99
(COMPUTER INFO-GALLERY VOLUME - 4 (2015-16) Students’ Assignments as IT Encyclopedia

(2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

(COMPUTER INFO-GALLERYVOLUME - 4(2015-16)

Students Assignments as

IT Encyclopedia

Page 2: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

PREFACEThis book is intended to make the new-comers (students) to the Department of

Computer Science (UG), who does not have the ideas regarding the basics of the

Computer and its terminologies. It can also help the students from computer backdrop, to

make a review regarding IT terminologies and concepts. Already 3 Volumes has been

launched during 2012-15.

The thought of publishing this book arises as a sparkle to make the Student’s

Assignments, in an organized manner. I had an idea that, if the topics given to the students

to prepare their Assignments are non-repetitive, then they may do it without copying

others’ content. Then, I thought why not we club it together in the form of a book, which

will help other students also. That is how this book got emerged. This is 4th Volume for the

academic year 2015-16 with some other useful contents to make the students very well

equipped in the foundation level especially for the students who come into the area of

Autonomous.

The copy of this book will be maintained in the Department Library and also the

e-content of this has been posted in our college website. I hereby deliver my heartfelt

thanks to the most respected Correspondent Sir, the honorable Principal Sir, and the

beloved H.O.D. (CS) Prof .P.Ramesh sir, who gave me the freedom, to conduct an activity

of this kind. I thank my colleagues and my senior facultymembers who have given me a

moral support. I also thank my dear students for their co-operation. I hereby assure that the

Department of Computer Science (UG) will always find ways for the betterment of the

students.

Thanking You,

INFO- GALLERY IN-CHARGE

( R.Sundar Raj)

Page 3: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

��DEX

Topic No. TOPIC Page No.

01 ASYMMETRIC DIGITAL SUBSCRIBER LINE (ADSL) 0102 ADWARE 0303 ACCELERATED GRAPHICS PORT (AGP) 0504 APPLICATION PROGRAMMING INTERFACE (API) 0705 BASE STATION 0906 BATCH FILE 1107 BLIND CARBON COPY (BCC) 1308 BETA SOFTWARE 1509 BING SEARCH ENGINE 1710 BITTORRENT 1911 BINARY LARGE OBJECT (BLOB) 2112 BLOG 2313 BOOT DISK 2514 BUFFER 2715 BURNING A DISC 2916 CAPTCHA 3117 CACHE MEMORY 3318 COMPUTER AIDED DESIGN (CAD) 3519 CHARGE COUPLED DEVICE (CCD) 3720 COMMON GATEWAY INTERFACE (CGI) 3921 CHIPSET 4122 CHARACTER LARGE OBJECT (CLOB) 4323 CLOCK CYCLE 4524 CLONE SOFTWARE 4725 CLOUD COMPUTING 4926 CLUSTER 5127 COMPUTER DAEMON 5328 DATA TRANSFER RATE 5529 DATA TYPES 5730 DATA DEFINITION LANGUAGE (DDL) 59

Page 4: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

Topic No. TOPIC Page No.

31 DIAL-UP CONNECTION 6132 DIALOG BOX 6333 DIGITAL SIGNATURE 6534 DIRECT 3D 6735 DIRECT MEMORY ACCESS (DMA) 6936 DOMAIN NAME SYSTEM (DNS) 7137 DONGLE (ADAPTER) 7338 EMOTICON 7539 ENCAPSULATED POST SCRIPT (EPS) 7740 EXPANSION CARD FOR PRINTERS 7941 FILE ALLOCATION TABLE (FAT) 8142 FLAT FILE 8343 GEOGRAPHIC INFORMATION SYSTEMS (GIS) 8544 GNUTELLA NETWORK 8745 GOOGLE DRIVE 89

Page 5: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

BESTWISHES

To all of your present and future innovations for

the betterment of our students and the Institution

H.O.D Principal Correspondent

Page 6: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

Assignment Contributions

Class : I B.Sc (CS) - 'A'

S.No Name Topic No. page No.01 ANANDHI .B .M 01 0102 PRIYA .P 02 0303 HARIHARAN .E 03 0504 MUHAMUDHA SHILFA .M 04 0705 VINOTHAN .S 05 09

Under the guidance of : Mr. A.R.karthekeyan

Class : I B.Sc (CS) - 'B'

S.No Name Topic No. page No.06 NANDHA KUMAR ARASU .V 06 1107 PRAVIN RAJA .L 07 1308 PRABHU .A 08 1509 LOGESHWARAN .V 09 1710 SANJOY .S .M 10 19

Under the guidance of : MS. V.MANIMEKALAI

Class : I B.Sc (CS) - 'C'

S.No Name Topic No. page No.11 SREEMATHI .S 11 2112 SURESH KUMAR .P 12 2313 DHARSHNE .M 13 2514 MUTHUMANIKANDAN .B 14 2715 CHAITHRA .B.R 15 29

Under the guidance of : MS. P.THENMOZHI

Page 7: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

Class : II B.Sc (CS) - 'A'

S.No Name Topic No. page No.16 HARSHINI .U.D 16 3117 BHAVANIVETHA .C 17 3318 PRIYADHARSHINI .S .M 18 3519 HARIHARAN .P 19 3720 KARUPPUSAMY .P 20 39

Under the guidance of : MS. R.PUSHPALATHA

Class : II B.Sc (CS) - 'B'

S.No Name Topic No. page No.21 HEMA .J 21 4122 MYTHILI .R 22 4323 SIVAKUMAR .G. C 23 4524 DHARANI SREE .S 24 4725 KARTHIKEYAN .M 25 49

Under the guidance of : MS. R.SAVEETHA

Class : II B.Sc (CS) - 'C'

S.No Name Topic No. page No.26 PAVITHRA .P 26 5127 JITHIN JOY 27 5328 BALAKUMAR .V 28 5529 NAVIN KUMAR .S 29 5730 MEENAPRIYA .N 30 59

Under the guidance of : MR. D.GOPINATH

Page 8: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

Class : III B.Sc (CS) - 'A'

S.No Name Topic No. page No.31 NAVEEN KUMAR .R 31 6132 ANANDHARAJ .P 32 6333 KEERTHANA .V 33 6534 VIMALA .M 34 6735 RAMYA .P 35 69

Under the guidance of : MS. S.GOWTHAMI

Class : III B.Sc (CS) - 'B'

S.No Name Topic No. page No.36 MEENA .S .P 36 7137 PRASANTH .S 37 7338 ARTHI .T 38 7539 SURESH .E 39 7740 DEEPIKA .K 40 79

Under the guidance of : MS. K.GOMATHY

Class : III B.Sc (CS) - 'C'

S.No Name Topic No. page No.41 MANIKANDAKARTHI .G 41 8142 VIGNESH .K 42 8343 SANDHIYA .C 43 8544 SNEHA .M 44 8745 DINESH BALAJI .S 45 89

Under the guidance of : MR. T.VELUMANI

Page 9: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

01. ASYMMETRIC

Introduction

Asymmetric digsubscriber line (DSL) tecenables faster data transmisvoice band modem. The 'Abandwidth between downlo1.5 to 9 Mbps when receiviwhen sending data (upstrereceive Internet access in a direction for the download

Overview

ADSL works by utilizcall. A special filter, callsubscriber's telephone lineservices to be used at the sconnection are that, firstly,be uploaded than downloaavoid overloading of their buses such as file sharing whcommunication is full-dup

IC DIGITAL SUBSCRIBER LINE

digital subscriber line (ADSL) is a typtechnology, a data communications techmission over copper telephone lines than a 'A' in ADSL refers to the unequal distribunloads and uploads. ADSL supports data riving data ( downstream rate) and from 16 stream rate). ADSL as a service for co a relatively passive mode: able to use the

ad from the internet.

ilizing frequencies that are not used by a voialled a micro filter or DSL filter, is inne to allow both ADSL and regular voicee same time. The marketing reasons for anly, most uses of internet traffic will requireloaded Secondly internet service providersir backbone connections, have traditionally which generate a lot of uploads. Currently,uplex. Full-duplex ADSL communication

E (ADSL)

type of digitalechnology that a conventional

ribution networkta rates of from16 to 640 Kbps

r consumers tohe higher speed

voice telephone installed on aice (telephone)

r an asymmetricire less data toers, seeking to

lly tried to limittly, most ADSLtion is usually

Page 10: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

achieved on a wire pair cancelling duplex (ECD), o

Operation

The total maximum reported by DSL modems a

ADSL initially exnamely CAP and DMT. CAup until 1996, deployed However, DMT was choseG.992.2 (also called G.dminstallations of ADSL are b

Purpose

ADSL is designdownloads large amounts uploads relatively less often

In other respecassociates with DSL, includof voice and data support,physical distance. Since thdownload speed, the telenecessity, hence ADSL.

ir by either frequency-division duplex (FD), or time-division duplex (TDD).

m capacity derived from summing the bis and is sometimes termed sync rate.

existed in two versions (similar CAP was the de facto standard for ADSL d in 90 percent of ADSL installations osen for the first ITU-T ADSL standards, .dmt and G.lite respectively). Therefore

re based on the DMT modulation scheme.

igned to support the typical home user whts of data from Web sites and online n

ften.

pects, ADSL possesses all of the characluding high-speed service, an "always on" rt, and availability and performance that i

e the typical home user in fact does preelephone companies chose to make a v

(FDD), echo-

bits-per-bin is

ar to VDSL),SL deployments

s at the time.s, G.992.1 andre, all modern

.

who frequently networks but

racteristics onen" combinationat is limited byprefer a higher virtue out of

Page 11: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

Adware is free softwadware programs are toolbarsyour Web browser. They inyour hard drive and better or

Adware is software thcontrols on the internet. Adwto display advertisements oadvertising websites, and col

Adware, or advertisiautomatically renders adverThe term is sometimes uadvertisements known as m

Adware has been crituser’s personal information

authorization or knowledgprompted an outcry from coElectronic Privacy Informa

02. ADWARE

ftware that is supported by advertisemebars that sit on your desktop or work in con include features like advanced searching or organization of your bookmarks and shortc

that is installed together with software odware is the name given to programs that

s on your computer, redirect your searchcollect marketing-type data about you.

tising-supported software, is any software vertisements in order to generate revenue fs used to refer to software that displays malware.

riticized because it usually includes code ion and passes it on to third parties, witho

dge. This practice has been dubbed spyw computer security and privacy advocates, i

rmation Center.

ments. Commonconjunction withg of the Web orrtcuts.

or via activexat are designedrch requests to

re package thate for its author.lays unwanted

de that tracks athout the user’s

yware and hass, including the

Page 12: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

Two mainways of ways in which Adware can get onto your computer

Via freeware or shareware: Adware can be included within somefreeware or shareware programs-as a legitimate way of generatingadvertising revenues that help to fund the development and of thefreeware or shareware program.Infected websites: A visit to an infected website can result inunauthorized installation of Adware on your machine. Hackertechnologies are often used. For instance, your computer can bepenetrated via browser vulnerability, and Trojans that are designed forstealthy installation can be used. Adware programs that work in this wayare often called Browser Hijackers.

Anti-Adware

Anti-adware refers to any software utility that scans your system andremoves adware, spyware, key loggers, Trojans, and other malicious code fromyour computer. Some of these programs are undetectable to anti-virus softwareand many users now use an anti-adware utility in addition to anti-virus softwareto protect their system.

Difference Between Spywares, Malwares, Adwares &Trojan

Spywaresare the programs which are used to monitor/Log the activityperformed on a computer. These are used to spy on someone either forlegal or illegal purpose.

Example: Key logger applications.

Malwares are the program with malicious intention. It can be damagingyour computer, spying on you or any other malicious taskAdwares are the programs which delivers ads to your computer(generally in POP-UP’s form). They consume your network.

Trojan is a program which is used to gain access to a computer byinstalling a program on infected PC to open some backdoor.

Page 13: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

03. ACCELERWhat is AGP?

The Accelerated Grapoint-to-point channel for attassist in the acceleration of 3

It was originally desigcards.

History

The AGP slot first aSocket 7 Intel P5Pentium ansupport with the i440lx Slot

The first Socket 7 ch5591/5592, and the ALI Alad

FIC demonstrated theas the FIC PA-2012 based oby the epox P55-VP3 also market.

Early video chipsets feV2200, 3dfxvoodoo BansheATI Rage series, Matrox Mil

ERATED GRAPHICS PORT (AGP

raphics Port (often shortened toAGP) isr attaching a video card to a computer systemf 3D computer graphics.

signed as a successor to PCI-type connect

t appeared on x86-compatible system boaand Slot 1P6Pentium II processors. Intel intot 1 chipset on August 26, 1997. chipsets to support AGP were the viaapladdin V.

the first Socket 7 AGP system board in Nod on the VIA Apollo VP3 chipset, followedlso based on the VIA VP3 chipset which

ts featuring AGP support included the Renshee, nvidiariva 128, 3Dlabs PERMEDIA Millennium II, and S3 virge GX/2.

GP)

) is a high-speedtem, primarily to

ections for video

boards based on introduced AGP

aapollo VP3, sis

November 1997ed very quickly

ich was first to

Rendition VeriteIA 2, Intel i740,

Page 14: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

6

Versions

AGP and PCI: 32-bit buses operating at 66 and 33 MHz respectively

Specification Voltage Clock SpeedTransfers/clock Rate (MB/s)

PCI 3.3/5 V 33 MHz — 1 133

PCI 2.1 3.3/5 V 33/66 MHz — 1 266

AGP 1.0 3.3 V 66 MHz 1× 1 266

AGP 1.0 3.3 V 66 MHz 2× 2 533

AGP 2.0 1.5 V 66 MHz 4× 4 1066

AGP 3.0 0.8 V 66 MHz 8× 8 2133

AGP 3.5* 0.8 V 66 MHz 8× 8 2133

Power consumption

AGP power provisioning

Slot Type 3.3 V 5 V 12 V 3.3 V Aux 1.5 V 3.3 V 12 V Total power

AGP 6 A 2 A 1 A 0.375 mA 2 A - - 48.25 W

AGP Pro110 7.6 A 9.2 A 50 to 110 W

AGP Pro50 7.6 A 4.17 A 25 to 50 W

Legacy useBy 2010 few new motherboards had AGP slots. No new motherboard

chipsets were equipped with AGP support, but motherboards continued to beproduced with older chipsets with support for AGP.

Graphics processors of this period use PCI-Express, a general-purpose (notrestricted to graphics) standard that supports higher data transfer rates and full-duplex.

Page 15: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

7

04 .APPLICATION

API Stands for "Appreferred to as an "Applicacommands, functions, and psoftware for a specific opera

API in Object Oriented La

Object API is a descrilanguage- usually it isclass methods.

For example:

In Java if the class Scin text-based programsThe API can be conexposed by the classes

API Libraries and Framew

An API is usually represcribes the expeimplementation of this

7

ON PROGRAMMING INTERFACE

pplication Program Interface," though it lication Programming Interface." An API d protocols which programmers can use werating system.

d Language

scription of how object works in a given ot is expressed as a set of classes with an ass

Scanner is to used(a class that reads inputsms)onceived of as a totality of all the metses called an interface.

ework

related to a software library. The API xpected behavior while the library ithis set of rules.

7

CE (API)

it is sometimesPI is a set of

e when building

n object-orientedassociated list of

uts from the user

ethods publicly

PI describes and is an actual

Page 16: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

8

API can also be related to a software framework. The overall program flowof control can be out of the control of the caller, and in the hands off theframework inversion of the control or a similar mechanism.

API In Design

API’s proposed the concept of information hiding in 1972. Principle of

information hiding is that one may divide software into modules, each ofwhich has a specified interface.Software architecture is dedicated to creating and maintaining high levelsoftware structures which typically include modules.API are designed in the real world, one must also understand the structuresof software engineering organization.

API in Documentation

Professional-level documentation for an API should strive to include the followingparts:

Reference documentation:A description of the function and objects in the API

Overview and concepts:A narrative description of the different parts of the API and howthey interact. Major frame works in the API, such as its GUI,network and file system frameworks should have their ownseparate section.

SDK tools documentation:Documents that describe how to install and use build, compile, anddeploy tools

License information:Documents that describe the API license

Page 17: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

9

Introduction

The term "base stationside of the road that relay cemade within their area, retransmitting it to the other.

A base station is thewired phones. It's what allophone.

The base station, a wi

A 1980s cons

The term base stationcomputer networking and otin surveying it is a GPScommunications it is a transanother and/or to a wider are

In a computer networkthe network, possibly connec

9

05. BASE STATION

tion" was first used to refer to the towers y cell phone calls. These stations handle all

receiving information from one end of r.

the interface between wireless phones anallows you to use your cell phone to call

wireless system, uses microwave radio com

onsumer-grade Citizens' band radio (CB) base station

on is used in the context of mobile telepho other wireless communications and in lan

PS receiver at a known position, while ransceiver connecting a number of other dearea.

ork it is a transceiver acting as a router fornecting them to a local area network and/or

9

rs you see on the all cellular callsof the call and

and traditionalcall your home

ommunication.

phony, wirelessland surveying:ile in wireless

r devices to one

for computers in/or the internet.

Page 18: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

10

Land surveying

In the context of exteran accurately-known fixed lofor nearby portable GPS rece

Computer networking

In the area of wirelereceiver/transmitter that servalso be the gateway between

Wireless communications

In radio communicatioinstalled at a fixed locate Teof one of the following:

Media

Close-up of a base City, Mexico. There are thre120-degree segment of the hlinks the site with the telepho

10

ternal land surveying, a base station is a GPSd location which is used to derive correctionreceivers.

reless computer networking, a base statioerves as the hub of the local wireless netwen a wired network and the wireless networ

s

ations, a base station is a wireless communicTerrestrial Trunked ion and used to commu

e station antenna in Mexicothree antennas: each serves ae horizon. The microwave dishphone network.

10

GPS receiver ation information

ation is a radioetwork, and mayork.

nications stationmunicate as part

Page 19: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

11

06. BATCH FILE

Meaning

A batch file is a kind of script file in DOS, OS/2 and Windows. It consists ofa series of commands to be executed by the command line interpreter stored ina plain text file. A batch file may contain any command the interpreter acceptsinteractively and use constructs that enable conditional branching and loopingwithin the batch file, such as "if", "for", "go to" and label similar to Job ControlLanguage (JCL) and other systems on mainframe and minicomputer systems, batchfiles were added to ease the work required for certain regular tasks by allowing theuser to set up a script to automate them. When a batch file is run, the shell program(usually COMMAND.COM or cmd.exe) reads the file and executes its commands,normally line-by-line.

Unix-like operating systems (such as Linux) have a similar but moreflexible type of file called a shell script. The filename extension .bat is used inDOS and Windows. Windows NT and OS/2 also added .cmd. Batch files for otherenvironments may have different extensions,e.g. .btm in 4DOS, 4OS2 and 4NT related shells. The detailed handling of batchfiles has changed. Some of the detail in this article applies to all batch files whileother details apply only to certain versions.

DOS

In MS-DOS, a batch file can be started from the command line by typing itsname followed by any required parameters and pressing the "enter" key. WhenMS-DOS loads, the fileAUTOEXEC.BAT is automatically executed. So anycommands that need to be run to set up the MS-DOS environment for use could beplaced in this file. Computer users would have the autoexec file set up the systemdate and time, initialize the MS-DOS environment, load any resident programs ordevice drivers, or initialize network connections and assignments.

In MS-DOS the extension ".bat" identified a file containing commandswhich could be executed by the command interpreter COMMAND.COM line byline as if it was a list of commands to be entered, with some extra batch-file-specific commands for basic programming functionality, including a GOTOcommand for changing flow of line execution.

Page 20: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

12

Early windows

Microsoft Windows was introduced in 1985 as a GUI-based alternative totext-based operating systems and was designed to run on MS-DOS. In order tostart it, the win command was used, which could be added to the end ofthe AUTOEXEC.BAT file to allow automatic loading of Windows. In the earlierversions, one could run a .bat type file from Windows in the MS-DOSPrompt. Windows 3.1x and earlier, as well as Windows 9x invokedCOMMAND.COM to run batch files.

OS/2

The IBM OS/2 operating system supported DOS-style batch files. It alsoincluded a version of REXX, which was a more advanced batch-file scriptinglanguage. IBM and Microsoft started developing this system, but during theconstruction of it broke up after a dispute; as a result of this, IBM referred to theirMS-DOS-like console shell without mention of Microsoft, naming it just DOS,although this seemingly made no difference with regard to the way batch filesworked from COMMAND.COM. OS/2's batch file interpreter also supports anEXTPROC command. This passes the batch file to the program named on theEXTPROC file as a data file. The named program can be a script file.

Windows NT

Unlike Windows 9x and earlier, the Windows NT family of operatingsystems does not depend on MS-DOS. Windows NT introduced an enhanced 32-bit command interpreter (cmd.exe) which could execute scripts with either the.CMD or .BAT extension. Cmd.exe added additional commands, and implementedexisting ones in a slightly different way, so that the same batch file (with differentextension) might work differently with cmd.exe and COMMAND.COM. In mostcases, operation is identical if the few unsupported commands are not used.Cmd.exe's extensions to COMMAND.COM can be disabled for compatibility.Microsoft released a version of cmd.exe for Windows 9x and ME calledWIN95CMD to allow users of older versions of Windows to use certain cmd.exe-style batch files.

As of Windows 8, cmd.exe is the normal command interpreter for batchfiles; the older COMMAND.COM can be run from within a cmd.exe window in32-bit versions of Windows able to run 16-bit programs.

Page 21: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

13

07. BLI

Definition of blind carbon c

BCC Stands for "Blindperson, you type the recipimessage to more than one p"Cc:" and "Bcc:" fields. "Cc"Blind Carbon Copy." A carto one or more recipients. Bfield) and the Cc'd recipienWhen a message is blind carecipients can see the addres

Blind carbon copyingwithout the main recipient kand then forwarding the senetiquette to use Bcc when e-mail addresses from beingfor spamming purposes. Howsent a message, use carbon c

13

LIND CARBON COPY (BCC)

n copy

lind Carbon Copy." When you send an e-macipient's address in the "To:" field. Whene person, you have the option to enter ad"Cc" stands for "Carbon Copy," while "Bccarbon copy, or "Cc's" message is an e-mail. Both the main recipient (whose address iients can see all the addresses the message carbon copied, neither the main recipient resses in the "Bcc:" field.

ing is a useful way to let others see an e-t knowing. It is faster than sending the ori sent message to the other recipients. It en copying a message to many people. Thiing captured by someone in the list who mowever, if it is important that each recipie

n copy (Cc) instead.

13

-mail to only onehen you send aaddresses in the"Bcc" stands forail that is copieds is in the "To:"age was sent to.nt nor the Bcc's

e-mail you sentoriginal message It is also goodhis prevents the might use thempient knows who

Page 22: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

14

Advantages of blind carbon copy

1. To send an email to the second person without the first person knowing2. Sending through a Mailing List or Newsletter3. Protecting the second person by not sharing their email address to the first

Person

Benefits

There are a number of reasons for using this feature:

• Bcc is often used to prevent an accidental "Reply All" from sending a replyintended for only the originator of the message to the entire recipient list.

• To send a copy of one's correspondence to a third party (for example, acolleague) when one does not want to let the recipient know that this isbeing done (or when one does not want the recipient to know the thirdparty's e-mail address, assuming the other recipient is in the To: or Cc:fields).

• To send a message to multiple parties with none of them knowing the otherrecipients. This can be accomplished by addressing a message to oneself andfilling in the actual intended recipients in the Bcc: field. However, this doesnot ensure that the Bcc: addresses will be hidden from other Bcc: addressesin all implementations.

• To prevent the spread of computer viruses, spam, and malware by avoidingthe accumulation of block-list e-mail addresses available to all Bcc:recipients, which often occurs in the form of chain letters.

Disadvantages of blind carbon copy

In some cases, use of Blind Carbon Copy may be viewed as mildlyunethical. The original addressee of the mail (To: address) is left under theimpression that communication is proceeding between the known parties, and isknowingly kept unaware of others participating in the primary communication. Arelated risk is that by (unintentional) use of 'reply to all' functionality by someoneon Bcc, the original addressee is (inadvertently) madeaware of this participation.For this reason, it is in some cases better to separately forward the original e-mail.

Page 23: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

15

0

Definition of beta software

A pre-release of softwunder real conditions. Beta vare generally fairly close in design changes often occur a

Advantages and disadvanta

The Beta version of errors, bugs and crashes can it helps to enhance the softproduct/software is launcheAnother advantage of the safeedback. Imagine a companusers, and then paying thecompany.

Also, even if the comwould always be a considerasoftware globally would tak

15

08. BETA SOFTWARE

re

ftware that is given out to a large group ota versions have gone through alpha testingin look, feel and function to the final prodr as a result.

ntages of beta software

of any software is made available globaan be reported by real time users. This is adoftware performance and make it failure freched on a larger scale with a high perfo same is that it provides a fast and less co

pany employing so many testers as there arethem. This would sum up to a huge am

ompany does appoint so many testers, the deration and a point of concern. Many peotake very less time, and the varied dimensi

15

p of users to trying in house and

roduct. However,

bally so that its advantageous ase free when theerformance rate. costly software are beta versionamount for the

he time durationpeople using thensions of testing

Page 24: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

16

would be highly fruitful. Allof renting a disk space on the

About beta software

Find beta releases all apps, music players, etc.

development and to comparethrough multiple phases: egg

As products develop, and release candidate. Usag

IBM as early as the 1950s.cycle before, but let’s delve a

The pre-alpha phase

The pre-alpha phase first round of testing. Of cotesting products in an iterati

the pre-alpha phase refers toThis phase encapsula

collection, requirements asoftware engineering. That’

gives an idea of how mucdevelopment.

16

All the costs that the company has to bear the internet and good popularity of the prod

all over the place: operating systems, videc. The term “beta” refers to a produc

pare it to the life cycle of insects, which tggs, larva, pupa, and adult.

p, they go through a similar cycle: pre-alphsage of the “alpha/beta” labeling can be t

0s. It may have heard about the softwaree a little deeper into what these terms mean

se is the portion of development that occuf course, a properly managed project will rative manner, so I suppose it’s more accura

to everything that happens before official tulates many different activities: market r analysis and documentation, software at’s probably a load of mumbo-jumbo, buuch work is involved even before a p

16

ar would be thatroduct.

ideo games, webduct’s stage of

h typically goes

lpha, alpha, beta,e traced back to

are developmentean.

ccurs before theill constantly beurate to say that

al testing begins.t research, datare design, and but hopefully it product begins

Page 25: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

17

09. B

Bing (known previouSearch) is a web search engin

Features

Interface features

Daily changing of bacplaces in the world, sports. The backgroelement(s) shown in thVideo homepage for Hto the daily backgrounSublinks – On certaisection links within tincluding Google).Enhanced view whereBing.On certain sites, searchOn certain sites, Binresults page.

17

. BING SEARCH ENGINE

ously as Live Search, Windows Live Seargine from Microsoft.

background image. The images are mostly rld, though it sometimes displays animalsground image also contains information the image.r HTML5 enabled browsers on occasional eund images.

rtain search results, the search result pagn the article (this is also done on other se

here third party site information can be v

rch from within the website on the results pBing will display the Customer Service n

17

Search, and MSN

ly of noteworthyals, people, andtion about the

al events, similar

age also shows search engines,

e viewed inside

ts page. number on the

Page 26: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

18

Media features

Video thumbnail Preview– where, by hovering over a video thumbnail, thevideo automatically starts playing.Advanced filters or advanced (query) operators– allow users to refine searchresults based on properties such as image size, aspect ratio, color or blackand white, photo or illustration, and facial features recognitionVideo search with adjustable setting for length, screen size, resolution, andsource

Integration with Hotmail

With Hotmail’s "Quick Add" feature, users can insert derivatives of Bingsearch results such as restaurant reviews, movie times, images, videos, andmaps directly into their e-mail messages.

Integration with Facebook

Bing's search results can display one's Facebook friends when a Facebookaccount is linked with Bing via Facebook Connect.Users have the option to send messages to their friends in the search results.As part of the changes announced May 10, 2012 the "sidebar" column of thenew three-column search results display will include recommendations fromFacebook and the ability to interact with others from the same page.For the previous year, search results had included Facebookrecommendations using the "like" button, but most users did not want this;the new display makes this feature separate from search results in general.

Integration with Apple

Apple's search results have now been integrated with Bing's web searchengine.On June 10, 2013, Apple announced that it will be dropping Google as itsweb search engine and include Microsoft's Bing.This feature is only integrated with ios 7 and higher and for users with aniphone 4S or higher as the feature is only integrated with Siri, Apple'spersonal assistant.

Page 27: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

19

Definition of bittorrent

BitTorrent is a peer-tothe bandwidth required to traacross multiple systems, thecomputer. For example, if asystem will locate multiple the file from several compdownload speeds than uploasignificantly increase the file

In order to use the Biis a software program that allows you to search for fiprogress downloads. Most have been paused or stoppelarge files.

About bittorrent

BitTorrent Inc. is an InThe design distributed technedge, and keep creators andthan 170 million people usmuch as 40% of the world's I

It is used to build anations to create better ways

19

10. BITTORRENT

r-to-peer (P2P) file sharing protocol desigo transfer files. It does this by distributingthereby lessening the average bandwidth f a user begins downloading a movie file, tle computers with the same file and beginmputers at once. Since most ISPs offer load speeds, downloading from multiple cfile transfer rate.

BitTorrent protocol, you need a BitTorrentat accesses the BitTorrent network. The cr files and begin downloading torrents, wst BitTorrent clients allow you to resumeped. This can be especially helpful when

n Internet technology company based in Schnologies that scale efficiently, keep intelnd consumers in control of their content anuse our products every month. Our proto's Internet traffic on a daily basis.

a better Internet. To work with people, iys to move information. Better ways for cre

19

signed to reduceing file transfersth used by eache, the BitTorrentgin downloadingffer much fastere computers can

rent client, whiche client program, which are in-me torrents thaten downloading

n San Francisco.telligence at thet and data. More

rotocols move as

e, industries andr creators to make

Page 28: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

20

money. New ways for fans to engage, on their terms. Ways to sustain the stuff weshare. The Internet promised us this much. And we promise to make good on it.We believe in an Internet of options, not rules.

Bittorrent DNA

BiTorrent DNA is a disruptively effective content delivery technology. Itsignificantly reduces bandwidth costs for popular files while dramaticallyimproving the performance and scalability of websites. BitTorrent DNA enableswebsites to seamlessly add the speed and efficiency of patented BitTorrenttechnology to their current content delivery infrastructure, requiring no changes totheir current Content Delivery Network (CDN) or hardware in the origininfrastructure.

Businesses can benefit from the efficiencies of peer-assisted contentdelivery while improving the end-user experience.

The BitTorrent Certified program includes a Software Development Kit(SDK) for consumer electronics manufacturers; ensuring compatibility betweenconsumer electronics products, and the BitTorrent ecosystem of services andsoftware. Compatible devices are eligible for the BitTorrent Certified logoendorsement, which allows manufacturers to leverage the BitTorrent brand forpackaging and promotional materials.

Advantages of bittorrent:

Highly EfficientMakes sharing easierPrevents tampered or broken files from being sharedAbility to download and upload large files in a shorter amount of timeFree uploading and downloading

Disadvantages of bittorrent:

If the seeder leaves the swarm too early, no one is able to use the fileSeeder can only seed one or two files at a timeThe computer's performance drops drastically while using the programOld or unpopular files are hard to findTorrent files are too flaky due to excessive popularity

Page 29: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

21

11. BINA

A Binary Large OBjesingle entity in a dtypically images, audio or oexecutable code is stored as a

"Blobbing" originallydatabase to another without the responsibility for error chterm arose from the image container and putting it in awere grasping.

21

ARY LARGE OBJECT (BLOB)

Bject (BLOB) is a collection of binary daa database management system.

r other multimedia objects, though someas a blob. Database support for blobs is not

lly meant moving large amounts of daut filters or error correction. This is fast br checking and filtering on the new host for ge of somebody grabbing fistfuls of maten another without regard to what was in th

21

data stored as aBlobs are

metimes binaryot universal.

data from onet because it putsfor the data. Theaterial from one the "blob" they

Page 30: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

22

The data type and defidefined in traditional compularge to store practically at defined in the 1970s and 19became cheap. This definitio

Blobs were originallyStarkey at DEC, who describor whatever" from "the 1958Terry McKiever, a marketiacronym and invented the baan alternative backronym, Bi

22

definition was introduced to describe data puter database systems, particularly becau

at the time the field of database systems w 1980s. The data type became practical whition gained popularity with IBM's DB2.

lly just big amorphous chunks of data invcribes them as "the thing that ate Cincinna58 Steve McQueen movie", referring to Theting person for Apollo, felt that it neebackronym Basic Large Object. Then Info

, Binary Large Object.

22

ta not originallycause it was toos was first beingwhen disk space

invented by Jimnnati, Cleveland,The Blob. Later,eeded to be an

Informix invented

Page 31: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

23

12. BLOG

A blog (a truncation of the expression weblog) is a discussion orinformational site published on the consisting of discrete entries ("posts") typicallydisplayed in reverse chronological order (the most recent post appears first). Until2009, blogs were usually the work of a single individual occasionally of a smallgroup, and often covered a single subject. More recently "multi-author blogs"(MABs) have developed, with posts written by large numbers of authors andprofessionally edited. MABs and other media outlets, and similar institutionsaccount for an increasing quantity of blog traffic.

The rise of and other systems helps integrate MABs and single-author blogsinto societal new streams. Blog can also be used as a verb, meaning to maintain oradd content to a blog.

The emergence and growth of blogs in the late 1990s coincided with theadvent of web publishing tools that facilitated the posting of content by non-technical users. Majority are interactive, allowing visitors to leave comments andeven message each other via on the blogs, and it is this interactivity thatdistinguishes them from other static websites. In that sense, blogging can be seenas a form of indeed, bloggers do not only produce content to post on their blogs,but also build social relations with their readers and other bloggers. However, thereare high-readership blogs which do not allow comments.

Many blogs provide commentary on a particular subject; others function asmore personal; others function more as a part of a particular individual orcompany. A typical blog combines text, images, and links to other blogs, and othermedia related to its topic. The ability of readers to leave comments in an interactiveformat is an important contribution to the popularity of many blogs. Most blogs areprimarily textual, although some focus on art, photographs videos or music andaudio is another type of blogging, featuring very short posts. In education, blogscan be used as instructional resources.

On 16 February 2011, there were over 156 million public blogs in existence.On 20 February 2014, there were around 172 and 75.8 million blogs in existenceworldwide. However, Blogger does not offer public statistics.

Page 32: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

24

The Difference Between a Bl

Software that providecalled a CMS or "Contenprograms are considered asrequired to create and maintsimple as writing an article, categories.

While some CMS problogging tool provides an indegree, intuitive manner whcomposition presentable andwhat you want to write, anmanagement.

Word Press is one sucfeatures. Through its Adminand presentation of your wecompose a blog post, push Word Press goes to great paibeautiful, and the html codestarting out, read Getting Stahow to get Word Press set performing basic tasks withexisting ones.

24

n a Blog and CMS?

ides a method of managing your website tent Management System". Many bloggas a specific type of CMS. They provid

intain a blog, and can make publishing on le, giving it a title, and organizing it under

programs offer vast and sophisticated fea interface where you can work in an easywhile it handles the logistics involved innd publicly available. In other words, you gand the blogging tool takes care of the re

such advanced blogging tool and it provideinistration Panels, you can set options for

weblog. Via these Administration Panels, ysh a button, and be published on the interpains to see that your blog posts look good,de it generates conforms to web standards.

Started with Word Press, which contains inet up quickly and effectively, as well as inithin Word Press, like creating new po

24

ite is commonlyogging softwareide the featuresn the internet aser (one or more)

features, a basicsy and, to some

in making youru get to focus on rest of the site

ides a rich set of for the behaviors, you can easilyternet, instantly!od, the text looksrds. If you're justs information ons information onposts or editing

Page 33: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

25

13. BOOT DISK

A boot disk is removable digital data storage medium from which one canload and run a utility program. The computer must have a built-in program whichwill load and execute a program from a boot disk meeting certain standards.

Uses of Boot disks

• Operating system installation• Hardware or software troubleshooting• Customizing an operating environment• Software demonstration• Administrative access in case of lost password is possible with an

appropriate boot disk with some operating systems• Games• While almost all modern computers can boot from a hard drive containing

the operating system and other software, they would not normally be calledboot disks are the most common forms of media used, but other media, suchas magnetic or paper tape drives, , and more recently can be used. Thecomputer's must support booting from the device in question.

The process of booting

The term boot comes from the idea of lifting oneself by one's own thecomputer contains a tiny program (bootstrap loader) which will load and run aprogram found on a boot device. This program may itself be a small programdesigned to load a larger and more capable program, i.e., the full operating system.To enable booting without the requirement either for a device or to write to theboot medium, it is usual for the boot program to use some system as a temporarystorage. As an example, any computer compatible with this is able with built-insoftware to load the contents of the first 512 bytes of a floppy and to execute it if itis a viable program; boot floppies have a very simple loader program in thesebytes. The process is vulnerable to abuse; data floppies could have a virus writtento their first sector which silently infects the host computer if switched on with thedisk in the drive.

Page 34: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

26

Boot floppies

Bootable floppies for PCscommonly available floppy making it impractical for loato the availability of other hi

Booting from a disk

A modern PC is conficertain order. If a computer floppy drive, the user may special key when the compuF12), and then changing theof the final stage of the boot results in a list of bootable dmade.

Modern Apple compupresses the C key while the m

26

or PCs usually contain or miniature versionspy disk can hold only 1.4 of data in its staloading large. The use of boot floppies is i

r higher-capacity options.

onfigured to attempt to boot from variouster is not booting from the device desiredy have to enter the BIOS setup function puter is first turned on (such as Delete, F

the boot order. More recent BIOS permit thot process by pressing a function key (usua

e devices being presented, from which a sel

puters will boot from an appropriate dise machine is starting.

26

ons of. The moststandard format,

is in decline, due

ous devices in aired, such as then by pressing a, F1, F2, F10 ort the interruptionsually F11). Thisselection may be

disk if the user

Page 35: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

27

14. BUFFER

A buffer is a temporary holding area for data while it's waiting to betransferred to another location. It is usually located in the RAM. The concept of thebuffer was developed in order to prevent data congestion from an incoming to anoutgoing port of transfer.

There are common uses for the buffer that help improve a device's overallperformance. Nearly all hard disks make use of a buffer to facilitate easy retrievalof data. Any type of memory handling and data storage service will make use ofsome sort of buffer as well.

Even the CPU's most basic tasks need to use buffers to operate in the formof registers, where data like operands and operators are stored before they areprocessed. When a user downloads a video or audio file, a certain percentage of thedownloaded file is placed in the buffer and then played. As the clip is played, thedevice continuously downloads the file and places it in the buffer. Because of this,there is less chance that the video or audio file will stall when network congestionoccurs, unless of course the download rate is so slow that the play speed catches upwith it. As another example, when printing a document, when the print commandis invoked by the system or the application, the print data is sent to the buffer andis then transferred to the printer. From there, the printer accesses the information.This frees the computer up to do other tasks while the print command is beingperformed.

One disadvantage to this system is that any data in the buffer during devicefailure is lost. A buffer is a data area shared by hardware devices or programprocesses that operate at different speeds or with different sets of priorities. Thebuffer allows each device or process to operate without being held up by the other.

In order for a buffer to be effective, the size of the buffer and the algorithmsfor moving data into and out of the buffer need to be considered by the bufferdesigner. Like, a buffer is a "midpoint holding place" but exists not so much toaccelerate the speed of an activity as to support the coordination of separateactivities.

Page 36: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

28

This term is used botbuffering sometimes impliesso that it can be edited or othor database.

Intention of a buffer

The purpose of mosmanipulate before transferriand data too are relatively slthen the buffer to a disk. Ththe disk file with the content

This is much more effitime you make a change to ta buffer, not on the disk, all o

28

oth in programming and in hardware. In lies the need to screen data from its final i

r otherwise processed before being moved to

ost buffers is to act as a holding areaferring it to the main memory. Because

slow, many keep track of data changes inThen when you save the file, the word procents of the buffer.

efficient than accessing the file on the disto the file. Note that because your changes ll of them will be lost if it fails during an ed

28

In programming,l intended place to a regular file

rea, enabling touse the processs in a buffer androcessor updates

disk where eaches are initially in editing session.

Page 37: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

29

1

Even with a world fuand car audio systems that pCDs. In addition to playing,audio and video formats, Remedia. This is a necessary feCDs. Maybe your home ent

inputs for digital media, butcar doesn’t have a USB slot

Or maybe you want to burnlisten to the CD without ruin

Before you can burn a CD:

First, make sure yCD-R (Compact Ddiscs. All modern Second, have a suCD-R. They are m

need the complexiThird, insert a disc

29

15. BURNING A DISC

full of iPods, MP3 players, digital home at play music from USB flash memory; peong, downloading and converting a wide vari RealPlayer can also record, or burn CD-R

ry feature for those who still want or need tntertainment system doesn’t have the lates

but there is a CD, DVD or Blue ray player.lot to plug in flash memory or an iPod, only

urn music to a blank CD, so you can let uining the original.

D:

re your computer is connected to a drive tht Disc-Record) or CD-RW (Compact Discrn disc drives will read and write both CDs supply of blank CD-R or CD-RW discs. I

re more reliable for playing. Just starting o

exity of Re-Writable. Use quality, brand namisc in the CD/DVD drive.

29

e media serverspeople still burnvariety of digital-R and CD-RWd their music ontest and greatest

yer. Maybe yournly a CD player.

let your children

that can recordisc-Re Writable)

CDs and DVDs.. I suggest usingg out, you don’t

name discs.

Page 38: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

30

How Long Will Auto M anufacturers Include CD Players in Cars? Here’s a

Guess.

The death of the factory in-dash cassette player was a long one. Delco andMotorola units first started appearing in new models in about 1970. The last newmodel car to come with a factory cassette player was the 2010 Lexus SC430. Formost of that time, the in-dash cassette player co-existed with the factory CD player,which was first included in the 1984 S-Class Mercedes. But ever since the cassetteplayer disappeared from new models, so has the CD playeras more and morepeople prefer to plug their smart phones than lug around stacks of compact discs. Itwasn’t that long ago that many of us spent hours burning mix CDs just for the car.

My limit was six–maybe 75 songs–because I had a six-pack changer and onceloaded, I rarely bothered to swap out an old disc for a new one.

According to a survey of automotive experts, the factory CD player shouldbe gone by 2019. That’s just three years away. If you’re shopping for a new, you

may have encountered CD players as options. Some models–especially thoseaimed at Millennial–don’t even offer a CD player because market research shows

that the majority of buyers for those vehicles will never use it.

Term Description

CD-R CD-Recordable. Write Once, Read Many. (WORM)

CD-RW CD-Rewritable. Write Many, Read Many.

ISO-9660DOS compatible file system (8.3 character file names) for CD's.Requires extensions like "Rock Ridge" to fully support UNIX/Linux

Rock RidgeISO-9660 extension to allow long file names, UNIX symlinks and fileprotection (rwx). Windows readable.

JolietMicrosoft extension to ISO-9660. Creates MS/Windows 95 like 8.3 filenames with translation to 64 character names.

MultisessionAllows adding/writing files at a later time. Session must be closedbefore it is readable.

DAOBurn entire audio CD at once in a single burn. It's the only way to avoiddelays between tracks

Page 39: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

31

What is CAPTCHA?

Well, since you askestands for "CompletelyAutoTuring test to tellComputersApart". Since the dawn of people have tried to abuseboth sport and profit. As theprofitable, the scale of abuautomated software (sometimas bots). To prevent botregistrations, fake sweepstaresponded by testing users to

Applications of CAPTCHA

CAPTCHAs have several alimited to:

Preventing Comment programs that submitsearch engine ranks of called comment spamcomments on a blog. enter a comment, and Protecting Website services. Up until a fespecific type of attacaccounts every minuteto ensure that only hushould be protected automated scripts.Protecting Email Addraddresses posted in cl

31

16. CAPTCHA

ked, CAPTCHAutomatedPublicters andHumans of the Internet,use websites forthe abuse becamebuse grew usingtimes referred to

bots from overrunning sites with spamstakes entries, and other nefarious thing

rs to see if they were human or not.

HA

l applications for practical security, inclu

ent Spam in Blogs- Most bloggers are it bogus comments, usually for the purp

of some website (e.g., "buy penny stocks hpam. By using a CAPTCHA, only humag. There is no need to make users sign u

nd no legitimate comments are ever lost!te Registration- Several companies offea few years ago, most of these services sutack: "bots" that would sign up for thousaute. The solution to this problem was to use humans obtain free accounts. In general,ed with a CAPTCHA in order to prev

Addresses From scrapers- The Web in se clear text. CAPTCHAs provide an effectiv

31

pam, fraudulentings, publishers

cluding but not

re familiar withrpose of raising

ks here"). This ismans can enter up before they

ffer free email suffered from ausands of emailuse CAPTCHAsral, free servicesrevent abuse by

search of emailctive mechanism

Page 40: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

32

to hide your email address from Web scrapers. The idea is to require users tosolve a CAPTCHA before showing your email address. A free and secureimplementation that uses CAPTCHAs to obfuscate an email address can befound atOnline Polls- In November 1999, http://www.slashdot.org released anonline poll asking which was the best graduate school in computer scienceAs is the case with most online polls, IP addresses of voters were recorded inorder to prevent single users from voting more than once. However, studentsat Carnegie Mellon found a way to stuff the ballots using programs thatvoted for CMU thousands of times. CMU's score started growing rapidly.

The next day, students at MIT wrote their own program and the pollbecame a contest between voting "bots." MIT finished with 21,156 votes,Carnegie Mellon with 21,032 and every other school with less than 1,000.Can the result of any online poll be trusted? Not unless the poll ensures thatonly humans can vote.

Preventing Dictionary Attacks- CAPTCHAs can also be used to preventdictionary attacks in password systems. The idea is simple: prevent acomputer from being able to iterate through the entire space of passwords byrequiring it to solve a CAPTCHA after a certain number of unsuccessfullogins. This is better than the classic approach of locking an account after asequence of unsuccessful logins, since doing so allows an attacker to lockaccounts at will.Search Engine Bots- It is sometimes desirable to keep web pagesunindexed to prevent others from finding them easily. There is an html tag toprevent search engine bots from reading web pages. The tag, however,doesn't guarantee that bots won't read a web page; it only serves to say "nobots, please." Search engine bots, since they usually belong to largecompanies, respect web pages that don't want to allow them in. However, inorder to truly guarantee that bots won't enter a web site, CAPTCHAs areneeded.Worms and Spam- CAPTCHAs also offer a plausible solution againstemail worms and spam: "I will only accept an email if I know there is ahuman behind the other computer." A few companies are already marketingthis idea.

Page 41: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

33

1

Definition

Cache memory also ccomputer can access moretypically integrated directlyconnect with the CPU.

Cache memory levels expla

Cache memory is fas"levels" that describe its clos

Level (L1) cache is embedded in the proceLevel 2 (L2) cacheisthe CPU or on a sepainterconnecting the cathe main system bus.

33

17. CACHE MEMORY

o called CPU memory is random access mre quickly than it can access regular RAtly with chip or placed on a separate tha

plained

fast and expensive. Traditionally, it is closeness and accessibility to the microproce

is extremely fast but relatively small, arocessor chip (CPU).he is often more capacious than L1; it may

parate chip or with a high-speed alternativ cache to the CPU, so as not to be sloweds.

33

s memory that ar RAM. This isthat has a inter

s categorized asrocessor:

, and is usually

ay be located onative system bused by traffic on

Page 42: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

34

Level 3 (L3) cacheisthe performance of L1but is usually double t

Specialized caches

In addition to instructiprovide specialized functionspecialized cache because instruction caching from caching, referring to each specialized cache.

Other specialized mecaches include the transllook side buffer) whose funis to record to translations.

Still other caches aretechnically speaking, mecaches at all. For example, leverage RAM or to promuch the same kind of caching as memory cachewith CPU instructions. If dafrequently accessed from diis cached into or flash-based

Increasing cache size

L1, L2 and L3 caccombination of processor anthree levels of memory cacmeans for increasing cachespecific motherboard with dwith the right amount of inte

34

he is typically specialized memory that worf L1 and L2. It can be significantly slower tle the speed of RAM.

ction and data caches, there are other cacheions in a system. By some definitions, the se of its shared design. Other definitm datach as a

memorynslationfunction.

are not,memoryle, mayprovideof datahes do data is disk, ited storage technology for faster access and

caches have been implemented in the r and recently, the trend has been toward con

aching on the CPU itself. For this reasonche size has begun to shift from the acq different and bus architectures to buying

ntegrated L1, L2 and L3 cache.

34

orks to improver than L1 or L2,

ches designed tohe L3 cache is anitions separate

nd response.

e past using aconsolidating allson, the primaryacquisition of ag the right CPU

Page 43: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

35

18. COMPUTER AIDED DESIGN (CAD)

Definition

CAD (computer-aided design) software is used by architects, engineers,drafters, artists, and others to create precision drawings or technical illustrations.CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models.

Computer-aided design/computer-aided manufacturing is software used todesign products such as electronic circuit boards in computers and other devices.

Computer-Aided Design is a leading international journal that providesacademia and industry with key papers on research and developments in theapplication of computers to design.

Computer-Aided Design is a leading international journal that providesacademia and industry with key papers on research and developments in theapplication of computers to design.

Computer-Aided Design invites papers reporting new research, as well asnovel or particularly significant applications, within a wide range of topics,spanning all stages of design process from concept creation to manufacture andbeyond. Examples of relevant topics include but are not limited to:

Why CAD Software?

This technology makes product design more efficient by automatingprocesses that were once manual, such as traditional drafting. With 3D CAD,designers can also do solid modeling, creating three-dimensional representations oftheir products.

But CAD isn't just about convenience or bells and whistles.

Broadly speaking, CAD software helps you explore concept design ideas,create product designs, carry out simulations and analyses, and performengineering calculations. In other words, CAD tools assist you with the

Page 44: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

36

experimentation, exploratiteration needed to make thyour design's potential. searching goal? better produced more efficiently acost so that you get your pmarket faster.

We’re proud of the

PTC invented and first parametric CAD modelingnearly 30 years ago. Todadevelopment professionals use our flagship CAD softwa

CAD is used as follows:

1. To produce detailed ethe physical componen

2. To create conceptual of assembly and the m

3. To prepare environmeare used in photograpnew structures are bui

CAD systems exist todWindows, Linux and Maccomputer mouse, but a pe

Most U.S. universities using protractors and compaof CAD software. Becauuniversities and manufacturetools. These tools have alsefficient, lowering these train

36

ration, and the most of. The overer productsy and at lessr products to

the fact that

st launcheding softwareday, productls worldwidetware suite.

d engineering designs through 3-D and 2-Dnents of manufactured products.al design, product layout, strength and dyn manufacturing processes themselves.mental impact reports, in which computer-raphs to produce a rendering of the appearauilt.

today for all of the major computer platformac OS X. The user interface generally pen and digitizing graphic tablet can a

es no longer require classes for producing hpasses. Instead, there are many classes on dause hardware and software costs areturers now train students how to use thealso modified design work flows to makraining costs even further.

36

2-D drawings of

ynamic analysis

ter-aided designsarance when the

forms, includingly centers on an also be used.

g hand drawingsn different typesare decreasing,these high-levelake them more

Page 45: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

37

19. CHARG

Definition

A charge-coupled devstores and displays the data foin the image is converted intto a color in the color spectrube a separate value for each commonly included in digiastronomical telescopes, scain for robots, in optical photographs, and in the enha

Architecture

The CCD image sarchitectures. The most comfull-frame, frame-transfer, aof these architectures

In a full-frame devicelectronic shutter. A mechanimage smears as the device i

37

RGE COUPLED DEVICE (CCD)

device (CCD) is a light-sensitive integrateta for an image in such a way that each (pic into an electrical charge the intensity of wctrum. For a system supporting 65,535 colch color that can be stored and recovered. CCDigital still and video cameras. They are

scanners, and readers. The devices have aal character recognition (OCR), in the hancement of images, especially in meteor

sensors can be implemented in sevemmon is their approach to the problem of s

r, and interline. The distinguishing characte

vice, all of the image area is active, ananical shutter must be added to this type of e is clocked or read out.

37

)

rated circuit that(picture element)f which is relatedcolors, there will. CCDs are nowre also used ine also found usee processing ofeorology.

everal differentof shuttering. arecteristic of each

and there is no of sensor or the

Page 46: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

38

With a frame-transfer mask (typically aluminum). area to the opaque area or sThat image can then be readis integrating or exposing innot require a mechanical shustate broadcast cameras. Therequires twice the silicon recosts roughly twice as much.

CDs containing gridsdevices. Most common typeallows devices, and zero videtectors, the sensitivity is li

One other consequencoften appears on CCD-baseinfrared blockers.

Cooling reduces the alight intensities, even for observatories often cool ththerefore to negligible levels

38

fer CCD, half of the silicon area is covered). The image can be quickly transferred fr

r storage region with acceptable smear of aad out slowly from the storage region while in the active area. Frame-transfer deviceshutter and were a common architecture fo

The downside to the frame-transfer archite real estate of an equivalent full-frame devch.

ids of are used in and video cameras asypes of CCDs are sensitive to near-infrared video-recording/photography For normal s limited to 1.1μ m.

ence of their sensitivity to infrared is that ased digital cameras or camcorders if they

e array's, improving the sensitivity of thefor ultraviolet and visible wavelengths. their detectors with to reduce the darkels.

38

ed by an opaque from the imagef a few percent.

hile a new imageices typically do

re for early solid-itecture is that itdevice; hence, it

as light-sensingred light, whichal silicon-based

at infrared fromhey do not have

the CCD to lowhs. Professionalark current, and

Page 47: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

39

20. COMMON

Definition

The common gatewayWeb user's request to an appto the user. When the user highlighted word or enterinrequested page. However, win, it usually needs to be protypically passes the form infothe data and may send backfor passing data back and focommon gateway interface (

What Is CGI?

As you traverse the vacross documents that madocuments could consist of,registration information, imaimage, counters that displayutilities that allow you to cases, you'll find that theseInterface, commonly known

39

ON GATEWAY INTERFACE (CG

ay interface (CGI) is a standard way for a application program and to receive data baer requests a Web page (for example, by ering a Web site address), the server se

r, when a user fills out a form on a Web pag processed by an application program. Thinformation to a small application program ack a confirmation message. This method forth between the server and the applicatioe (CGI).

e vast frontier of the World Wide Web, ymake you wonder, "How did they do of, among other things, forms that ask fomage maps that allow you to click on variolay the number of users that accessed the do search databases for particular informaese effects were achieved using the Comm

n as CGI.

39

GI)

r a Web to pass a back to forwardby clicking on asends back theage and sends itThe Web serverm that processesd or conventiontion is called the

, you will comeo this?" These

for feedback orrious parts of thee document, and

rmation. In mostmmon Gateway

Page 48: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

40

One of the Internet's wThat is, it's trivial in design,can write rudimentary scripdemanding that you have toway, CGI is easy the samepoach an egg.

CGI Applications

CGI turns the Web from a siwhole new interactive meapplications. Let's take a lodesigned using CGI.

Generally, forms are can be used to collect informmore complex manner to procan be presented with a formas well as an option to searchCGI program can process thuser's selection criteria.

40

t's worst-kept secrets is that CGI is astoundgn, and anyone with an iota of programmicripts that work. It's only when your ne to master the more complex workings of me way cooking is easy: anyone can toas

simple collection of static hypermedia docmedium, in which users can ask quest look at some of the possible application

re used for two main purposes. At their siformation from the user. But they can alsoprovide back-and-forth interaction. For exarm listing the various documents available rch for particular information within these this information and return document(s) t

40

undingly simple.ming experienceneeds are moreof the Web. In aoast a muffin or

documents into aestions and runions that can be

r simplest, formslso be used in axample, the userle on the server,se documents. As) that match the

Page 49: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

41

21. CHIP SET

Introduction

A chipset is a group of integrated circuits (microchips) that can be usedtogether to serve a single function and are therefore manufactured and sold as aunit. For example, one chipset might combine all the microchips needed to serve asthe communications controller between a processor and memory and other devicesin a compute.

In a computer system, a chipset is a set of electronic components inan integrated circuit that manages the data flow betweenthe processor, memory and peripherals. It is usually found on the motherboard.Chipsets are usually designed to work with a specific family of microprocessors.Because it controls communications between the processor and external devices,the chipset plays a crucial role in determining system performance.

Intel ICH7 Southbridge on Intel D945GCPE Desktop Board

Computer

In computing, the term Chipset commonly refers to a set ofspecialized chips on a computer's motherboard or an expansion card. In personalcomputers, the first chipset for the IBM PC AT of 1984 was the NEATchipset developed by Chip sandChipSandTechnologies for the INEL80286 CPUTechnologies for the Intel80286 CPU.

Move towards Processor Integration In Pcs

Traditionally in x86 computers, the processor's primary connection to therest of the machine is through the motherboard chipset's north bridge. The northbridge is directly responsible for communications with high-speed devices (systemmemory and primary expansion buses, such as PCI e, AGP and PCI cards, being

Page 50: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

42

common examples) and cprocessor. This connection bknown as the front side bus (

Requests to resourceoffloaded to the south bridgethe processor and the sou"everything else", generallylargest being hard disk and communications. The connenot have a common name, bthe chipset

The Best Chip Set Manufac

A list of top chipsare best companies in their fipurchase the chipset then thbrands we are looking it to pthese are the companies andlooking at. As easy as buyincan be, there is a definite swith building our own PC.monitor, keyboard, mouse, aour desk. The computer itsesound card, network card, poto put it all in.

Some Mother board maintegrated. If we are carefumachine for less money thatour hardware, we can also se

42

conversely any system communication n between the processor and North Bridge is (FSB).

rces not directly controlled by the nortdge, with the north bridge being an intermesouth bridge. The south bridge traditio

rally lower-speed peripherals and board fud storage connectivity) such as USB, paranection between the north bridge and sout

e, but is usually a high-speed interconnect

nufacures

ipset manufactures. theseir field . If we are looking these the companies andto purchase a chipset thenand brands we should beying a prebuilt computere satisfaction that comesPC. Beyond the obviouse, and speakers that sit ontself requires a CPU, motherboard, RAM, , power supply, hard disk drive, power supp

may also have those separate expansion reful, we may even be able to build our hat it would cost for a pre-built model. Whe sell the individual components to help offs

42

on back to thee is traditionally

orth bridge arermediary betweentionally handles

rd functions (thearallel and serialouth bridge doesct proprietary to

, graphics card,pply, and a case

n cards alreadyour own customhen we upgrade

ffset our costs.

Page 51: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

43

22. CHARACTER LARGE OBJECT (CLOB)

A Character Large Object (or CLOB ) is a collection of character datastored in a database usually stored in a separate location that is referenced in thetable itself. Database provide a construct explicitly named CLOB, and the majorityof other database systems support some form of the concept, often labeled as text,memo or long character fields. Lobs usually have very high size-limits, of the orderof 2GB or more.

How to Dataset with Sql Server?

The Dataset contains the copy of the data we requested through the SQLstatement. We can use Dataset in combination with SqlDataAdapter class . TheSqlDataAdapter object allows us to populate in a Dataset. We can use Fill methodin the SqlDataAdapter for populating data in a Dataset.

Search Tables in a Dataset Sql Server

The DataSet contains DataTableCollection and their DataRelationCollection.The DataTableCollection contains zero or more objects. The Dataset maycomprise data for one or more members, corresponding to the number of rows. TheSqlDataAdapter object allows us to populate DataTables in a DataSet.

Page 52: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

44

CLOB Data Type - Conversion Details

In Oracle, you can specify a string literal in SQL INSERT statement to insertdata into a CLOB column. You can also insert an empty value usingEMPTY_CLOB() function, and you can insert NULL.

BLOBs and CLOBs

Caché SQL supports the ability to storeBLOBs (Binary Large Objects) and CLOBs(Character Large Objects) within the database.BLOBs are used to store binary information,such as images, while CLOBs are used to storecharacter information.

BLOBs and CLOBs can store up to 4Gigabytes of data (the limit imposed by theJDBC and ODBC specifications).

The operation of the Blobs and CLOBsis identical in every respect except how theyhandle character encoding conversion (such as Unicode to multiyear) whenaccessed.

Overview of CLOB

CLOB (Character Large Object) is a large collection of character data stored ina database table. Different database servers handles CLOB differently. But thereare some common characteristics like:

CLOB stores character data, which requires a specific encoding schema. Forregular ASCII characters, the database default encoding schema is fine. Soyou don't need to worry.CLOB data is usually large. Many database servers offer very highmaximum sizes like 4 GB.Operations on CLOB data is usually restricted. For example, LIKE may notbe used on CLOB data.CLOB data is usually not directly stored inside the table. It is stored indifferent storage areas and its reference address is stored inside the table.

Page 53: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

45

23. CLOCK CYCLE

DefinitionThe speed of a computer processor, or CPU, is determined by the clock

cycle, which is the amount of time between two pulses of an oscillator. Generallyspeaking, the higher number of pulses per second, the faster the computerprocessor will be able to process information. The clock speed is measured in Hz,typically either megahertz (MHz) or gigahertz (GHz).

For example, a 4GHz processor performs 4,000,000,000 clock cycles persecond. Computer processors can execute one or more instructions per clock cycle,depending on the type of processor. Early computer processors and slowerprocessors can only execute one instruction per clock cycle, but faster, moreadvanced processors can execute multiple instructions per clock cycle, processingdata more efficiently.

Machine CycleThe steps performed by the computer processor for each machine language

instruction received. The machine cycle is a 4 process cycle that includes readingand interpreting the machine language, executing the code and then storing thatcode.

Instruction CycleAn instruction cycle (sometimes called fetch-decode-execute cycle) is the

basic operation cycle of a computer. It is the process by which a computer retrievesa from its determines what actions the instruction requires, and carries out thoseactions. This cycle is repeated continuously by the CPU, from to when thecomputer is shut down.

Page 54: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

46

In simpler CPUs, the instruction cycle is executed sequentially: eachinstruction is completely processed before the next one is started. In most modernCPUs, the instruction cycle is instead executed in, as: the next instruction startsbeing processed before the previous instruction is finished, which is possiblebecause the cycle is broken up into separate steps.

Clock Speed

It is also called clock rate, the speed at which. Every machine contains aninternal clock that regulates the rate at which instructions are executed andsynchronizes all the various computer components. It requires a fixed number of(or clock cycles) to execute each instruction. The faster the clock, the moreinstructions the CPU can execute per second. Clock speeds are expressed inmegahertz or gigahertz.

The internal of a CPU has as much to do with a CPU's performance as theclock speed, so two CPUs with the same clock speed will not necessarily performequally.

Whereas an Intel 80286 microprocessor requires 20 cycles to multiply twonumbers, an Intel 80486 or later can perform the same calculation in a single clocktick. (Note that clock tick here refers to the system's clock, which runs at 66 MHzfor all PCs.) These newer processors, therefore, would be 20 times faster than theolder processors even if their clock speeds were the same. In addition, somemicroprocessors are which means that they can execute more than one instructionper clock cycle.

Page 55: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

47

24. CLONE SOFTWAREDefinition of Cloning Software

Clone Software that copies the entire hard disk to another hard disk or toanother computer via direct cable or the network. Cloning is used to back up thecomputer for a future system restore and to provide to interim storage for replacingthe hard disk.

Drive Copy

Advantages:

It’s also used to make a master copy of computer configuration for quick

installations on new machines.The cloned disk is copied verbatim (cloned again) to the new computermuch quicker than installing the OS and applications individually.See image file, reimaging, hosting server and clone. Clone is an easy to usefile backup utility. “Clone software – fast, easy, full hard disk backupsoftware”.

Page 56: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

48

Clone can be configured to carry out auto mated backups of our critical data.Once we have configured clone we need to take no further action to ensureall our important data is backed up.

How it works?

Main features backup files and directories to a defined location-as many aswe like use the data and time, file size or archive attribute to determine if a fileshould be copied synchronize directories Run as a standard windows utility or as ascreen saver mode we can run our favorite screen saver as will backup to anymedia (including CD-RAW) that can be mapped to windows drive or UNC pathuse file filters to specify the type of the files we want to copy.

Working plan

Clone does not use any proprietary format for storing our files, we won’t

even need a copy of clone to restore our files, and windows explorer will do thejob.

It’s all carried out automatically. Clone copies files from one location to

another. Our file are copied “as is” making it very simple to recover after an

unforeseen loss of data.

Common uses

Reboot and restoreProvisioning new computerHard drive upgradeFull system backupSystem recoveryTransfer to another user

Page 57: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

49

25. CLOUD COMPUTING

Origin of the term

The origin of the term cloud computing is unclear. The word "cloud" iscommonly used in science to describe a large agglomeration of objects thatvisually appear from a distance as a cloud and describes any set of things whosedetails are not inspected further in a given context. Another explanation is that theold programs that drew network schematics surrounded the icons for servers with acircle, and a cluster of servers in a network diagram had several overlappingcircles, which resembled a cloud.

Similar Concepts

Cloud computing is the result of the evolution and adoption of existingtechnologies and paradigms. The goal of cloud computing is to allow users to takebeneath from all of these technologies, without the need for deep knowledge aboutor expertise with each one of them. The cloud aims to cut costs, and helps the usersfocus on their core business instead of being impeded by IT obstacles.

Characteristics

Cloud computing shares characteristics with:

Client–server model— Client–server computing refers broadly to anydistributed application that distinguishes between service providers (servers)and service requestors (clients).

Page 58: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

50

Grid computing — "A form of distributed and parallel computing, wherebya 'super and virtual computer' is composed of a cluster of networked, looselycoupled computers acting in concert to perform very large tasks."Mainframe computer — Powerful computers used mainly by largeorganizations for critical applications, typically bulk data processing such as:census; industry and consumer statistics; police and secret intelligenceservices; enterprise resource planning; and financial transaction processing.Utility computing — The "packaging of computing resources, such ascomputation and storage, as a metered service similar to a traditional publicutility, such as electricity."Peer-to-Peer— A distributed architecture without the need for centralcoordination. Participants are both suppliers and consumers of resources (incontrast to the traditional client–server model).

Infrastructure As A Service (IAAS)

In the most basic cloud-servicemodel - and according to the IETF(Internet Engineering Task Force) -providers of Bias offer computers–

physical or (more often) virtualmachines– and other resources. Iasirefers to online services that abstractuser from the detail of infrastructurelike physical computing resources,location, data partitioning, scaling,security, backup etc.

Cloud Clients

User’s access cloud computing using networked client devices, such as

desktop computers, laptops, tablets and smart phones and any Ethernet enableddevice such as Home Automation Gadgets. Some of these devices– cloud clients–rely on cloud computing for all or a majority of their applications so as to beessentially useless without it.

Page 59: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

51

A cluster is a group of seand enable high availabilitprocessing.

In personal computer stostorage on a hard disk; it's mstored on a hard disk takes ube scattered among differenwith a file are kept track of in

Size of Cluster

The maximum numbeFAT table entry. Beginning allowing for a maximum of 6

The tradeoff in cluster itself) takes up the entire clthat's the cluster size. In fact4,096 or 8,192 bytes. Largereach with a FAT capable of s

51

26. CLUSTER

f servers and other resources that act like a ility and, in some cases, load balancing

storage technology, a cluster is the logica's managed by the computer's operating syss up one or more clusters of storage. A filerent locations on the hard disk. The clustf in the hard disk's file allocation table (FAT

ber of clusters on a hard disk depends onng with DOS 4.0, the FAT entries were 16 of 65,536 clusters.

ter size is that even the smallest file (and ev cluster. Thus, a 10-byte file will take up

fact, many operating systems set the cluster rger hard disks could be divided into up to foof supporting 512 megabytes of clusters.

51

a single systeming and parallel

ical unit of filesystem. Any filefile's clusters canusters associatedFAT).

on the size of a16 bits in length,

even a directoryp 2,048 bytes ifer size default ato four partitions,

Page 60: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

52

Server ClusterA server cluster is a g

single system to provide higoccurs on one computer in aredistributed to another comensure that users have constaclusters are designed for appfrequently updated data. Typservers, database servers, and

Master Cluster

Master-cluster is a implementing node.js core cluproject. Also provides hot reloworker in development moderestarted when code is changed

Cluster SlavesThe command provid

master node.Note that if a slave is

and we ask to a node that hshow stale information. Hownetwork partitions) all the nogiven master.

Cluster Replicate

The command reconfinode receiving the commanmaster to slave.

Once a node is turnedto inform the other cluster nbetween nodes will propagat

52

a group of independent servers and workinghigh availability of services for clients. Wn a cluster, resources are redirected and thomputer in the cluster. You can use servstant access to important server-based resoapplications that have long-running in-meypical uses for server clusters include filend messaging servers.

a utility to facilitatecluster module in anyeloading of files on thede so that workers areged.

ides a list of slave nodes replicating from

is added, moved, or removed from a givent has not yet received the configuration uowever eventually (in a matter of seconds i nodes will agree about the set of nodes ass

nfigures a node as a slave of the specified and is an empty master, the node role is

ed into the slave of another master node, ther nodes about the change: heartbeat packegate the new configuration automatically.

52

ing together as a. When a failure the workload iserver clusters toresources. Servermemory state orfile servers, print

om the specified

ven master node,n update, it mays if there are no

associated with a

ed master. If theis changed from

, there is no needckets exchanged.

Page 61: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

53

27. COMPUTER DAEMON

In computer a daemon or is that runs as a, rather than being under the directcontrol of an interactive user. Traditionally daemon names end with the letter d.For example, is the daemon that implements the system logging facility, and is adaemon that services incoming connections.

In a environment, the of a daemon is often, but not always, the process. Adaemon is usually either created by a process a child process and then immediatelyexiting, thus causing init to adopt the child process, or by the init process directlylaunching the daemon. In addition, a daemon launched by forking and exitingtypically must perform other operations, such as dissociating the process from anycontrolling. Such procedures are often implemented in various convenienceroutines such as daemon in UNIX.

Systems often start daemons at time and serve the function of responding tonetwork requests, hardware activity, or other programs by performing some task.Daemons can also configure hardware like on some system, run scheduled taskslike, and perform a variety of other tasks.

Terminology

The term was coined by the programmers of. They took the name from, animaginary being from a thought experiment that constantly works in thebackground, sorting molecules. Systems inherited this terminology. Maxwell'sDemon is consistent with Greek mythology's interpretation of a as a supernaturalbeing working in the background, with no particular bias towards good or evil.However, and some of its derivatives have adopted a as their rather than a Greekdaemon. The word daemon is an alternative spelling of demon, and is pronounced.In the context of computer software, the original pronunciation has drifted to forsome speakers.

Creation

In a strictly technical sense, a Unix-like system process is a daemon when itsparent process terminates and the daemon is assigned the process (process number1) as its parent process and has no controlling terminal. However, more commonly,

Page 62: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

54

a daemon may be any background process, whether a child of the init process ornot.

On a Unix-like system, the common method for a process to become adaemon, when the process is started from the or from a startup script such as anscript or a script, involves:

• Dissociating from the controlling• Becoming a session leader• Becoming a leader• Executing as a by and (once or twice). This is required sometimes for the

process to become a session leader. It also allows the parent process tocontinue its normal execution.

• Setting the (/) as the current so that the process does not keep any directoryin use that may be on a mounted file system (allowing it to be unmounted).

• Changing the to 0 to allow open(), create(), and other operating system callsto provide their own permission masks and not to depend on the umask ofthe caller

• Closing all inherited files at the time of execution that are left open by theparent process, including 0, 1 and 2 for the (,and). Required files will beopened later.

• Using a, the, or asIf the process is started by a daemon, such or, the super-server daemon will

perform those functions for the process (except for old-style daemons notconverted to run under system and specified as Type=forkingand "multi-threaded"datagram servers under indented.

Page 63: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

55

28. D

The data transfer rateinternal rate (moving data beand the external rate (movinsystem).

The measurable data tThe sustained data transfer raof the sustained internal and

The sustained rate ibecause it does not have theThe internal rate is further head switch time, and cylind

Media rateRate at which th

Sector overhead timeAdditional timeand other informvalidate data an

55

. DATA TRANSFER RATE

rate of a drive (also called throughput) co between the disk surface and the controller ing data between the controller on the driv

ta transfer rate will be the lower (slower) of r rate or sustained throughput of a drive wilnd sustained external rates.

e is less than or equal to the maximum the benefit of any cache or buffer memoryer determined by the media rate, sector oinder switch time. These are not applicable t

the drive can read bits from the surface of meme (bytes between sectors) needed for conformation necessary to manage the driv

and perform other support functions.

55

covers both theller on the drive)rive and the host

of the two rates.will be the lower

m or burst rateory in the drive.r overhead time,le to SSDs.

of the media.

ontrol structuresrive, locate and

Page 64: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

56

Head switch timeAdditional time required to electrically switch from one head toanother and begin reading; only applies to multi-head drive and isabout 1 to 2 ms.

Cylinder switch timeAdditional time required to move to the first track of the next cylinderand begin reading; the name cylinder is used because typically all thetracks of a drive with more than one head or data surface are readbefore moving the actuator. This time is typically about twice thetrack-to-track seek time. As of 2001, it was about 2 to 3 ms.

As of 2010, a typical 7200 RPM desktop HDD has a "disk-to-buffer" datatransfer rate up to 1030 Mbit/s. This rate depends on the track location, so itwill be higher on the outer zones (where there are more data sectors pertrack) and lower on the inner zones (where there are fewer data sectors pertrack); and is generally somewhat higher for 10,000 RPM drives.Floppy disk drives have sustained "disk-to-buffer" data transfer rates that areone or two orders of magnitude lower than that of HDDs.The sustained "disk-to-buffer" data transfer rates varies amongst families ofOptical disk drives with the slowest 1x CDs at 1.23 Mbit/s floppy-like whilea high performance 12x Blue-ray disc drive at 432 Mbit/s approaches theperformance of HDDs.

Effect of file system

Transfer rate can be influenced by file system fragmentation and the layoutof the files. Defragmentation is a procedure used to minimize delay in retrievingdata by moving related items to physically proximate areas on the disk.

Effect of areal density

HDD data transfer rate depends upon the rotational speed of the disks andthe data recording density. Because heat and vibration limit rotational speed,increasing density has become the main method to improve sequential transferrates. Area l density (the number of bits that can be stored in a certain area of thedisk) has been increased over time by increasing both the number of tracks acrossthe disk, and the number of sectors per track.

Page 65: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

57

Definition

In computer science anis a classification identifyingBoolean, that determines thebe done on values of that typtype can be stored.

Classes of data types

I. Primitive data typesMachine data types

All data in computers b(alternatives 0 and 1) on theusually a group of bits cainstructions is called a word(

Boolean type

The Boolean type reprevalues are possible, they aefficiency reasons. Many protype, instead interpreting (fo

Numeric types

Such as The integer daaccording to their ability to

57

29. DATA TYPE

e and computer programming, adata typeoing one of various types of data, such as rethe possible values for that type; the opera type; the meaning of the data; and the way

pess

rs based on digital electronics is represethe lowest level. The smallest addressable called a byte. The unit processed by mrd(as of 2011, typically 32 or 64 bits.

presents the values true and false. Althou are rarely implemented as a single bin

programming languages do not have an ex(for instance) 0 as false and other values as t

r data types, or "whole numbers". May to contain negative values (e.g. unsigned in

57

e or simplytypes real, integer orerations that canay values of that

resented as bitsle unit of data isy machine code

hough only twobinary digit for explicit booleanas true.

y be sub-typed in C and C++).

Page 66: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

58

May also have a small number of predefined subtypes (such as short and long inC/C++); or allow users to freely define subranges such as 1..12

(e.g. Pascal/Ada).

Floating point data types, sometimes misleadingly called reals, containfractional values. They usually have predefined limits on both theirmaximum values and their precision. These are often represented as decimalnumbers.Fixed point data types are convenient for representing monetary values.They are often implemented internally as integers, leading to predefinedlimits.

II. Composite types

Composite types are derived from more than one primitive type. This can bedone in a number of ways. The ways they are combined are called data structures.Composing a primitive type into a compound type generally results in a new type,e.g. array-of-integer is a different type to integer.

III. Enumerations

The enumerated type. This has values which are different from each other, andwhich can be compared and assigned, but which do not necessarily have anyparticular concrete representation in the computer's memory; compilers andinterpreters can represent them arbitrarily. For example, the four suits in a deck ofplaying cards may be four enumerators named CLUB, DIAMOND,HEART,SPADE.

IV. Abstract data types

Any type that does not specify an implementation is an abstract data type.For instance, a stack can be implemented as an array memory containing , or asa linked list. Abstract types can be handled by code that does not know or "care"what underlying types are contained in them. Programming that is agnostic aboutconcrete data types is called generic programming.

Page 67: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

59

30. DATA D

A data definition langdescription language (DDLsimilar to a computer planguage for defining daespecially database schemas.

A DDL is a langudefine data structures and For example, DDL commaused to add, remmodify tables within in a dconsidered a subset of SQLmay also define other types o

Four basic DDL commands

CREATEUSEALTERDROP

CREATE

Installing a database mancreate and manage many indsyntax, the CREATE commaand column definitions. The associated data type.

USEThe USE command al

within our DBMS. For exaand want to issue some comwould preface them

USE employe

59

DEFINITION LANGUAGE (DDL)

anguage or dataDL) is syntaxer programmingdata structures,as.

guage used tod modify data.mands can beremove, ora database. DDLs used in database app

SQL, the Structured Query Language. Howes of data, such as XML.

nds

anagement system(DBMS) on a computer independent databases. To build a new tabmand is used, followed by parameters for the DDL can also define the name of each co

allows us to specify the database we wishexample, if we're currently working in the commands that will affect the employeesm with the following SQL

oyees

59

L)

applications areowever, a DDL

ter allows us totable using SQLr the table name column and the

ish to work withe sales databasees database, weL command:

Page 68: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

60

ALTEROnce we've created a

definition of it. The ALTER of a table w

DROPThe final command o

remove entire database objpermanently remove the pfollowingcommand:

Similarly, the command bedatabase:

Remember thatfrom your database. If we wcommand of the Data MLanguage in a nutshell.

ALTER TABLADD salary m

DROP TABL

DROP DATA

60

a table within a database, we may wish ER command allows us to make changes towithout deleting and recre

of the Data Definition Language, DROP,objects from our DBMS. For example, i personal_info table that we created,

below would be used to remove the enti

hat the DROP command removes entire de want to remove individual records, use Manipulation Language. That's the Da

ABLE personal_infory money null

BLE personal_info

TABASE employees

60

sh to modify thes to the structurecreating it.

ROP, allows us to, if we want to, we'd use the

ntire employees

re data structuresse the DELETEData Definition

Page 69: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

61

31. DIAL-UP CONNECTION

Definition

A dial-up connection uses a standard phone line and analog modem toaccess the Internet at data transfer rates (DTR) of up to 56 Kbps. A dial-upconnection is a connection from an end user to an Internet service provider (ISP)that can be created over a conventional telephone line without any specialarrangement with the telecommunications carrier.

Dial-up Internet access is a form of Internet access thatuses the facilities ofthe public switched telephone network (PSTN) to establish a connection to anInternet service provider (ISP) by dialing a telephone number on a conventionaltelephone line.

Many remote areas depend on Internet dial-up connections becausebroadband and cable are rare in remote areas with low population numbers. ISPsoften provide free dial-up connections, a viable alternative for budget-conscioussubscribers.

Leased Line

A leased line is a private bidirectional or symmetric telecommunications linebetween two or more locations provided in exchange for a monthly rent.Sometimes known as a private circuit or data line in the UK.A leased line is adedicated, fixed-bandwidth, symmetric data connection.

A leased line is a telephone line that has been leased for private use. In somecontexts, it's called a dedicated line. A leased line is usually contrasted with aswitched line or dial-up line.

Used to provide point-to-point dedicated network connectivity.Analog leased line can provide maximum bandwidth of 9.6 Kbps.Digital leased lines can provide bandwidths :64 Kbps, 2 Mbps (E1), 8 Mbps (E2), 34 Mbps (E3) ...

Page 70: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

62

ISDN

Integrated Services for standards for simultaneous dnetwork services over the tranetwork. ISDN supports data

Two types of user access are

Basic Access- Consis64Kbps user chanchannel) and one signally channel (D providing service at 14

Primary access - Cothirty 64Kbps user chchannels) and a 64 K2.048Mbps (One 6Synchronization).

Advantages

While the sound of a conanybody who had to use can't recognize it.High speed internet conndated and slower dial up cWe had a really quick diaa very slow one in the pasOne of the benefits of dianeed is a dial-up account the Internet.This can be useful if youspeed Internet services.

62

for Digital Network (ISDN) is a set of coms digital transmission of voice, video, data, traditional circuits of the public switched teata transfer rates of 64 Kbps (64,000 bits pe

are defined.

sists of twohannels (Be 16KbpsD channel)t 144 Kbps.

Consists ofchannels (B Kbps signally channel (D channel) provid 64 Kbps channel is used for F

onnecting modem is permanently etched inse a dial up connection, most children grow

nnections such as DSL,T1, and WiFi havep connections obsolete.dial up connection and I was really excited past.dial-up service is that if you have a land linnt and the modem built into your computer

ou are frequently in areas where you canno.

62

mmunicationta, and other telephone per second).

viding service atFraming and

into the brain ofrowing up today

ve made the out

ed because I had

line, all that youter to connect to

nnot access high

Page 71: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

63

Definition

The graphical control (also called dialogue box osmall window that communithe user and prompts theDialog boxes are classifie"modeless", depending on winitiated the dialog. The typeuser interaction. The simplemessage and may require ausually by clicking "OK", proceed by clicking "OK""termination notice" sometimread in the event of either anof an application or the opeand must close.") Although tit is also criticized by usabiwhich is to protect against better alternatives exist.

Modeless

Non-modal or modeinformation is not essential twork continues elsewhere. Aeither separate from the mapplication, and items in thfunctions of the application. of this type where possible, of operation. An example me.g. the background and textwindow whatever color it is,

63

32. DIALOG BOX

rol element dialog boxx or just dialog) is aunicates information tothem for a response.ified as "modal" orn whether they block interaction with thepe of dialog box displayed is dependent upplest type of dialog box is the alert, whi

re an acknowledgment that the message h", or a decision as to whether or not an K" or "Cancel". Alerts are also used etimes requesting confirmation that the nor an intentional closing or unintentional cloperating system. (E.g., "Gedit has encounh this is a frequent interaction pattern for mability experts as being ineffective for its st errors caused by destructive actions, a

odeless dialog boxes are used when tal to continue, and so the window can be le

re. A type of modeless dialog box is a too main application, or may be detached fro the toolbar can be used to select certain. In general, good software design calls fo

le, since they do not force the user into a pa might be a dialog of settings for the curreext colors. The user can continue adding te is, but can change it at any time using the d

63

he software that upon the desired

hich displays a has been read,

an action shouldd to display a notice has beenclosing ("crash")untered an errorr modal dialogs,its intended use,, and for which

the requestede left open whiletoolbar which is from the mainrtain features or for dialogs to be particular mode

urrent document, text to the maine dialog.

Page 72: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

64

Application modal

Modal dialog boxes temporarily halt the program: the user cannot continuewithout closing the dialog; the program may require some additional informationbefore it can continue, or may simply wish to confirm that the user wants toproceed with a potentially dangerous course of action (confirmation dialog box).Usability practitioners generally regard modal dialogs as bad design-solutions,since they are prone to produce mode errors. Dangerous actions should beundoable wherever possible; a modal alert dialog that appears unexpectedly orwhich is dismissed automatically (because the user has developed a habit) will notprotect from the dangerous action. A modal dialog interrupts the main workflow.This effect has either been sought by the developer because it focuses on thecompletion of the task at hand or rejected because it prevents the user fromchanging to a different task when needed.

Document modal

The concept of a document modal dialog has recently been used, mostnotably in OS X and Opera Browser. In the first case, they are shown as sheetsattached to a parent window. These dialogs block only that window until the userdismisses the dialog, permitting work in other windows to continue, even withinthe same application. In OS X, dialogs appear to emanate from a slot in their parentwindow, and are shown with a reinforcing animation. This helps to let the userunderstand that the dialog is attached to the parent window, not just shown in frontof it.

Both mechanisms have shortcomings

The Windows dialog box locks the parent window which can hide otherwindows the user may need to refer to while interacting with the dialog,though this may be mitigated since other windows are available through thetask bar.The OS X dialog box blocks the parent window, preventing the user fromreferring to it while interacting with the dialog. This may require the user toclose the dialog to access the necessary information, and then re-open thedialog box to continue.

Page 73: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

65

3

History

In 1988, Shafi Goldwfirst to rigorously define thThey described a hierarchypresented the GMR signatueven an existential forgery ag

Definition

A digital signatureauthenticity of a digital mesrecipient reason to believe tthe sender cannot deny hrepudiation), and that the msignatures are commonly usein other cases where it is imp

Working

To create RSA signamodulusN that is the producthat e d ≡ 1 (mod φ (N)), whe

consists ofN ande, and the s

To sign a messagem,receiver checks that σ

e≡ m

prevent attacks, one can firstand then apply the RSA algobe proven secure in the soschemes were of a similar t

65

33. DIGITAL SIGNATURE

ldwasser, Silvio Micali, and Ronald Rives the security requirements of digital signa

rchy of attack models for signature schemature scheme, the first that could be prov against a chosen message attack.

re is a mathematical scheme for demoessage or documents. A valid digital sign

e that the message was created by a know having sent the message (authenticati

e message was not altered in transit (inteused for software distribution, financial tramportant to detect forgery or tampering.

gnature keys, generate an RSA key pair uct of two large primes, along with integershere φ is the Euler phi-function. The signee signer's secret key containsd.

m, the signer computesσ ≡ md (mod N). m (mod N). This basic scheme is not ve

irst apply a cryptographic hash function to tlgorithm described above to the result. This

so-called random oracle model. Most ear type: they involve the use of a trapdoor

65

vest became thenature schemes.

hemes, and alsoroved to prevent

monstrating theignature gives aown sender, thatation and non-ntegrity). Digitaltransactions, and

air containing agerse andd suchgner's public key

). To verify, the very secure. Too the message mhis approach can early signatureoor permutation,

Page 74: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

66

such as the RSA function, or in the case of the Rabin signature scheme, computingsquare modulo compositen. A trapdoor permutation family is a family ofpermutations, specified by a parameter.

That is easy to compute in the forward direction, but is difficult to computein the reverse direction without already knowing the private key ("trapdoor").Trapdoor permutations can be used for digital signature schemes, where computingthe reverse direction with the secret key is required for signing, and computing theforward direction is used to verify signatures.

Applications of Digital Signatures

As organizations move away from paper documents with ink signatures orauthenticity stamps, digital signatures can provide added assurances of theevidence to provenance, identity, and status of an electronic document as well asacknowledging informed consent and approval by a signatory. The United StatesGovernment Printing Office (GPO) publishes electronic versions of the budget,public and private laws, and congressional bills with digital signatures.Universities including Penn State, University of Chicago, and Stanford arepublishing electronic student transcripts with digital signatures.

Authentication

Although messages may often include information about the entity sending amessage, that information may not be accurate. Digital signatures can be used toauthenticate the source of messages. When ownership of a digital signature secretkey is bound to a specific user, a valid signature shows that the message was sentby that user. The importance of high confidence in sender authenticity isespecially obvious in a financial context.

Integrity

In many scenarios, the sender and receiver of a message may have a need forconfidence that the message has not been altered during transmission. Althoughencryption hides the contents of a message, it may be possible to change anencrypted message without understanding it.

Page 75: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

67

Definition

Direct3D is a grapMicrosoft Windows. Directapplication where performhardware acceleration if it iacceleration of the entire 3DDirect3D exposes the advaincluding Z-buffering,W-bu

Features in Direct 3d

Video mapping, hardwEven sprites providingties.Direct3D has supersed

Direct3D offers full emulation for features notprogrammed using Direct3Duser’s computer does not sup

Types of Devices:

There are four types of devic

67

34. DIRECT 3D

raphics application programming interfacrect3D is used to render three-dimensionarmance is important such as games. Dit is available on the graphics card allowing 3D rendering pipeline or even only partiavanced graphics capabilities of 3D graphbuffering.Stencil buffering.

rdware 3D rendering in 2D OVERLAV PLAing the use of 2D and 3D graphics in inte

seded the DIRECT DRAW FRAMEWORK

full vertex software emulation but no pnot available in hardware. For examplet3D requires pixel shaders and the video support that feature.

vices. They are:

67

rface (API) foronal graphics in

Direct3D usesing for hardwaretial acceleration.phics hardware,

PLANESnteractive media

RK.

pixel softwareple, if softwareeo card on the

Page 76: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

68

HAL(Hardware Abstraction layer) device: For devices supportinghardware acceleration.Reference device:Simulates new functions not yet available in hardware. Itis necessary to install the Direct3D SDK to use this device type.Null reference device:Does nothing. This device is used when the SDK isnot installed and a reference device is requested.Pluggable software device:Performs software rendering. This device wasintroduced with DirectX 9.0

Moreover, devices contain a collection of resources; specific data usedduring rendering. Each resource has four attributes:

Type

Determines the type of resource: surface, volume, texture, cube texture,volume texture, surface texture, index buffer or vertex buffer.

POOL

Describes how the resource is managed by the runtime and where it isstored. In the Default pool the resource will exist only in device memory.Resources in the managed pool will be stored in system memory, and will be sentto the device when required. Resources in system memorypool will only exist insystem memory.

Format

Describes the layout of the resource data in memory. For example,D3DFMT_R8G8B8 format value means a 24 bits colourdepth (8 bits for red, 8bits for green and 8 bits for blue).

Usage

Describes, with a collection offlag bits, how the resource will be used by theapplication. These flags dictate which resources are used in dynamic or staticaccess patterns. Static resource values don’t change after being loaded, whereas

dynamic resource values may be modified.

Page 77: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

69

35. DIR

Definition

Direct memory acceis a feature of computer syallows certain hardware subaccess main system memoindependently of the centralunit (CPU).

Without DMA, whentypically fully occupied for tthus unavailable to performtransfer, then it does other opreceives an interrupt from thfeature is useful at any timetransfer, or when the CPUrelatively slow I/O data trans

Many hardware sysgraphics cards, network cardata transfer in multi-core transfer data to and from dewithout DMA channels. DMor moving of data withinoperations, such as large codedicated DMA engine. ATechnology.

Modes of operation

• Burst mode

An entire block of datDMA controller is granted bytes of data in the data bloc

69

IRECT MEMORY ACCESS (DMA

ccess (DMA )r systems thatsubsystems tomory (RAM)

tral processing

hen the CPU is using programmed inpur the entire duration of the read or write oprm other work. With DMA, the CPU firsr operations while the transfer is in progress the DMA controller when the operation

ime that the CPU cannot keep up with thCPU needs to perform useful work while

ansfer.

systems use DMA, including disk drivcards and sound cards.DMA is also used re processors. Computers that have DMA devices with much less CPU overhead thMA can also be used for "memory to mem

thin memory. DMA can offload expen copies or scatter-gather operations, from An implementation example is the I/O

data is transferred in one contiguous sequed access to the system bus by the CPU, ilock before releasing control of the system

69

A)

put/output, it is operation, and isfirst initiates theess, and it finallyn is done. This the rate of datale waiting for a

rive controllers,ed for intra-chipA channels can than computersemory" copyingensive memorym the CPU to aI/O Acceleration

uence. Once the, it transfers allm buses back to

Page 78: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

70

the CPU, but renders the CPU inactive for relatively long periods of time. Themode is also called"Block Transfer Mode" .

• Cycle stealing mode

The cycle stealing mode is used in systems in which the CPU should not bedisabled for the length of time needed for burst transfer modes. In the cyclestealing mode, the DMA controller obtains access to the system bus the same wayas in burst mode, usingBR (Bus Request)and BG (Bus Grant) signals, whichare the two signals controlling the interface between the CPU and the DMAcontroller.

However, in cycle stealing mode, after one byte of data transfer, the controlof the system bus is de-asserted to the CPU via BG. It is then continually requestedagain via BR, transferring one byte of data per request, until the entire block ofdata has been transferred. By continually obtaining and releasing the control of thesystem bus, the DMA controller essentially interleaves instruction and datatransfers.

The CPU processes an instruction, then the DMA controller transfers onedata value, and so on. On the one hand, the data block is not transferred as quicklyin cycle stealing mode as in burst mode, but on the other hand the CPU is not idledfor as long as in burst mode. Cycle stealing mode is useful for controllers thatmonitor data in real time.

• Transparent mode

The transparent mode takes the most time to transfer a block of data, yet it isalso the most efficient mode in terms of overall system performance. The DMAcontroller only transfers data when the CPU is performing operations that do notuse the system buses.

It is the primary advantage of the transparent mode that the CPU never stopsexecuting its programs and the DMA transfer is free in terms of time.

The disadvantage of the transparent mode is that the hardware needs todetermine when the CPU is not using the system buses, which can be complex.

Page 79: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

71

36. DOMThe Domain Name

system for computers, servprivate network. It associateeach of the participating enwhich can be easily memorifor the purpose of computer

The Domain Name Symost Internet services becauDomain Name System distriand mapping those names servers for each domain.

Domain Name Syntax

The definitive descriptioRFC 1035, RFC 1123, and parts, technically called labe

71

MAIN NAME SYSTEM (DNS)e System (DNS) is a hierarchical distribrvices, or any resource connected to the

ates, various information with domain namentities. Most prominently, it translates dorized by humans, to the numerical IP adder services and devices worldwide.

System is an essential component of the fucause it is the Internet's primary directoryistributes the responsibility of assigning des to IP addresses by designating autho

ptions of the rules for forming domain namnd RFC 2181. A domain name consists of bels.

71

tributed naminghe Internet or aames assigned to domain names,ddresses needed

e functionality ofory service. Theg domain namesthoritative name

names appear in of one or more

Page 80: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

72

Label

A label may contain zreserved for the root zone. Tcharacters in its textual repre

Host name

Although domain namable in an octet, host namcharacters allowed in their laof characters a through z, A known as the LDH rule (lette

Name servers

The Domain Name Sywhich uses the client–serveservers. Each domain has ainformation about that domait. The top of the hierarchy iwhen looking up (resolving)

72

in zero to 63 characters. The null label, of l. The full domain name may not exceed thepresentation.

ames may theoretically consist of any charaames use a preferred format and chara

r labels are a subset of the ASCII character A through Z, digits 0 through 9, and hypheetters, digits, hyphen).

System is maintained by a distributed datrver model. The nodes of this database s at least one authoritative DNS server tmain and the name servers of any domains y is served by the root name servers, the seg) a TLD.

72

of length zero, isthe length of 253

aracter representaracter set. Theer set, consistinghen. This rule is

database system,se are the namer that publishes

ns subordinate to servers to query

Page 81: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

73

37.

A dongle is a small piprovide it with additional fusimilar devices meant to pdevices.

The CD-based parts requires a coded dongle be Some professional digital aurequired the presence of theorder to run.

Steinberg's Cubase ranfrequently send data to theelectronics inside the cartridg

To ensure compatibilioccupy the single cartridge accommodate them. Some exhost the different dongles unpirates were able to circumbinary to accept simulatedperformance.

Copy protection circumventi

Some unlicensed gamgames to pass along their auon the Nintendo Entertainme

73

37. DONGLE (ADAPTER)

l piece of hardware used to connect to ano functionality. The term "dongle" is also as provide additional forms of wireless co

ts catalog used by Volkswagen Group usebe plugged into a host computer's port in audio workstation packages on the Atari the supplied dongle in the computer's car

range and C-Lab's Creator and Notatothe dongle, which sends a response determridge.

ility with MIDI and other audio expansion ge port, some dongles had a pass-throughe expanders were also designed with backpl unique to a specific set of packages. Eventuumvent the dongle scheme by modifying ted dongle responses, at the expense of

vention

ame cartridges have a "daisy chain" that alr authorization, for instance to circumvent thment System.

73

nother device to associated with connectivity to

used since 1989 in order to run.ri TOS platformcartridge port in

tator packagestermined by the

on units that alsogh connector to

kplane sockets tontually, softwareg the program'sof stability and

t allows licensedt the 10NES chip

Page 82: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

74

Small peripheral applications

A Chrome cast plugged into the HDMI port of a TV. The wire attached tothe other end is the USB power supply. Small devices that plug into otherequipment to add functionality are often referred to as dongles. for example theinfrared remote control adapters available for smart phones, or digital mediaplayers such as Chrome cast MHL.

A dongle enables adaptation to legacy standards such as HDMI viaconversion circuitry contained in the dongle itself. MHL dongles often allow USBconnections and/or device charging as well.

Dongle used in Different Fields

• Very short cables that connect relatively large jacks to smaller plugsallowing cables to be easily installed and removed from equipment withlimited space available for connectors.

• Smartphone (portable CD players before 2000)• PersCassette adapters enable cassette-radios to allow AUX in, like with

iPod/MP3 playeronal FM transmitters allow content from a portable mediaplayer, portable CD player, Smartphone, portable cassette player, or otherportable audio system to be heard on an FM radio.

• IDE/PATA connectivity can be re-channeled with some dongles:• Floppy disk drives have been emulated on solid-state "dongles" to ensure

legacy recognition, allowing SD cards to serve software to old Commodore64 and AppleII era computers.

• Allows SD cards to be recognized as "hard drives" on old DOS computers• Can be used in many video games.• USB host connectivity grants more flexibility to computer-based devices

• Older cars that "externalized" their CD players and changers from the headunit can now use "emulators" that allow USB and SD cards with MP3s andother audio files to be recognized as "tracks" to the CD control unit circuitry.

• The alternative term 'Pig-tail' is favored by some in the IT industry, due tothe appearance of a full-sized connection element, with a short, thin wireextending, somewhat reminiscent of the rear of porcine animals.

Page 83: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

75

38. EMOTICON

By plenty of measures, 2015 has been a banner year for emojis or emoticons.A Welsh professor declared them the fastest growing language in the UK. TheNew York Times used one in a headline, and a grid of them graced the cover ofThe New Yorker. To cap it all, last month the Oxford Dictionaries declared thetears-of-joy emoji the “word” of the year.

It now feels hard to imagine online communication without emojis, even iftheir explosion in popularity among English speakers only dates to October 2011,when Apple’s iOS 5 update bestowed the little icons upon millions of iPhones.

(Gmail launched emoji support several years earlier, as did a number of third-partyemoji apps, but neither of these developments paved the way for their mainstreamadoption in the way that putting them on the iPhone’s virtual keyboard did.)

The very first emojis appeared on a handset sold by the company J-Phone(now Softbank) in 1997, but high prices kept it out of the hands of average citizens.The direct ancestors of the emoji we know and use today debuted in Japan in 1999.

“The emoji boom is over here in Japan,” says Shigetaka Kurita, the man

widely credited withcreating the adorable little runes. “They’re still around,

they’re still pervasive, but they aren’t a fad anymore,” he says in his Tokyo office.

He ventures that when Obama mentioned emojis on the White House lawn.

Understanding the rise and fall of emojis in their homeland requires a littlehistory. When Japanese telecom leader DoCoMo introduced proto-emojis in 1999,they were a core feature of the company’s i-mode service, the nation’s first to bring

the internet to mobile phones. In comparison to modern standards, the crude dot-matrix designs are something like digital versions of the primitive single-celledorganisms that once emerged from the primordial ooze.

Emojis help to add nuance to quick fire messaging Emojis were such aphenomenon, in fact, that they nearly sank the Japanese launch of the iPhone in2008. A collection of the new emoji, made by Emojipedia. By the time Google andApple began “localising” the emoji for use on Western computers and phones a

decade later, display technology had leapfrogged the old screens upon whichKurita’s first emojis dwelled.

Page 84: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

76

The resulting demand Western designers to “fill in

the horror of Japanese emoji

Signs of the times: Emojis pa

The Oxford Dictionary

emoji, a decision that provoinclined. In fact, this additio“app” and “tweet” the year b

In 2008 the word was

are all words that once upon

without.So what’s next for

hashtags #stormtrooper, #Cemoticon automatically showcan now download the new “

and lots of very cold-looking

In 2016, Apple users bacon strips, champagne, a pand the introduction of Mrs Cl

76

nd for crisper graphics and more detailed iml in the blanks” with their interpretations, o

oji specialists.

jis past and present

nary word of the year for 2015 was the “

ovoked howls of derision from the non-teition was very telling: the word of the year before that.

was “bailout” – in reference to bailing out on a time we had no need for, but nowadays

for emojis? Fans of Star Wars can curre

#C3PO and #BB8 on Twitter and have ow up next to the word. Scandinavians andw “Nordic Emoji”, which includes long-haiing people.

ers can hope for 38 new emojis to play w a pregnant woman, a groom to go along wrs Claus.

76

d imagery forced, occasionally to

e “tears of joy”

-technologicallyear in 2010 was

ut a bank. Theseays we can’t live

urrently use the

ve a Star Warsnd scandi-lovershaired rock gods

with, including with the bride–

Page 85: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

77

39. ENCAPSULATED POST SCRIPT (EPS)

Encapsulated PostScript (EPS) is a DSC-conforming PostScript documentwith additional restrictions which is intended to be usable as a graphics file format.In other words, EPS files are more-or-less self-contained, reasonably predictablePostScript documents that describe an image or drawing and can be placed withinanother PostScript document. Simply, an EPS file is a PostScript program, saved asa single file that includes a low-resolution preview "encapsulated" inside of it,allowing some programs to display a preview on the screen. At minimum, an EPSfile contains a Bounding Box DSC comment, describing the rectangle containingthe image described by the EPS file. Applications can use this information to layout the page, even if they are unable to directly render the PostScript inside.EPS,together with DSC's Open Structuring Conventions, form the basis of earlyversions of the Adobe Illustrator Artwork file format.

Identification

There are different ways in which EPS previews are handled, there is no oneway to identify an EPS file. A Windows-format EPS file containing a TIFF orWMF preview must start with the four bytes containing, in hexadecimal, C5 D0D3 C6. These bytes comprise the first four bytes of a 30-byte header, whoseremaining fields are six unsigned 32-bit integers and a 16-bit checksum. (Oftentwo zero bytes follow the header.) EPS files having "DOS" WMF or TIFFpreviews are widespread on all platforms. In all other cases an EPS file must startwith a line where a, b, c and d are all single digit numbers. A Mac-format EPS fileis accompanied by a resource fork. The preview is a PICT resource with ID 256.An EPS file on the Mac is expected to have a file type code of "EPSF", whether ornot it has a preview. An EPSI file will contain a line starting in the DSC prolog. Inmany cases they are not present at all.

Previews in Eps

EPS files also frequently include a preview picture of the content, for on-screen display. The idea is to allow a simple preview of the final output in anyapplication that can draw a bitmap.

Page 86: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

78

Without this previewPostScript (PS) data inside machines until recently.

When EPS was firsPostScript were Apple MaciPostScript, which presentedimage while also including turned out to be easy to solvas forks) that are logically redata fork and a standard Mcould be moved about togetpreview often contains a bitmwhole image, providing very

Neither of these techsystem, however. When facbased versions of their proencoded into the header sectthey used the WMF (Windowprovide vector previews, simEPS files have a particular dpreview are all in the same not understand the format weformat known as an EPSI incallows for black-and-white Unfortunately, with several limited portability. An applicwill typically show an empcorrectly.

78

ew the applications would have to directde the EPS, which was beyond the capabi

first implemented, the only machines acintoshes. These machines could not direced Adobe with the problem of how to provg the actual PS version for the printer. On

solve, as the Mac file system includes two referred to as one file. By placing the Po Mac PICT resource in the resource fork,gether invisibly as if they were one file. Witmap it could also contain a vector represe

ery high quality previews.

echnologies is commonly used on any otfaced with the same problems on Microsoprograms, Adobe chose to instead includection of the PostScript. Sometimes, thoughdows Metafile) format instead. WMF has th similar to PICT on the Mac. Both of thear disadvantage: because the PostScript date file, they will cause printing errors if a

well enough to extract only the PostScript includes an ASCII-encoded preview bitmapte previews only. It is mainly used on U

ral different ways of representing the previplication which is unable to interpret a EPS

pty box on screen, but it will be able to

78

ectly render theabilities of most

s widely usingrectly render therovide a previewOn the Mac thiswo parts (knownPostScript in therk, both imagese. While a PICTresentation of the

other operatingosoft Windows-lude a TIFF fileugh more rarely,s the potential tothese PC formatdata, header and a program doespt data. A fourthap. This format

UNIX systems.view, they havePS file's preview to print the file

Page 87: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

79

40. EXPAN

Expansion Card

Expansion card referreinterface adapter, or card, anslot on a desktop computcapabilities, such as graphiboards.

Types of Expansion Cards

Interface card (ASCSI, Serial, andModemMPEG DecoderNetwork cardSound cardVideo cardVideo capture ca

79

PANSION CARD FOR PRINTERS

rred to as an add-on card, expansion board,, an expansion card is a PCB that fits intoputer. An expansion card is used to ghics card. Expansion cards sometimes ca

ds

(ATA, Bluetooth, EIDE, Fire wire, IDE, Paand USB)

er

card

79

S

rd, internal card,to an expansion

give computer called daughter

, Parallel, RAID,

Page 88: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

80

The purpose of add

motherboard is to add or Expansion cards are a way to

Expansion of Cards

An expansion cfunctionality to cMany differentsound cards, vide

Related Tags

Categories : Hardw

Synonyms : Printed

Etched

Computer Function And A

An expansion card is

capabilities. Expansion cards

Eg: Computer’s V

80

dding an expansion card or board to

r expand some sort of functionality to ty to upgrade a computer.

card is an electronic card board is usedto computers.

rent classes of expansion card are availabideo graphics card, network cards and so on

rdware Motherboards Electronics

ted Wiring Board (PWB),

ed Wiring Board (EWB)

nd Accesories

is a card which you can install to expand a

rds are inserted into expansion slots on the m

Video Card.

80

o a computer’s

o the computer.

sed to add extra

ilable, including on.

d a computer’s

he motherboard.

Page 89: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

81

41. FILE A

A File Allocation Tmap of the basic units of login. When you write a new clusters that are not necessscattered over the disk.

When you read a ficlusters and places it as an this is a long Web page, it your hard disk.

DOS 5.0 and later versthe 16-bit FAT entry limit bWith 32-bit FAT entry (FAhard disk that can be supportlikely to take advantage of FA

Unused (0x0000)Cluster in use by a fileBad cluster (0xFFF7)Last cluster in a file (0

There is no organizatifirst available location on thethe first cluster used by the in the file, or an indication (links and end of file indicato

Example of File Allocation

A version of the file aand Windows 98. FAT32 incalso reduces the size of each(up to 2 terabytes) and better FAT32 and NTFS each use

81

E ALLOCATION TABLE (FAT)

n Table (FAT) is a table that maintains a logical storage on a hard disk that a file haw file to a hard disk, the file is stored inessarily next to each other; they may be

a file, the operating system reassembles an entire file where you want to read it. Foit may very well be stored on more than o

versions provide for support of hard disks uit by supporting separate FATs for up to fFAT32) support in Windows 95 OSR2, thorted is two. However, personal computer uf FAT32 with 5 or 10 gigabyte drives.

fileF7)

(0xFFF8-0xFFFF)

ation to the FAT folder structure, and files the volume. The starting cluster number is e file. Each cluster contains a pointer to thn (0xFFFF) that this cluster is the end of tators are shown below.

on Table

le allocation table (FAT) available in Windoincreases the number of bits used to addresach cluster. The result is that it can suppotter storage efficiency (less slack space). FAuse different cluster sizes depending on th

81

)

s and provides a has been stored in one or morebe rather widely

es the file from For example, ifn one cluster on

s up to two witho four partitions., the largest sizeer users are more

les are given ther is the address of

the next clusterf the file. These

ndows 95 OSR 2ress clusters andport larger disks FAT12. FAT16, the size of the

Page 90: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

82

volume, and each file systemThe smaller the cluster size, unused space within a cluste

With the advent of Winclude the NTFS. NTFS is introduced with first versionof FAT’s deficiencies, it pro

file system is inherently mdamage in the event of a sysrecoverable via the chkdsk.e

Some FAT source code and

OS.ZIP - This is my

FAT32.HTML - This is an

FAT12.ASM - Example o

FAT16.ASM - Example o

FAT32.ASM - Example o

82

stem has a maximum number of clusters ize, the more efficiently a disk stores informster cannot be used by other files.

f Windows XP in October 2001, support waFS is a completely different file system from

ion of Windows NT in 1993. Designed to provides for greatly increased privacy and

more resilient than FAT, being less liksystem crash and it being more likely that ak.exe utility.

nd information:

my OS package! It contains three boot secto

an excerpt from the FAT32API.HLP file fro

le of a FAT12 boot sector.

le of a FAT16 boot sector.

le of a FAT32 boot sector.

82

s it can support.rmation because

was extended tom FAT that wasto address manynd security. The

likely to sufferat any damage is

ctor sources.

from Microsoft.

Page 91: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

83

A flat file databasesystem as an ordinary "flat fiit, the file must be read completion of the database othe host's file system. In thisno structure for indexing anthe records. A flat file can be

Data transfer operations

Flat files are used notools in DB and CMS systtransfer tools to remote servbecome known as informatio

In recent years, this lawhich not only contain but transfer information are maiexpensive to modify. One crito perform mass data transfethat of flat files, which is gethis problem consists in XMLto flat files), which has nInterchange, which is often u

It is advisable that trabecause defining the comprethe file contents are readilycommunicating systems toproperties such as positioncircumstances where the shsystems becomes a problemIn order to successfullycommunication, format, valXML file data source), it is a

83

42. FLAT FILE

seis a database which is stored on its ht file". To access the structure of the data and in its entirety into the computer's me operations, the file is again written out inhis stored mode the database is "flat", whichand there are usually no structural relation be a plain text file or a binary file.

ns

not only as data storageystems, but also as dataervers (in which case theytion streams).

latter implementation has been replaced wiut also describe the data. Those still usinainframes employing specific procedures criticism often raised against the XML fosfer operations is that file size is significan generally reduced to the bare minimum. TML file compression (a solution that applie nowadays gained EXI standards (i.e., En used by mobile devices).

transfer data be performed via EXI rather pression method is not required, because libily available, and because there is no neeto preliminarily establish a protocol deion, alignment, type, and format. Howe sheer mass of data and/or the inadequaem, the only viable solution remains the uslly handle those problems connected

validation, control and much else (be it a is advisable to adopt a Data Quality Firewal

83

host computera and manipulatememory. Upon

in its entirety toich means it hasonships between

with XML files,sing flat files toes which are too format as a wayantly larger than. The solution tolies equally well Efficient XML

er than flat files libraries readingeed for the twodescribing data

wever, in thosequacy of legacy use of flat files.ted with data a flat file or anall.

Page 92: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

84

Terminology

"Flat file database" may be defined very narrowly, or more broadly. Thenarrower interpretation is correct in database; the broader covers the term asgenerally used.

Strictly, a flat file database should consist of nothing but data and, if recordsvary in length, delimiters. More broadly, the term refers to any database whichexists in a single file in the form of rows and columns, with no relationships orlinks between records and fields except the table structure. Terms used to describedifferent aspects of a database and its tools differ from one implementation to thenext, but the concepts remain the same.

FileMaker uses the term "Find", while MySQL uses the term "Query"; butthe concept is the same. FileMaker "files", in version 7 and above, are equivalentto MySQL "databases", and so forth. To avoid confusing the reader, one consistentset of terms is used throughout this article.

However, the basic terms "record" and "field" are used in nearly every flatfile database implementation.

• Data types:Each column in a database table such as the one above is ordinarilyrestricted to a specific data type. Such restrictions are usually established byconvention, but not formally indicated unless the data is transferred toa relational database system.

• Separated columns:In the above example, individual columns are separatedusing whitespace characters. This is also called indentation or "fixed-width"data formatting. Another common convention is to separate columns using oneor more delimiter characters. More complex solutions are markup andprogramming languages.

• Relational algebra:Each row or record in the above table meets the standarddefinition of a tuple under relational (the above example depicts a series of 3-tuples). Additionally, the first row specifies the field names that are associatedwith the values of each row.

• Database management system:Since the formal operations possible with atext file are usually more limited than desired, the text in the above examplewould ordinarily represent an intermediary state of the data prior to beingtransferred into a database management system.

Page 93: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

85

43. GEOGRAP

A Geographic InSystem (GIS) is a system deand present all types of spatiGIS Techniques and Techno

Modern GIS technodigitized data creation metcreation is digitization, wherdigital medium through thcapabilities. With the wide aavenue through which geogra

Relating Information from

GIS uses patio-tempoinformation. Just as a relatimany different tables using and/or extent in space-timincreasingly also temporallz representing, and respectiv

Data Capture

The current trend for (GIS) is that accurate mappiwhile in the field. Depictedused.

GIS Uncertainties

GIS accuracy dependsreferenced. Land surveyors accuracy utilizing the deriveimagery powerful computersand expectations of GIS to se

85

APHIC INFORMATION SYSTEM

Information System or Geographical designed to capture, store, manipulate, anaatial or geographical data.hnology

nologies use digital information, for wethods are used. The most common me

here a hard copy map or survey plan is tran the use of a CAD program, and gee availability of heads-up digitizing is becomgraphic data is extracted.

om Different Sources

poral allocation as the key index variablelational database containing text or numbng common key index variables, the key iime. Any variable that can be located rally, can be referenced using a GIS antively.

for geographical information systempping and data analysis are completedcted hardware technology) is mainly

nds upon source data, and how it is encodrs have been able to provide a high level

rived positions. High-resolution digital terraers and Web technology are changing the qo serve society on a grand scale.

85

MS (GIS)

l Informationnalyze, manage,

r which variousmethod of data

transferred into ageo-referencing

coming the main

ble for all othermbers can relatey is the locationd spatially, and

IS and x, y, and

coded to be datavel of positionalerrain and aeriale quality, utility,

Page 94: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

86

Cartographic Modeling

The term "cartographicoined by in his PhD dissertawhich has the term in the titrefers to a process where sevsame area are produced, proc

Address Geocoding:

Geocoding is interpoladdresses or any other spatiaas a road centerline file withhistorically been interpolateroad segment. These are ususoftware will then place a dosegment of centerline. In thipositioned space as opposeincreasingly used to provide

Future of GIS

As discussed above, mactive GIS market has resulhardware and software comresult in a much wider apbusiness, and industry. It is will include the additional examine the variations in Eadvances in computer hardwto more and more GIS adopcoupled with the multimedpresentation of information aretention. The GIS of the futhe common man.

86

hic modeling" was probablyertation and later in his book title. Cartographic modelingseveral thematic layers of therocessed, and analyzed.

polating spatial locations (X,Y coordinateatially referenced data such as individual adith address ranges. The individual address lated, or estimated, by examining address rausually provided in the form of a table or dot approximately where that address belo

this case, the result of the geocoding will osed to an interpolated point. This approde more precise location information.

, many disciplines can benefit from GIS tesulted in lower costs and continual improvomponents of GIS. These developments application of the technology throughout is quite likely that the future GIS systemsal dimension of time, giving researchers n Earth processes over days, months anddware, software and remote sensing technoopting multimedia to represent data. Theseedia technologies will result in a powerfn and ideas to stimulate interest and enhanc future will also be more users friendly and

86

ates) from streetl addresses, suchss locations haves ranges along aor database. Theelongs along theill be an actuallyproach is being

IS techniques. Anrovements in thets will, in turn,out government,ms of the futurers the ability toand years. Thenology will leadese GIS systemserful and richerance informationand accessible to

Page 95: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

87

44. GNUTELLA NETWORK

Its substantial user base and open architecture make it a good large-scale,if uncontrolled, test bed. We captured the network's topology, generated traffic,and dynamic behavior to determine its connectivity structure and how well (if atall) Gnutella's overlay network topology maps to the physical Internetinfrastructure. Our analysis of the network allowed us to evaluate costs andbenefits of the peer-to-peer (P2P) approach and to investigate possibleimprovements that would allow better scaling and increased reliability in Gnutellaand similar networks. A mismatch between Gnutella's overlay network topologyand the Internet infrastructure has critical performance implications

Developed in a 14 days “quick hack” by Nullsoft (winamp)

Originally intended for exchange of recipes

Evolution of Gnutella

Published under GNU General Public License on the Nullsoft web serverTaken off after a couple of hours by AOL (owner of Nullsoft)This was enough to “infect” the Internet

Gnutella protocol was reverse engineered from downloaded versions of theoriginal Gnutella softwareThird-party clients were published and Gnutella started to spread

BASED ON MESSAGE FLOODING

Typical values C=4, TTL=7One request leads to messagesHooking up to the Gnutella systems requires that a new peer knows at least oneGnutella host(gnutellahosts.com:6346; outside the Gnutella protocol specification)Neighbors are found using a basic discovery protocol (ping-pong messages)

Page 96: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

88

Gnutella: Protocol Message Types

TYPE DESCRIPTIONCONTAINED

INFORMATION

Ping Announce Availability And ProbeFor Other Servents

None

Pong Response To A Ping

Ip Address And Port # OfResponding Servent;

Number And Total Kb OfFiles Shared

Query Search RequestMinimum Network

Bandwidth Of RespondingServents ;Search Criteria

Query HitReturned By Servents That Have

The Requested File

Ip Address. Port# AndNetwork Bandwidth OfResponding Servent ;

Number Of Result AndResult Set

PushFile Download Requests ForServents Behind A Firewall

Servents Identifier ;IndexOf Requested File ;Ip

Address And Port To SendFile .

CONNECTIVITY IN GNUTELLA

Follows a power-law distribution: P(k) ~ k-g

k number of links a node is connected to, g constant (e.g. g=2)distribution independent of number of nodes Npreferential attachmentlow connected nodes follow a constant distribution (?): more robust.

Page 97: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

89

4

Google Drive is a synchronization service creallows users to store files files, and edit documents,presentations with collaboraencompasses Google, an officollaborative editing spreadsheets, presentations,launched on April 24, 2012 a2014.Client

For Google Drive toGoogle Drive storage, the Guser's computer. The client cone side to be propagated to Sundar Pichai of Google saibe tightly integrated with ChStorage

Google offers all usersstorage space that is shared services: Google Drive, GmPicasa Web Albums). Users account through a paid monadditional storage. Documenformats (including .gdoc, .count towards this quota. Inresolution less than 2048 x 2than 15 minutes also doquota. Uploaded files in MDocument formats (with posbe converted to Google's pcan be stored without countiAs of 13 March 2014, storag

89

45. GOOGLE DRIVE

a file storage andcreated by Google. Ites in the cloud, sharets, spreadsheets, andorators. Google Drive

office suite that permitsof documents,

ns, drawings, forms, and more. Googl2 and had 240 million monthly active users

to synchronize files between the user's ce Google Drive 'client' software must be runt communicates with Google Drive to cau to the other so they both normally contain tsaid that the Google Drive online storage Chrome OS version 20.

sers an initial 15 GB of onlinered across three of its most-used

mail, and Google+ Photos (akars can upgrade their free 15 GBonthly subscription plan to getents using Google Docs native

, .gslides, and .gsheet) do not. In Google+ Photos, photos ofx 2048 pixels and videos shorter

do not count towards this Microsoft Office and Openossible formatting changes) can

s proprietary formats, and thusnting against the storage quota.

rage plans offered by Google:

Storage

15 GB

100GB

1 TB

10 TB

20 TB

30 TB

89

gle Drive wasers as of October

r's computer ande running on thecause updates onn the same data.e service would

e Price

Free

$1.99 permonth

$9.99 permonth

$99.99 permonth

$199.99 permonth

$299.99 permonth

Page 98: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

90

Ownership and LicensingGoogle has one unified set of terms of service and privacy policy for all its

products. According to CNET, unlike competing servicesDrop box and OneDrive, Google has broad rights to reproduce, use, and create derivative works fromcontent stored on the Google Drive, via a license from its users. This license isperpetual even after the user removes the material.Google Drive for Education

Google Drive for Education was announced on September 30, 2014. It wasmade available for free to all Google Apps for Education users. It includesunlimited storage and support for individual files up to 5TB in size.Popularity

On November 12, 2013, Google announced that Google Drive had 120million active users, a figure that the company was releasing for the first time. OnJune 25, 2014 at the Google I/O conference, Sundar Pichai announced that GoogleDrive now had 190 million monthly active users, and that it was being used by58% of the Fortune 500 companies as well as by 72 of the top universities.Data safety and privacy

Some of the issues that have to be considered to see if Google Drive is"enterprise-ready" include:

• Encryption of data in transit and storage• Service Level Agreements (regarding electronic discovery and incident

management)• Audit trails for users and administrators• Data segregation and data isolation

PresentationsPresentations created in Google Slides can be up to 100 MB – which is

about 400 slides. Uploaded presentation files that are converted into Google Slidesformat can be up to 50 MB.Spreadsheets

All the limits on spreadsheets have been removed in the newer version ofGoogle Sheets. In the older version, there could have been a maximum of 256columns per sheet and 200 sheets per workbook, with 400,000 cells in all.

Uploaded spreadsheet files that are converted to Google Sheets formatcannot be larger than 20 MB, and need to be under 400,000 cells and 256 columnsper sheet.

Page 99: (2015-16) Gallery/Info Gallery V4.pdf · dex topic no. topic page no. 01 asymmetric digital subscriber line (adsl) 01 02 adware 03 03 accelerated graphics port (agp) 05 04 application

We express our sincere gratitude

for all those who have helped us, for

the successful launch of this book,

which is our new attempt .