232 can effectively connect a vast number of
    different devices together without having to deal with the common
    issues of synchronization. Bluetooth technology did however open its
    own avenues of importance and developed its own uses. It became
    especially known for its low power consumption within a short range.
    Two or more devices equipped with this Bluetooth technology can work
    with each other from at least one meter to as much as 100 meters
    without the lose of the signal and perform these tasks wirelessly. It
    is the Bluetooth’s ability to function in a short, limited distance and
    its wireless capability that provides it with its greatest asset. Keep
    in mind however that the moment one of the gadgets are no longer in the
    immediate range of each other then the equipment can no longer
    communicate with each other even if both of them are equipped with the
    Bluetooth technology.

  • Since the Bluetooth uses the radio
    broadcast communications systems for its ability to function then all
    the equipment that is required to work together need not line up merely
    to facilitate its individual file sharing session. Multiple tasks can
    easily be accomplished according to the capabilities of the equipment
    itself.

  • bluetooth has progressed to the
    status of a common everyday technology which is now popularly used on
    the majority of mobile cell phones and those which provide for hands
    free operation in particular. This technology is also a growing feature
    that is found more or less on many pieces of equipment that is being
    developed for the personal computers, communications devices as well as
    for the gaming consoles and entertainment devices popular with young
    people today. Bluetooth is definitely here to stay.

What is dual core?


















  • Dual
    core or the term dual core processor actual implies the same thing. The
    concept revolves around the idea of a multi-processor system which
    means that your computer has two microprocessors in one package or in a
    single chip. These dual processors work in tandem together to improve
    the responsiveness of your machine or as more simply put to better the
    speed of your computer. This is the primary reason for its current
    popularity and why most of the people today prefer this type of
    processor system. To most of the current users it is perceived to
    increase the total performance of their individual machines.





To
illustrate this point a bit more lets review the following bits of
information. When you are using your computer there are several types
of programs actively running within it. These are implicit and
explicitly working programs that function on a more or less continuous
basis inside of the processor. You can easily confirm this fact by
merely invoking the task manager menu and you will really see the long
list of these processes which are currently running. The more the
processes that you see running, the harder your processor is actually
working. If you merely had a normal type of processor it is highly
likely that you would experience a drastic slow down of your computer
operations. Without the dual core technology you may actually have a
considerable amount of “lag” in your program operations. This would
certainly be noticeable on many of the current high memory eaters on
the market today. Let’s face facts – You can not have all these
fabulous features in a program without the high memory consumption.


  • It
    is widely accepted today that the dual core processor has become the
    new desktop computer standard by which all processors are being
    compared to. More and more companies are switching to this technology
    since it is more effective and allows better performance then a single
    processor. This switch is quite likely possibly because of the many
    obvious benefits that this dual processor seems to provide to the end
    user as well as to the machine itself. A typical example would be with
    the dual core you can save energy while still delivering increased
    overall performance. Space within the computer board itself is yet
    another valuable advantage since you would only be required to house
    only a single chip instead of two. The most beneficial of these
    advantage points that should be considered is the dual core technology
    has proven beyond doubt to be very effective and reliable. This stable
    design alone has been instrumental in effectively promoting the units.
    It may perhaps take a long time before a more dependable processor
    design can replace the dual core units since the technology is so much
    more advanced and reliable.




new latest computer definations part 1


  • Burning:Slang term meaning to write data to a CD-ROM. A CD burner is another name for a CD-R drive.

  • LCD:LCD (liquid crystal display) is the technology used for displays in notebook and other smaller computers. Like light-emitting diode (LED) and gas-plasma technologies, LCDs allow displays to be much thinner than cathode ray tube (CRT) technology. LCDs consume much less power than LED and gas-display displays because they work on the principle of blocking light rather than emitting it.

  • Laser Printer:A laser printer is a popular type of personal computer printer that uses a non-impact (keys don't strike the paper), photocopier technology. When a document is sent to the printer, a laser beam "draws" the document on a selenium-coated drum using electrical charges.

  • LAN party:It is a gathering in which gamers (devotees of computer games) gather to share a local area network (LAN) and participate in extended gaming sessions of popular games such as Quake, Doom or Wolfenstein.

  • LAN:A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building).

  • TCP/IP:TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet.

  • K Desktop Environment:It is an open source graphical desktop environment for Unix workstations.

  • xD-card:An abbreviation for xD (Extreme Digital), the xD-Picture Card is a type of removable flash memory designed for use in digital cameras.

  • Track Ball:A trackball is a computer cursor control device used in many notebook and laptop computers. The trackball is usually located in front of the keyboard toward the user. Essentially, the trackball is an upside-down mouse that rotates in place within a socket.

  • Zombie: A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet.

  • Zigbee:ZigBee is a specification for wireless personal area networks (WPANs) operating at 868 MHz, 902-928 MHz and 2.4 GHz. A WPAN is a personal area network (a network for interconnecting an individual's devices) in which the device connections are wireless.

  • QWERTY keyboard:This term is used to describe a standard (Latin alphabet-based) keyboard. It has been named so because the first six keys in the upper-left part of the keyboard spell out Q-W-E-R-T-Y.

  • Nanofactory:A machine that can make a product atom by atom that basically undertakes the process of molecular nanotechnology.

  • Virus:Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other programs in the system. Infected programs copy the virus to other programs.

  • Virus Hoaxes:Considering the speed with which messages can be copied and sent via e-mail on the Internet, pranksters love to spread phony warnings just to upset as many people as they can.

  • IMAP:IMAP (Internet Message Access Protocol) is a standard protocol for accessing e-mail from your local server. IMAP (the latest version is IMAP Version 4) is a client/server protocol in which e-mail is received and held for you by your Internet server.

  • ILOVEYOU virus:The ILOVEYOU virus comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book and perhaps more seriously, the loss of every JPEG, MP3 and certain other files on the recipient's hard disk.

  • Identity theft:Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

  • iDEN:iDEN (Integrated Digital Enhanced Network) is a wireless technology from Motorola combining the capabilities of a digital cellular telephone, two-way radio, alphanumeric pager and data/fax modem in a single network.

  • Image Spam:Image spam is junk email that replaces text with images as a means of fooling spam filters. Image delivery works by embedding code in an HTML message that links to an image file on the Web.

  • iButton:An iButton is a microchip similar to those used in a smart card but housed in a round stainless steel button of 17.35mm x 3.1mm - 5.89mm in size (depending on the function).

  • Y2K:Y2K is an abbreviation for "year 2000." As that year approached, many feared that computer programs storing year values as two-digit figures (such as 99) would cause problems.

  • Yagi antenna:A Yagi antenna, also known as a Yagi-Uda array or simply aYagi, is a unidirectional antenna commonly used in communications when a frequency is above 10 MHz.

  • Yottabyte:A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes or, in decimal, approximately a thousand zettabytes, a trillion terabytes or a million trillion megabytes.

  • Ymodem:Ymodem is an error-correcting protocol for a modem that uses larger data blocks for greater efficiency.

  • Yacc:Yacc or 'yet another compiler compiler' is the standard parser generator for the Unix operating system.

  • EDI:EDI or Electronic Data Interchange is the exchange of business data using an understood data format.

  • E-cycling: E-cycling is the practice of reusing or distributing for reuse, electronic equipment and components rather than discarding them at the end of their life cycle.

  • Eggdrop:Eggdrop is an Internet Relay Chat (IRC) program for Linux or Unix users that sits in the background of an IRC channel to manage and protect a chat.

  • Easter egg:An Easter egg is an unexpected surprise, perhaps a message, an image, or a sound, hidden in a Web site or in an application program.





(n.) A group of two or more computer systems linked together. There are many types of computer  networks, including:



  •  local-area networks (LANs) : The computers are geographically close together (that is, in the same building).

  • wide-area networks (WANs) : The computers are farther apart and are connected by telephone lines or radio waves.

  •  campus-area networks (CANs): The computers are within a limited geographic area, such as a campus or military base.

  •  metropolitan-area networks MANs): A data network designed for a town or city.

  • home-area networks (HANs): A network contained within a user's home that connects a person's digital devices.




In addition to these types, the following characteristics are also used to categorize different types of networks:




  • # topology : The geometric arrangement of a computer system. Common topologies include a bus, star, and ring. See the Network topology diagrams in the Quick Reference section of Webopedia.



  • # protocol : The protocol defines a common set of rules and signals that computers on the network use to communicate. One of the most popular protocols for LANs is called Ethernet. Another popular LAN protocol for PCs is the IBM token-ring network .



  • # architecture : Networks can be broadly classified as using either a peer-to-peer or client/server architecture.



Computers on a network are sometimes called nodes. Computers and devices that allocate resources for a network are called servers.

(v.) To connect two or more computers together with the ability to communicate with each other.

19 June 2009

Are Wireless Networks Secure?

  • No computer network is truly secure, but how does wireless network security stack up to that of traditional wired networks?

  • Answer: Unfortunately, no computer network is truly secure. It's always theoretically possible for eavesdroppers to view or "snoop" the traffic on any network, and it's often possible to add or "inject" unwelcome traffic as well. However, some networks are built and managed much more securely than others. For both wired and wireless networks alike, the real question to answer becomes - is it secure enough?

  • Wireless networks add an extra level of security complexity compared to wired networks. Whereas wired networks send electrical signals or pulses of light through cable, wireless radio signals propogate through the air and are naturally easier to intercept. Signals from most wireless LANs (WLANs) pass through exterior walls and into nearby streets or parking lots.

  • Network engineers and other technology experts have closely scrutinized wireless network security because of the open-air nature of wireless communications. The practice of wardriving, for example, exposed the vulnerabilities of home WLANs and accelerated the pace of security technology advances in home wireless equipment.

  • Overall, conventional wisdom holds that wireless networks are now "secure enough" to use in the vast majority of homes, and many businesses. Security features like 128-bit WEP and WPA can scramble or "encrypt" network traffic so that its contents can not easily be deciphered by snoopers. Likewise, wireless routers and access points (APs) incorporate access control features such as MAC address filtering that deny network requests from unwanted clients.

  • Obviously every home or business must determine for themselves the level of risk they are comfortable in taking when implementing a wireless network. The better a wireless network is administered, the more secure it becomes. However, the only truly secure network is the one never built!

What Are the Benefits of Networking?

The benefits of networking (either wired or wireless) in homes are:

  • * file sharing - Network file sharing between computers gives you more flexibity than using floppy drives or Zip drives. Not only can you share photos, music files, and documents, you can also use a home network to save copies of all of your important data on a different computer. Backups are one of the most critical yet overlooked tasks in home networking.

  • * printer / peripheral sharing - Once a home network is in place, it's easy to then set up all of the computers to share a single printer. No longer will you need to bounce from one system or another just to print out an email message. Other computer peripherals can be shared similarly such as network scanners, Web cams, and CD burners.

  • * Internet connection sharing - Using a home network, multiple family members can access the Internet simultaneously without having to pay an ISP for multiple accounts. You will notice the Internet connection slows down when several people share it, but broadband Internet can handle the extra load with little trouble. Sharing dial-up Internet connections works, too. Painfully slow sometimes, you will still appreciate having shared dial-up on those occasions you really need it.

  • * multi-player games - Many popular home computer games support LAN mode where friends and family can play together, if they have their computers networked.

  • * Internet telephone service - So-called Voice over IP (VoIP) services allow you to make and receive phone calls through your home network across the Internet, saving you money.

  • * home entertainment - Newer home entertainment products such as digital video recorders (DVRs) and video game consoles now support either wired or wireless home networking. Having these products integrated into your network enables online Internet gaming, video sharing and other advanced features.

Although you can realize these same benefits with a wired home network, you should carefully consider building a wireless home network instead, for the following reasons:

  • 1. Computer mobility. Notebook computers and other portable devices are much affordable than they were a few years ago. With a mobile computer and wireless home network, you aren't chained to a network cord and can work on the couch, on your porch, or wherever in the house is most convenient at the moment.

  • 2. No unsightly wires. Businesses can afford to lay cable under their floors or inside walls. But most of us don't have the time or inclination to fuss with this in our home. Unless you own one of the few newer homes pre-wired with network cable, you'll save substantial time and energy avoiding the cabling mess and going wireless.

  • 3. Wireless is the future. Wireless technology is clearly the future of networking. In building a wireless home network, you'll learn about the technology and be able to teach your friends and relatives. You'll also be better prepared for future advances in network technology coming in the future.

What is Wireless Computer Networking?

  1. Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless networking is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices.

  1. A wireless network offers advantages and disadvantages compared to a wired network. Advantages of wireless include mobility and elimination of unsightly cables. Disadvantages of wireless include the potential for radio interference due to weather, other wireless devices, or obstructions like walls.

  1. Wireless is rapidly gaining in popularity for both home and business networking. Wireless technology continues to improve, and the cost of wireless products continues to decrease. Popular wireless local area networking (WLAN) products conform to the 802.11 "Wi-Fi" standards. The gear a person needs to build wireless networks includes network adapters (NICs), access points (APs), and routers.

What is (Wireless / Computer) Networking?

  • In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.
Area Networks

  • Networks can be categorized in several different ways. One approach defines the type of network according to the geographic area it spans. Local area networks (LANs), for example, typically reach across a single home, whereas wide area networks (WANs), reach across cities, states, or even across the world. The Internet is the world's largest public WAN.
Network Design

  • Computer networks also differ in their design. The two types of high-level network design are called client-server and peer-to-peer. Client-server networks feature centralized server computers that store email, Web pages, files and or applications. On a peer-to-peer network, conversely, all computers tend to support the same functions. Client-server networks are much more common in business and peer-to-peer networks much more common in homes.

A network topology represents its layout or structure from the point of view of data flow. In so-called bus networks, for example, all of the computers share and communicate across one common conduit, whereas in a star network, all data flows through one centralized device. Common types of network topologies include bus, star, ring and mesh.
Network Protocols

  • In networking, the communication language used by computer devices is called the protocol. Yet another way to classify computer networks is by the set of protocols they support. Networks often implement multiple protocols to support specific applications. Popular protocols include TCP/IP, the most common protocol found on the Internet and in home networks.
  • Wired vs Wireless Networking

Many of the same network protocols, like TCP/IP, work in both wired and wireless networks. Networks with Ethernet cables predominated in businesses, schools, and homes for several decades. Recently, however, wireless networking alternatives have emerged as the premier technology for building new computer networks.

1 June 2009

What Should I Do With Image Files?

A Tutorial by niraj chauhan:

--------------------------------------------------------------------------------------------------------------------------------------------------------------------
  • 1. What's a image file?
(>) A image file is a CD/DVD, but instead of insert it into your CD/DVD-Rom, you open it from inside your Hard Disk. So, it's a file that replaces a normal CD/DVD. Inside the image are the CD/DVD files like if it were a CD/DVD.

  • 2. What are the image files extensions?
(>) There's many extensions, but the most common are:
(>) iSO (Generic image file)
(>) BiN/CUE (Generic BiN image file)
(>) NRG (An image created using Nero Burning ROM)
(>) iMG/CCD/SUB (An image created using CloneCD)
(>) MDF (An image created using MagicISO Maker)

There are many other images, but these are the most common.

  • 3. How to open a image file?
(>) The most common way to open image files, is to use a virtual CD/DVD-Rom. It's like a normal CD/DVD-Rom, only that you mount the images directly from your computer, installing a simple program.

  • 4. What program should i use to create images files?
(>) Usually a CD/DVD Burning software has that option, but personally i use UltraISO. It allow me to create an ISO, BiN/CUE, NRG and iMG/CCD/SUB image file.

  • 5. What program should i use to mount the images?
(>) Daemon-Tools is the most powerful one to use, and the most simple too.

  • 6. How to burn a image file?
(>) Some image files must be burned using a certain software in order to work fine, but usually a common CD/DVD burning software works fine. I use Nero Burning ROM to burn my images.

  • 7. How to work with Daemon-Tools?
  1. (>) 1. Install the software into your Hard Drive. After installing reboot (or not) your PC.
  2. (>) 2. After 1. , open Daemon-Tools. It will appear in your startup bar.
(>) 3. Right click on it, go to Virtual CD/DVD-ROM » Set number of devices » 2 Drives. If you want to use more drives you can set it on. I personally use 2. It's your decision.
(>) 4. Right click on it, go to Virtual CD/DVD-ROM » Device x: [X:](....). Here you will mount your image. Just choose the image to open it (x means Device 1 or 2, etc.)([X:] the letter of your device).
(>) 5. Done, now your image is working like a CD.

  • 8. How to burn with Nero Burning ROM?
(>) 1. Install Nero Burning ROM.
(>) 2. Open it, choose what is the storage type you gonna use to burn the image, or is a CD or a DVD.
(>) 3. Go to Copy and Backup » Burn Image to Disc.
(>) 4. Choose the image you want to burn.
(>) 5. Done, let it burn baby!

  • FiNAL NOTES:
(>) If you want to burn a BiN with Nero Burning ROM, you will have to have the CUE file. When you are going to open the image, if it's BiN, you open the CUE file. If you don't have the CUE and you don't want to download it, it's simple:
1. Open Daemon-Tools.
2. Mount your BiN file.
3. Open Nero Burning ROM.
4. Open it, choose what is the storage type you gonna use to burn the image, or is a CD or a DVD.
5. Go to Data » Make Data CD.
6. Now open the image you mounted through your virtual drive. Select all files, and drag the files into Nero Burning ROM window that is opened.
7. Done, let it burn.

Where Is Winipcfg In Windows xp?


  •  If any body remembers or misses the old "winipcfg", which is missing from Windows XP, then there is a easy way to get this back from Microsoft.





  • Instead of using the command line to display or configure your ip with "ipconfig", you can download wntipcfg from Microsoft which gives you the same GUI as the old winipcfg.





  • Download:CODE

  • http://microsoft.com/windows2000/techinfo/reskit/tools/existing/wntipcfg-o.asp





Then follow these steps:

Install it (the default is c:\program files\resource kit\ )
Copy wntipcfg.exe to c:\windows
Rename it to winipcfg.exe
Now you can just click on run, then type in "winipcfg".

23 April 2009

what is web browsers?

  • as you know,millions of computers are connected to the internet.these computers have billions of documents on the almost the same number of website.how do we retrive the required information from these site? the web browser programs play avery important role in displaying the contents of web sites and in using the other features such as e-mail, newsgroups chating and etc.
  • internet explorer, a companion program of windows is a popular web browser.netscape is another popular web browser.in this section, we shall discuss the salient features of internet explorer. even if you are using some other browsers,most of the discussion will also be applicable to that program.

what is Channels?

  • channels are used to deliver content from your favorite sites directly to your computer. channels make it possible for you to remain up-to-date with the latest web content.you do not have to subscribe to view the content. however if you subscribed to a channel, you gets it updated contents on content provider on a regular basis.
  • to have a look at various channels that you can access. you can use channels bar on your desktop or the channels buttons on the task bar or in the internet explorer browser.if you want to display channels on your desktop then you can use the command- start menu,programs,internet explorer,channel bar.
  • if you cannot use on your own PC you can find it yourself and complete the task.you can use the channels bar to view or subscribe to any channel. you can use the channel guide to view a list of channels available at Microsoft website. Microsoft updates the list at a regular intervals.you can add new channels to your channel bar and remove channels also that you have to no more use.

15 April 2009

Attend classes on youtube & forget college.

College Too expensive?
  • Try Youtube. it might seem counterintuitive to look for higher education alongside avril lavigne music videos, but the video sharing site become a major reservoir of college content.
  • youtube has for the last few years been forgetting partnership with university and colleges. the site recently gathered that video-channels under the banner YOUTUBE EDU. over 100 schools have partnered with youtube to make an official channel, including stanford,MIT, Harvard, Yale and the first university to join youtube : UC berkely.
  • there are promotional videos like campus tours, but the more intresting content is stright from the classroom or lecture hall. many schools have posted video of guest lectures. introductory classes and even a full semester's course.
at a time when many are finding college unaffortable and the ranks of the learning can sound like a good way to spen some Free time.

27 March 2009

Application of computers.

The use of computers is increasing at such a rate that is hardly any field where computers are not used.the following list describes some of the applications of computers.

  • in offices and homes for preparaing documents and to perform other data processing jobs.
  • to prepare salary slips and salary cheques in offices and factories.
  • to maintain accounts and transfer funds in banks
  • to store and retrive large numbers of informations in the offices.
  • to search and retrive informations from the other computers.
  • to reserve tickets in the transportation sector. e.g:railways,airlines.
  • to regulate trafic lights on roads and to control machines and robots in factories.
  • to design automobiles,buildings and dams and also to forcast weather.
  • to create animation catroon movies and compose music.
  • to control morden automobiles,appliances.
  • to do online banking and see merchandise,shares,bonds etc.
  • to control and simulate defense equipment.
  • for scientific and industrial research.

Classification of computers

Computers are used for several applications in almost all fields of morden life.diffrent types of application require diffrent type of computers.for instance, for desktop application such as word-processing, you may require a small computer.on other hand, a large company require a large and powerful computer. computer can be classified based on size, application,speed,technology etc.

  • one of the most commonly used classifications of computers is based on its size.here the computers are devided into three categories -large mainframe, mini and micro.personal computers (PCs) that you use fall into the micro category. small micro computer that we are used for personal application in homes in the 1980s were called home computers.large companies,banks,airlines...etc.
  • normally use large (mainframe computers) fall between the mainframes and macro computers.computer can also classified as analog and digital. your pc is a digital computer.the computers used in officec are generally digitals. digital computer are operate directly on numbers that are expressed as digits. digital computers are more accurate than analog computers. they can be sued data for processing as well as for scientific, engineering and industrial application. on the other hand, analog computers that are normally used in the process industry or in measuring instruments can directly measure physical parameters, such as v,oltage, current pressure,temprature,length,weigh,flow etc. however, nowadays,digital computers are being used for industrial application.

25 March 2009

function of operating system:

  • operating system:an operating system is an integrated set of programs that is used to manage the various resources and overall operation of a computer system.it makes the computer system user friendly.its prime objective to improve the performance and efficiency of computer system and increase facility.

  • function of operating system
  1. processor management, that is assignment of processors to diffrent tasks being performed by the computer system.
  2. memory management, that is allocation of main memory and other storage areas to the system programs as well as user programs and data.
  3. input output management, that is coordinataion and assignment of the diffrent input and optput devices while one or more programs are being executed.
  4. file management, that is the storage of files on various storage devices and the transfer of these files from one storage device to another. it allows all files easily changes and modified through the use of text editiors or some other file manilution routines.
  5. automatic transition from job to job as directed by special control system.
  6. interpretation of commands and instruction.
  7. coordination and assignments of compilers, assembler, utility programs and other software's to the various user of the computer system.
  8. establishment of data security and integrity. that is it keeps diffrent programs and data in such manner that they do not interfere with each other. moreover it also protects itself from being destroyed by any user.
  9. production of dumps, traces, error messages, and other debugging and error-detecting aids.
  10. maintenance of internal time clock and log of system usage for all users.
  11. facilities easy communication between the computer system and the computer (human) operator.

evalution of reverse polish formulas

  1. examine each symbol in the reverse polish formula, starting at the extreme left untill you come to an operator.
  2. write down the operator and the two operands immediately to its left on a piece of scratch paper.
  3. erase the operator and the operands from the formula,creating a hole.
  4. perform the operation on the operands and write the result in the hole.
  • if the formula now consist of one value , that is the answer and the algorithm is finished otherwise goto step 1depicts the evaluation of a reverse polish formula. the order of the operator is the order in which they are actually evaluated.
  • reverse polish is the ideal notation for evaluting formulas on a computer with stack.the formulas comsist os n symbols each one either a variable or an operator.the algorithm for evaluting a reverse polish formula using a stack is as follows.

  • algorithm:
  1. set k to 1
  2. examine the kth symbol. of it is a variable, push it onto the stack. if it is an operator pop the top 2 iteams off the stack, perform the operation and push the result back onto the stack.
  3. if k=n the algorithm terminates and the answer is on the stack; other wise add 1 to k and goto step 2.

direct addressing & indirect addressing

  • Direct addressing

another simple method for specifying an operand is to give the address of the memory word where the operand is contained. in other words a method for specifying an operand in memory is just to give its full address.this form is called direct addressing.

in this type of addressing the memory word can be longer than that of the operand part which is not in case of immidiate addressing.

like immidiate addressing,direct addressing is restricted in use: the instruction will always access exactly the same memory location. so while the value can change,the location cannot.
thus direct addressing can only be used to access global variables wose address is known at compile time.


  • Indirect addressing
direct addressing is a scheme in which the data address specifies which memory word or register contains the operand. indirect addressing is a scheme in which the address specifies which memory word/register contains not the operand but the address of the operands.

some machine allow multilevel indirect addressing.in this addressing mode, a pointer is used to locate memory word that itself points to another memory word.and so on.immidiate ,direct ,indicate and multilevel indirect addressing exhibit a certain progression.

immediate addressing requires 2 memory references, 1 for the pointer and 1 for the operand. multi-level indirect addressing requires at least 3 memory refrences, two or more pointers and one for the operand. memory refrences in this context include register refrences.

immediate addressing

this is the simplest way for an instruction to specify an operand. in this type of addressing the address part of instruction actually contain the operand itself rather than an address of other information -describing where the operand is.

such an operand is called "immediate operand" because it is automatically fetched from the memory and the same time the instruction itself is fetched; hence it is immediately available for use.

  • advantages:
  1. it could use less memory because it does not require an extra memory reference to fetch an operand.
  2. instruction execution time will be less as instruction itself contains operands.
  • disadvantages
  1. restricting the operand to a number that can fit in an address field.in and instruction will 3 bit address, the operands would be restricted to 3 bits, which limit their usefulness.
  2. only constant can be supplied this way.

for example IBM 370 has MOVE,COMPARE, BOOLEAN OPERATION as well as sevral other instruction that contain 1 byte immediate operand.

18 March 2009

what is MCSE?

A Microsoft Certified Systems Engineer (MCSE) is a person who is certified by Microsoft to work with networking concepts and operation systems. Several years ago, Microsoft opened up learning and training centers all over the country to teach people how to become MCSE qualified within the Microsoft platforms, and interest has been booming ever since.

A person who is interested in becoming an MCSE has to pass a credit-by-exam test. This allows a person to work within the latest system. With each new system that comes out, however, there are other certified exams that an MCSE must take and pass in order to maintain certification. For instance, if an MCSE is certified for the year 2002 and 2000, he or she must take at least two certification exams – one for each year of certification.

This upgrading of certification continues as long as the person wishes to continue to be an MCSE. The reason for the testing, and for proving proficiency for each year, is that Microsoft is changing constantly, and the information for earlier operating and networking systems changes with each new application.

To become certified by Microsoft, one must take the Microsoft Certification Exam at a designated Testing Center. Microsoft offers courses to help students pass the MCSE exams. There is, however, limited seating for the courses. At the same time, the training centers run courses constantly in order to serve as many of those who want to become an MCSE as possible.

It takes time and commitment to get through the courses necessary to become an MCSE. Depending on how much time a student devotes to the process, however, it can take as little as a year. On the other hand, the courses can take as long as two years. A student who already has an Associate in Science degree and has applied computer knowledge can often make it through the program even faster.

There is a very high demand for MCSE qualified individuals. Employers see the certification as a plus when hiring a new employee, especially in the field of computers or communications. Although potential employers also consider experience, the certification shows that the potential employee has a defined knowledge of how Microsoft systems work.



Microsoft continues to dominate the information technology industry, and thousands of students who complete their degree program in the areas of computer science or technology can further their career by becoming a Microsoft Certified Systems Engineer. MCSE Certification is the official designation for the Microsoft Certified Systems Engineer, and allows a candidate to earn a higher-than-average salary, pursue better job opportunities, and maintain their skills and knowledge as they further their career.



What is MCSE Certification?

Technology professionals who become MCSE certified can work in roles that involve designing and implementing the infrastructure on the Microsoft Windows 2000 Server platform or the Windows Server System. MCSE Certification is a valuable commodity in today’s high-tech sphere, and prospective employers are looking for candidates who are already MCSE-certified because of the high costs associated with MCSE training. MCSE training programs can take place in both an on-site or online learning environment, but students also have an option to take a self-study course independently.

MCSE Training: MCSE Courses and Program Descriptions

MCSE training programs allow Microsoft Systems Engineers to prepare for the four key exams necessary for certification. An MCSE student needs to pass four designated operating system exams and two elective exams; these test the professional’s’ knowledge and skills in the areas of systems networking, server management, and desktop networking systems. The four operating exams that MCSE training prepares students for are:

*

NT Server
*

NT Workstation
*

Networking Essentials
*

NT Server in the Enterprise

The two elective exams cover areas in Microsoft BackOffice products.

  • What Does MCSE Training Provide?

    MCSE training allows candidates to oversee and manage several tasks involved with networks and computer systems. Common job tasks and responsibilities after completing MCSE courses include:

    *

    Troubleshooting network computer systems
    *

    Checking for software errors
    *

    Monitoring bugs in network systems and software
    *

    Backing up company information for valuable data
    *

    Running diagnostics and scanning computer systems for viruses
    *

    Monitoring and reporting network crashes
    *

    Conducting training classes for employees or business professionals in the office work environment
    *

    Updating computers with the latest software patches

    Key Benefits of MCSE Certification

    MCSE Certification allows candidates to join an active community of technology professionals located around the world, and enhance their career credentials and experience with ongoing training. Key benefits of MCSE Certification include:

    *

    Staying current with server based systems designs and technologies
    *

    Having access to technical resources for any project or work order
    *

    Career and certification planning resources to make it easier to move up in a position
    *

    Networking opportunities with other Microsoft Certified Professionals, both online and offline
    *

    Discounts and rebates on industry-related magazines and software programs
    *

    An MCSE logo for resumes and websites, as well as an official MCSE lapel pin
    *

    Free access to Microsoft Certified Professional Magazine Online
    *

    A higher level of job satisfaction

    Enrolling in an MCSE Online Course Program

    MCSE online course programs allow students to obtain the training and skills they need to successfully pass each exam. These MCSE courses can be designed to simulate the computing environments using the Microsoft Windows Server and other products, so students can gain the hands-on experience and skills they need to create and develop various projects.

    Online MCSE certification makes it easy for non-traditional students to obtain their MCSE credentials from the comfort of home or their work office. Online MCSE certification programs may be comprised of:

    *

    Online training videos
    *

    Hands-on exercises
    *

    Online quizzes, tests and examinations
    *

    Computer labs
    *

    Collaborative group projects
    *

    CD and DVD training as a course supplement
    *

    Web-based study guides and support forums
  • How MCSE Bootcamp Courses Work

    MCSE bootcamp courses and programs are designed for accelerated learning, and are most valuable for candidates who need to complete their MCSE certification in a short period of time for a prospective employer, or other personal reasons. MCSE bootcamp courses can be taken either online, or over the Internet in a virtual classroom setting. These types of self-study programs allow students to complete tests and quizzes, submit coursework and take part in computer labs and hands-on exercises in a ‘condensed’ learning format.
  • MCSE Certification and Training Tips
    If you intend to make a career out of computers, than with MCSE training, you will not only get a boost in your career but also an increase in your pay scale. MCSE is the acronym for Microsoft Certified Systems Engineer and its certification indicates your increased knowledge and understanding of the working of Microsoft.What is MCSE?
    MCSE is used in computer systems running on Microsoft Windows 2000 or 2003 and with MCSE training, you are prepared for facing any problems associated with the infrastructure design of a system or the analysis of a company's requirements before the implementation of a design. And so with MCSE training, you will be recognized for your knowledge and proficiency in Microsoft products and services. This in turn is a major asset for the organization you join as it makes you ready for the different infrastructural implementation found in different businesses.The MCSE Certification Process
    To get a MSCE certificate, you will have to undergo some intensive MSCE training. There is no point in your trying to go through the extensive coursework that come with MSCE training. This only proves to be time consuming, where you will not be able to answer the related exams on the stipulated time. So the best thing to do is to join a local training center for MSCE training. On joining these centers, you are helped through coursework and practical with the help of professionals. The professionals help you in your exam preparation through career oriented study. The most important thing to remember about MCSE training is to understand the coursework thoroughly. With this done, you will be able to answer exams on time, and at the same time, be aware of the practical applications of Microsoft products and services.Computer Based MCSE Training
    If you find that there are no good training centers or boot camps that will provide you MCSE training in your neighborhood, you can always visit the internet. The internet will give you MCSE training through thousands of tutorials and study guides that are found on the internet. Many people prefer taking MCSE training this way, or at least use CD-ROMS and books as a form of MCSE training for MCSE. In fact, Microsoft has also released a MCSE training kit that helps candidates not only learn the skills needed on a job, but also gives them the required knowledge for the exams.MCSE Training Centers and Boot Camps
    If you join training centers for your MCSE training, you find that most of the MCSE training classes here are conducted per your convenience. Most of these centers are open for quite a long time everyday where it is up to you to choose the most convenient timings for your MCSE training. The advantage of attending these training centers for your MCSE training is that there is a restricted number of participants in each group. With this, each member will thus receive individual MCSE training from MCSE experts. However people who want to go through intensive MCSE training to pass its exams, there are quite a few centers that conduct boot camps. These boot camps run the length of the coursework to culminate with an exam in two to three weeks' time. This is the better option for working men and women who don't have the time to attend regular classes for MCSE training, but still be able to take the exam on time.