Monday, May 24, 2010

Efficient Use of Computer Network Support






Efficient Use of Computer Network :

What if someone told you that you could reduce your business expenses by one-third and that all you needed to do was to invest in a quality computer network support service? Just imagine how much you could do with the extra time and money you'd have saved up by not expending your precious resources on timeconsuming, recurring problems with your current business IT support.

You'll have more time for innovative new ideas when you're not mired down by by technological glitches and inadequacies. After all, your computer networking services are meant to be a driving force in your business, and you want to be hitting the accelerator, not the brakes.The above reasons, among many others, are why so many businesses are investing in hiring outside companies to manage their networks. By hiring professionals, you ensure that only the most knowledgeable staff will be handling your IT concerns, freeing up your employees to get back to what they do best.

It is often far more cost-effective than hiring your own IT staff as well, especially for small businesses. Having a team behind the scenes to keep you on course means that you will experience fewer errors and a higher quality of performance from your network. With the right company, there won't be any time delay either; it will be just like having your own in-house IT staff, only better!Many people start out thinking that that they are good with computers and will be able to handle their company's network and IT needs. What they learn is that it isn't always about skill. Sometimes, it's about time. If your network goes down, so does your ability to do business with the rest of the world. The time you spend fixing it is lost time. It is also time that is taking you away from the rest of your job, which is where your skills are truly needed to keep your company going. With a staff of people who are able to devote their time to fixing issues before they develop, you eliminate an irksome and costly drain on your budget.Evaluating the needs of your business is something that will help you to determine what you need in terms of support. You may find that, based on the size and function of your business, you don't actually need comprehensive network support. It might be that your main need is help on a per-incident basis. Of course, you might choose a more comprehensive package so that you don't have to worry about any of it. Regardless of how much or how little tech support you need, having a qualified staff of professionals at your side will be much more efficient in the long run. Say goodbye to the days of network worries and get ready to refocus your energy on your company's success.

Are Apple Laptops Innovative?

Apple notebooks have created a niche for themselves in the laptop industry. What makes Apple laptops different from others in the market? In short, it is Apple’s high-end features, cutting-edge technology, innovative ideas, and creative design. With these, they can meet all your computing needs while on the move. This makes these creatively-designed laptop computers, the first choice among laptop buyers worldwide.

You can find a wide range of Apple laptop computers that suit your requirements at Portable One, a systems integrator and reseller of mobile computing products. I bought an Apple MacBook Air from Portable One and am pleased with it.

This cute-looking notebook has a 13.3-inch display. Don’t go by the size and doubt its capabilities. These computers are made from a single-piece of aluminum that makes it lighter and thinner. You can easily carry it in your briefcase or backpack. The NVIDIA GeForce 9400M graphics processor is a big plus point to the laptop. To give the best quality other notebook PCs might drain your battery dry. But, the Apple MacBooks provide you better performance without draining the battery. You can watch your favorite videos or play 3D games even on the move.

If you are looking for a slightly bigger version, opt for the Apple MacBook Pro. Both 15-inch and 17-inch MacBook Pro laptops have ultra thin, high-resolution LED backlit displays for excellent picture quality. You will see the difference when you start using the new multi-touch trackpad in the Apple MacBooks. The trackpad that also works as a button helps you to click just anywhere you want to. All you have to do is press the trackpad. Read Apple’s online tutorial on MacBooks’ and learn all the interesting ways to use your trackpad efficiently with your fingers. It’s like magic, you will love it!

Tuesday, April 6, 2010

computer nanoinformation

Nana information

If we are to continue these trends we will have to develop a new manufacturing technology which will let us inexpensively build computer systems with mole quantities of logic elements that are molecular in both size and precision and are interconnected in complex and highly idiosyncratic patterns..

When it's unclear from the context whether we're using the specific definition of "nanotechnology" the broader and more inclusive definition we'll use the terms "molecular nanotechnology" or "molecular manufacturing."


Get essentially every atom in the right place.
Make almost any structure consistent with the laws of physics that we can specify in molecular detail.
Have manufacturing costs not greatly exceeding the cost of the required raw materials and energy.







Monday, April 5, 2010

Numerology in Definition

Numerology in Definition

We will then learn briefly about the history of numerology, discovering the ancient origins of this renowned science. We will compare various systems used in numerology to translate the value of letters into numerical structures and learn the general meaning of the numbers 1 through 9, 11, and 22.
Numerology is the metaphysical "science or philosophy" of numbers asserting that every object and living being within the universe can be explained, revealed and/or reflected through numbers. It is linked to the ancient mathematicians' beliefs that the foundation of the entire universe is built on and of numbers. Not unlike the core of computer intelligence, where the entire language is a combination of the numbers zero and one, numerology analyzes combinations of the numbers 1 through 9 to determine a language or science of its own.

Basically, numerology assigns a single-digit numerical value to every letter, month, day, year, etc. and then uses these numbers to predict and analyze. For instance, all the letters in your name can be translated into numbers, then added and reduced to a single-digit number that reveals your true self.

Most numerologists assert that each of us has been given a unique name intended just for us that reflects our own personal spiritual vibration or essence. And in the way that your name reflects your personal vibration, your birth date reveals your destiny. Still, there are other numerologists who believe that as our names and the years change so, too, do we. Nothing is absolutely sacred or carved in stone.

Whatever their personal belief, most numerologists believe very much in anything spiritual and/or divine. They promote the ideas of karma, past lives, destiny, souls, etc. This, unfortunately, can scare away many potential followers. I, myself, tend to be skeptical of most things in life and have not, as of yet, determined my complete spiritual belief system. But I don't think you are required to adopt all of numerology's assumptions in order to use and enjoy numerology. An open mind is all that is needed. You can decide "later and on your own terms" what your spiritual beliefs are.



A Brief History Of Numerology
Although the great mathematician and philosopher Pythagoras is considered the Father of modern numerology, numerology's history begins well before the famous Greek's irrevocable influence on our understanding of numbers. The exact date of numerology's origin may forever remain unknown despite the fact that many devotees still search the history books for clues. Hints abound in the religious doctrines of Christianity, Judaism, and Islam; it has been suggested that the answer may even be locked inside the walls of a great pyramid or Egyptian tomb we are yet to uncover. Time may or may not tell.
For the most part, numerologists recognize ancient Babylon as the earliest period of recorded history of numerology, where the Chaldean system of numerology was born under the influence of the Hebrews. Reinvigorated with the Pythagorean system, numerology has flourished, remaining largely untouched since the days of Pythagorus and enjoying worldwide recognition. Along with the practices of Feng Shui and Astrology, business tycoons, entrepreneurs and spiritualists to increase their levels of success and happiness, often use numerology.


Various Systems Within Numerology

The vast field of numerology, you will find different charts that display alphabets and their corresponding numbers. Although there are several, including the Kabbalah and the Ulian, there are generally only two that are used on a regular basis. As mentioned in our brief history lesson, these two systems are the Chaldean and Pythagorean conversion methods.
Pythagorean System

By far the most popular systemat found in numerology, the Pythagorean conversion chart is featured directly below. Easy to use and understand, it incorporates the numbers one to nine in its conversion system.
1 2 3 4 5 6 7 8 9
A B C D E F G H I
J K L M N O P Q R
S T U V W X Y Z .


Chaldean System
Based on the Hebrew alphabet, Chaldean numerology is another system used in numerology, albeit used much less often than the Pythagorean system. It incorporates the numbers one through eight.
1 2 3 4 5 6 7 8
A B C D E U O F
I K G M H V Z P
J R L T N W . .
Q . S . X . . .
Y . . . . . . .

For the duration of this course, we will be using the Pythagorean system. You can feel free to research and/or experiment with the other systems if you like, but you are not expected to know them for this course. As a quick example, I will demonstrate how to translate a name into a number. Using the Pythagorean chart I can change each letter of my name into a number.


A I N M I R E T H
1 9 5 4 9 9 5 2 8

We would then add up all of those numbers:

= 1 + 9 + 5 +4 + 9 + 9 + 5 + 2 + 8
= 52
= 5 + 2
= 7


The vibration or number of my Magickal name, then, is 7. CONGRATULATIONS!! You have just mastered the fundamental aspect of numerology.


The Meaning of Numbers

In numerology, each of the numbers one through nine has an inherent meaning that is found within its vibration. The meaning of each of the numbers is the basis of numerological analysis. Before we learn how to calculate our personal numbers, let's take a closer look at what each number symbolizes or represents. In this section I will briefly describe the meaning of each number. The Complete Idiot's Guide To Numerology, however, has a much more in-depth look at all of the numbers.
The Number One
The first of all numbers, The Number One is also the Leader of all numbers. People with the number one in their charts are creative, energetic, independent, and intuitive. These are the people that exude self-confidence from their every pore and silently beckon us to follow them. But even though number ones tend to be very generous, they can also become self-obsessed and insolent, deluding themselves into believing they are almighty and all-knowing.

The Number Two
Almost the complete opposite of the number one, The Number Two represents synergy and diplomacy. Not interested in becoming great leaders, people with the number two in their charts are content to work behind the scenes supporting and encouraging others. Gentle, sweet, supportive and loving, number twos have a tendency to allow others to walk all over them and influence their already fragile self-confidence and self-esteem. Depression and low self-confidence may become a problem for the number two.

The Number Three
The Number Three is exuberance incarnate. Happy-go-lucky and full of life, people with a number three in their charts are the consummate "life of the party!" Lucky, creative, and very extroverted, number threes love the finer things in life, spending money as quickly as they receive it. A flirt with his or her head in the clouds (can you say "delusions of grandeur?"), the three person has the negative tendency to become overly critical and sharp-tongued. Their moods are also known to fluctuate.

The Number Four
The Number Four represents pragmatism, security and stability. A hard worker with a practical mind geared toward the future, a person with the number four in their chart is the quintessential "head of the family" who looks after those he or she cares about. The number four's strengths are its steadfastness and tenacity; its weaknesses, rigidity and lifelessness. Along with that streak of practicality comes the tendency to be a bit of a bore
.

The Number Five
The Number Five symbolizes change, rebellion, and freedom. People with the number five in their charts value freedom above all else, oftentimes rebelling against the status quo, going where no one has dared go before, and refusing to allow others to dictate any control over them. Number fives often have trouble with commitment and can be talented at many things, but specialized in none. Because of this lack of commitment, people with the number five in their charts can begin to feel overwhelmed, having started many projects but finishing none.
The Number Six
The Number Six represents the home, family, love, beauty and romance. People with the number six in their charts are very loving, kind, and gentle. They are affectionate and tender and are natural born parents. And yet, since most of their decisions come from their heart it may be impossible to reach these soul creatures with reason. Add to this their unrelenting and fixed natures, and they can become difficult to live with, possibly even leaving the nest if they feel the love is no longer deep enough to sustain them.
The Number Seven
The Number Seven is often seen as the most eccentric of all the numbers. Mystical, deep, analytical, wise and intuitive, people with the number seven in their chart are the quintessential loners who seemingly abandon society in exchange for their own personal quests of knowledge and wisdom. But the number seven has many gifts and talents to share with the world and often makes a wonderful teacher. The number seven can become a bit out of touch with the needs of others if they withdraw too much; a balance should be sought.
The Number Eight
The Number Eight is one of the most powerful numbers in numerology. People with the number eight in their charts are born for achievement, success and leadership. They thrive on rising through a hierarchal organization and manipulating those working alongside of them to become part of their own vessel. They love money and grandeur and may stop at nothing to achieve their desired success.
The Number Nine
As the number one is the beginning of all things, the Number Nine is the end. It represents humanitarianism, compassion, tolerance and both spiritual and material success. People with the number nine in their charts are idealistic mystics that long to leave the world a better place. They are blessed with more charm and compassion than all of the numbers added together. Unfortunately, they can become too idealistic, forcing their beliefs onto others and/or becoming prejudiced against those who do not follow the path they themselves have chosen.

The Master Numbers

In addition to the numbers one through nine, there are numbers that numerologists refer to as master numbers. These numbers are 11, 22, 33, 44, 55, 66, 77, 88, and 99. For this course we will look only at the master numbers eleven and twenty-two. The higher master numbers are quite rare in the Western world.
It is said that the master numbers operate at a much higher vibration than the numbers one through nine, and that they also include the vibration of their single-digit reduction. For instance, the master number eleven would be written as 11/2, and consequently carries both the vibrations for eleven and two (even a double dose of ones).

People with a master number in their charts are called upon to bring many great gifts to the world. As noted in their book, The Complete Idiot's Guide To Numerology, Kay Lagerquist and Lisa Lenard tell us that many numerologists believe that if you have a master number in your chart you have probably made a pact with the higher power to return to earth for the betterment of humanity.

The Number Eleven (11 / 2)

The Number Eleven represents spiritual truth and communication. People with a number eleven in their charts are often highly intuitive and have a great message to share with the world. However, they may never be heard unless they can overcome their impulsivity and tendency to transpose their faults onto others.
The Number Twenty-Two(22 / 4)
Whereas the master number eleven has a message to convey to the world, the Number Twenty-two has come back to build something. People with the number twenty-two in their charts long to leave something grand and everlasting behind them that will hopefully remain standing long after they have gone. They have an amazing ability to turn dreams into reality. However, twenty-twos can be very sensitive, falling victim to the demands placed upon them by others and becoming generally overwhelmed, failing to complete their dream.


Astrology has almost as many faces as life itself. In other words, astrology is many different things for different people, and thus can't be defined in one word. Everyone experiences astrology in her or his own way. For some astrology is a science, for others it is an art or a skill, or even a religion. And for many it is just entertainment, good or bad. For many others it is mainly a psychological or spiritual technique. Astrology can, in fact, be applied to anything with a definite birth time and place.

And it truly has many applications: psychological astrology and astrotherapy, synastry medical astrology, political astrology, spiritual astrology, predictive astrology and many other kinds of astrologies as well. And also esoteric or occult astrology which sometimes comes close to rubbish, but at other times offers us all some deep and excellent insights.

And there are all kinds of astrological practitioners, some are specialists in different branches of astrology, but in small countries, like Finland, where there are only very few professional astrologers, most astrologers do all kinds of astrological work. Astrology can be used for so many purposes that you could almost say that astrology is what anyone wants it to be, from light astrological entertainment to depth-psychological astrology. And almost anything between these extremes.


Astrology Entertainment :
Astrology can be entertainment, but it's not just entertainment. Yet even serious astrology can sometimes be quite entertaining, and be that without losing any of its deeper meaning. Good astrological entertainment has its own value like any good entertainment, but unfortunately the major part of the lighter astrological entertainment is purely commercial and quite superficial. We all know - and many of us read - different kinds of weekly and monthly horoscopes in magazines.

Those horoscopes are usually based only on the Sun signs (the horoscope signs), because most people know their own Sun signs, and only a few their other astrological signs. The quality of horoscopes in newspapers and magazines varies considerably, it is rumored that they are not always made by astrologers at all. Sun signs are an important part of astrology, and horoscopes based on them an age-old technique, and thus, if well done by competent astrologers, they have their own place in astrology. In fact, many people find serious astrology through them.


Astrology New Age Mumbo-Jumbo:No, serious astrology isn't just any New Age mumbo-jumbo. In fact true astrology hasn't much to with New Age at all, it's age-old wisdom, but astrology is largely used in the New Age world - what interesting stuff isn't ?- but often in the way that qualified

Saturday, March 27, 2010

Advance computer Project Desgination

PROJECT DESCRIPTION

This project involves the development of web-based application to support the “E-Land Handling” newly started and suitable to all over tamilnadu.

This project contains very useful modules to support the operations of buying and selling as well as trading purposes.

By using this project, any property or landholders can register their property information and with photos of all information. After registration the registered information will be displayed in the corresponding pages and it becomes ready to sales.

This web application contains all modules to record the each and every information done towards houses, plots, buildings and agricultural or wet lands and provides facilities to buyers to easily purchase the property or lands over net without manual effort and problems
.

ANALYSIS OF THE EXISTING SYSTEM

Internet playing the vital role in all aspect of the human life. So one web-based application is very much essential to carry out the above-mentioned processes in fast manner.

ANALYSIS OF THE PROPOSED SYSTEM
The main objective of the proposed system is developing a new web based applications in order to support all the buying and selling activities of lands in time.
The web based application development for land buying and selling or property buying and selling surely will increase the speed of operations in “Eland Handling”.

Any individual buy or sell their property over Internet without any troubles and problems. The proposed system tested with some sample data college all around Dindigul District But capable to establish all over tamilnadu.
SYSTEM REQUIREMENT
Hardware Requirements
Each computer must have the following minimum configuration. All hardware should be on the Microsoft Windows 2000 Hardware Compatibility List.
Pentium II class processor, 450 megahertz (MHz).
160 MB physical memory, 256 MB recommended.
CD-ROM or DVD drive, 12x or faster recommended.
NOTE A DVD drive is required to install the Visual Studio .NET Professional Evaluation Edition software
gigabytes (GB) on installation drive, which includes 500 megabytes (MB) on system drive.
Super VGA (800 x 600) or higher-resolution monitor with 256 colors.
Microsoft Mouse or compatible pointing device.
Software Requirements
The following software is required to complete the procedures in this course.
Microsoft Windows 2000 or Microsoft Windows XP
Microsoft Visual Studio .NET, Professional Edition, Enterprise Developer Edition, or Enterprise Architect Edition
Microsoft Access 2000 with the Jet 4.0 data engine or Sql.Server 2000

SYSTEM DESIGN
System Design means the translation of analyzed requirements in to ways of meeting them. The design will determine the success of the proposed system. Based on the proposed system objectives of major modules are identified and the operations to be carried out are determinates.
INPUT OUTPUT DESIGN
The input design is the link that ties information system in to the world of its users, input design consists of developing specific procedures for data preparation, steps necessary to put the transaction of data in the form that is usable for computer processing.
This web application system contains the following input form modules and its input entries.

Plots Registration
Registering plot details by seller such as total are in sq. feet or in cent, location of plot with photo.
Houses Registration
Registering house details by seller such as total are in sq. feet or in cent, location of house with photo of house and surrounding area of house.

Lands Registration
Registering lands details by seller such as total Acres or Cents, location of lands and village sketch with photo and surrounding area…
Buildings Registration
Registering Buildings details by seller such as total are in sq. feet or in cent, location of Buildings with photo includes layout approval, Building approval plans.

Plots Listing
Listing of all plots details to buyer such as total are in square feet or in cent, location of plot with photo of layout and other things.
Houses Listing
Listing of all houses details to buyer such as total are in square feet or in cent, location of house with photo and with photos of surrounding area.



Lands Listing
Listing of all lands details to seller such as total are in sq. feet or in cent, location of house with photo and surrounding area…
Buildings Registration
Listing of all buildings details to buyer such as total are in sq. feet or in cent, location of house with photo of buildings and with photos surrounding area…

Buyer Preferences
Module used to specify the buyer's preference about the property such as his need (land, building or house) and preferences such as total are in sq. feet or in cent, location of house with photo and with photos surrounding area

Contact Seller
This module used to buyer to contact seller in buying process
Contact Buyer
This module used to seller to contact buyer in selling process

Remove Entry
This Module used to remove the details of property or land from website after selling it other person or buyer
Contact Organization
This module used to buyer and seller to contact website organization in buying and selling process


TABLE DESIGN

Table Plots
Field
Data Type
Regno
Number
SellerName
Text
PhoneNumber
Text
Location
Text
Village
Text
Panchayat
Text
Town
Text
District
Text
PlotNumber
Number
Square Feet
Number
Layout Fle
Text
Expected Sales Value
Number

Table Houses
Field
Data Type
Regno
Number
Seller Name
Text
Location
Text
Village
Text
Panchayat
Text
Town
Text
District
Text
Phone Number
Text
Square Feet
Number
Plan File
Text
Layout File
Text
View File1
Text
View File2
Text
Sales Value
Number

Table Buildings
Field
Data Type
Regno
Number
Seller Name
Text
Location
Text
Village
Text
Panchayat
Text
Town
Text
District
Text
Phone Number
Text
Square Feet
Number
Plan File
Text
Layout File
Text
View File1
Text
View File2
Text
Sales Value
Number

Table Lands
Field
Data Type
Regno
Number
Seller Name
Text
Location
Text
Village
Text
Panchayat
Text
Town
Text
District
Text
Phone Number
Text
Acre
Number
Land Sketch
Text
Detailed Sketch
Text
Land Description
Text
Sales Value
Text

Table Preferences
Field
Data Type
Name
Text
Customer Need
Text
District
Text
Town
Text
District
Text
Phone Number
Text
Acre
Number
Land Sketch
Text
Detailed Sketch
Text
Land Description
Text
Sales Value
Text

DATA FLOW DIAGRAM
Plot Registration
Houses Registration
Buildings
Registration
Lands
Registration
Plot
Listing

Houses
Listing

Buildings
Listing

Lands
Listing


Centralized
Data Base
Entering into Home Page
Buyer Preferences
Buyer Details
Seller Details
Remove Entry


VISUAL BASIC.NET

The .NET Framework and the Common Language Runtime
The Microsoft .NET Framework is an integrated and managed environment for the development and execution of your code. This lesson is an introduction to the .NET Framework, the philosophy behind it, and how it works.

Overview of the .NET Framework
The .NET Framework is a managed, type-safe environment for application development and execution. The framework manages all aspects of the execution of your program: it allocates memory for the storage of data and instructions, grants or denies the appropriate permissions to your application, initiates and manages application execution, and manages the reallocation of memory for resources that are no longer needed. The .NET Framework consists of two main components: the common language runtime and the .NET Framework class library.
The common language runtime can be thought of as the environment that manages code execution. It provides core services, such as code compilation, memory allocation, thread management, and garbage collection. Through the common type system (CTS), it enforces strict type safety, and it ensures that code is executed in a safe environment by enforcing code access security. The .NET Framework class library provides a collection of useful and reusable types that are designed to integrate with the common language runtime. The types provided by the .NET Framework are object-oriented and fully extensible, and allow you to seamlessly integrate your applications with the .NET Framework.
Languages and the .NET Framework
The .NET Framework is designed for cross-language compatibility. Simply put, this means that .NET components can interact with each other no matter what language they were originally written in. So, an application written in Microsoft Visual Basic .NET might reference a DLL file written in Microsoft C#, which in turn might access a resource written in managed Microsoft C++ or any other .NET language. This language interoperability extends to full object-oriented inheritance. A Visual Basic .NET class might be derived from a C# class, for example, or vice versa.
The Structure of a .NET Application
To understand how the common language run time manages the execution of code, you must examine the structure of a .NET application. The primary unit of a .NET application is the assembly. An assembly is a self-describing collection of code, resources, and metadata. The assembly manifest contains information about what is contained within the assembly. The assembly manifest provides
· Identity information, such as the name and version number of the assembly.
· A list of all types exposed by the assembly.
· A list of other assemblies required by the assembly.
· A list of code access security instructions for the assembly. This includes a list of permissions required by the assembly and permissions to be denied the assembly.
Each assembly has one and only one assembly manifest, and it contains all the description information for the assembly. The assembly manifest can be contained in its own separate file, or it can be contained within one of the assembly's modules. An assembly also contains one or more modules. A module contains the code that makes up your application or library, and metadata that describes that code. When you compile a project into an assembly, your code is converted from high-level code to IL. Because all managed code is first converted to IL code, applications written in different languages can easily interact. For example, one developer might write an application in Visual C# that accesses a DLL in Visual Basic .NET. Both resources will be converted to IL modules before being executed, thus avoiding any language incompatibility issues
The .NET Data Types
The .NET data types are the types you use to store your data. They are value types and can be broken down into subcategories: Integer types, Floating-point types, the Boolean type, and the Char type. Two built-in reference types that are an integral part of your application will also be discussed: the String type and the Object type.
Implementing Properties
Properties are members of classes that expose member variables or objects. Properties have similarities to both fields and methods. Values are set and retrieved using the same syntax as fields: getting a value from a property or setting a value with a property actually calls a specialized method that carries out these functions. Properties can contain code that validates values before setting them or carries out any other function that is required by the application.
Read-Only and Write-Only Properties
Sometimes you will need to implement a property that can return a value to the client but cannot be changed once the class is initialized. Very infrequently, you might need to create a property that can be changed but not read. These properties are called read-only and write-only properties, respectively.
Parameterized Properties
Most of the properties you create will return a single value or object. In Visual Basic .NET, you can create properties that accept parameters when accessed. These properties usually expose a range, or array of values. For example, a single Engine object might have several Cylinders. Rather than expose each one individually, you could create a Cylinder property that returned or set each cylinder based on a supplied parameter.
Object-Oriented Programming in .NET Frame work
Programming in the .NET Framework environment is done with objects. Objects are programmatic constructs that represent packages of related data and functionality. Objects are self-contained and expose specific functionality to the rest of the application environment without detailing the inner workings of the object itself. Objects are created from a template called a class. The .NET base class library provides a set of classes from which you can create objects in your applications. You can also use the Visual Studio programming environment to create your own classes to use in your programs. This lesson will introduce you to the concepts associated with object-oriented programming.
Objects, Members, and Abstraction
An object is a programmatic construct that represents something. In the real world, we think of objects like cars, bicycles, laptop computers, and so on. Each of these items exposes specific functionality and has specific properties. In your application, an object might be a form, a control such as a button, a database connection, or any of a number of other constructs. Each object is a complete functional unit, and contains all of the data and exposes all of the functionality required to fulfill its purpose. The ability of programmatic objects to represent real-world objects is called abstraction.
Classes Are Templates for Objects
Classes were discussed in Chapter 1 and represent user-defined reference types. Classes can be thought of as blueprints for objects. They define all of the members of an object, define the behavior of an object, and set initial values for data when appropriate. When a class is instantiated, an in-memory instance of that class is created.
Overview Of ADO.NET
Most applications require some kind of data access. Desktop applications need to integrate with central databases, Extensible Markup Language (XML) data stores, or local desktop databases. ADO.NET data access technology allows simple, powerful data access while maximizing system resource usage.
Disconnected Database Access
Previous versions of data access technologies have provided continuously connected data access by default. In such a model, an application creates a connection to a database and keeps it open for the life of the application or at least for the amount of time that data is required. As applications become more complex and databases begin to serve more and more clients, a connected data access technology becomes impractical for a variety of reasons.
ADO.NET Data Architecture
Data access in ADO.NET relies on two components: the DataSet, which stores data on the local machine, and the Data Provider, which mediates interaction between the program and the database.
The DataSet
The DataSet is a disconnected, in-memory representation of data. It can be thought of as a local copy of the relevant portions of the database. Data can be loaded into a DataSet from any valid data source, such as a Microsoft SQL Server database, a Microsoft Access database, or an XML file. The DataSet is persisted in memory, and the data therein can be manipulated and updated independent of the database. When appropriate, the DataSet can then act as a template for updating the central database.
The Data Provider
The link to the database is created and maintained by the Data Provider. A Data Provider is not actually a single component, but a set of related components that work together to provide data in an efficient, performance-driven manner. The Microsoft .NET Framework currently ships with two data providers: the SQL Server .NET Data Provider, which is designed specifically to work with Microsoft SQL Server 7.0 or later, and the OleDb .NET Data Provider, which connects with other types of databases. Each Data Provider consists of similar versions of the following generic component classes:
The Connection object provides the connection to the database.
The Command object is used to execute a command against a data source. It can execute either non-query commands, such as INSERT, UPDATE, or DELETE, or return a DataReader with the results of a SELECT command.
The DataReader object provides a forward-only, read-only, connected recordset.
The DataAdapter object populates a disconnected DataSet or DataTable with data and performs updates.

Tuesday, March 23, 2010

Advanced computer programmer




Advanced computer programmer

This computer is concerned with the design of reconfigurable computing systems using hardware explanation languages. Topics covered include field programmable gate array architectures computer arithmetic, high speed digital logic, interfacing and case studies. Emphasis will be on how to design high performance digital systems at the algorithmic, system and logic level. Each student is required to implement and test a digital design of moderate complexity. Prerequisite: Fault-Tolerant Computing
Fault tolerance used to be a requirement of computer systems in specialized applications such as spacecraft control and telephone switching. With the advancement of hardware and software technology and the increasing complexity of computer systems, fault tolerance has become a necessity for a wide range of industrial, commercial and even personal applications. Models and methods are used in the analysis and design of faulttolerant and highly reliable computer systems. The topics to be covered by this course include fault/error modeling, reliability analysis, various redundancy techniques, fault-tolerant system design methods, case studies of faulttolerant systems, and current research issues. Structure of sequential machines, linear sequential machines, state machine testing, information losslessness of finite automata, state-identification and fault-detection experiments, finite-state recognizers, sequential circuit retiming techniques, synthesis for combinational and sequential circuits.


Boolean network synthesis, technology mapping, delay analysis, sequential logic synthesis, state minimization, retiming resynthesis, verification, advanced applications using Ordered Binary Decision Diagrams hardware fault testing, and notions of design for testability. Advanced Workshop in Computer Engineering
Advanced Topics in Database Systems :This course will introduce to students advanced topics in database systems including advanced data structures, concurrency control, deadlock resolutions, recovery schemes, distributed database systems, multimedia database indexing techniques, and data mining. This course is intended to provide for senior undergraduate and beginning graduate students a concise survey of the most important and fundamental work on semantics of programming languages of different paradigms, together with the necessary background material from logic, lambda calculus, type theory, domain theory, and category theory. All of the three major approaches to semantics - denotational, operational, and axiomatic - and the relations among them are discussed.
This course will introduce to students advanced topics in operating systems. The detailed contents may be changed from year to year depending on the current development and the teacher specialty.
This course aims to introduce the computational learning theory for applications to various areas of finance. This course consists of two parts. The first part gives an introduction of basic mathematical methods in finance. The second part deals with nonlinear computing models, Bayesian Ying-Yang unified learning theory, other computational learning techniques, and their applications to FOREX or stock forecasting, portfolio optimization and programmed trading.
Deterministic and non-deterministic Turing machine, Church's Thesis, uncomputability and intractability, NP-completeness, polynomial time hierarchy, probabilistic computation, predicate calculus and incompleteness.
Techniques for Data MiningData mining provides useful tools for the analysis, understanding and extraction of useful information from huge databases. These techniques are used in business, finance, medicine and engineering. This course will introduce the techniques used in data mining. Topics will include clustering, classification, estimation, forecasting, statistical analysis and visualization tools.
Artificial Intelligence ProgrammingThis course examines two representational paradigms of artificial intelligence programming. Topics in logic programming include unification, , SLD-resolution, Prolog, negation and control, trees, list, difference list, and programming techniques. Topics in functional programming include function definitions, recursive functions, scope, higher-order functions, programming techniques, and basic lambda calculus. Provide in-depth treatment of the following advanced computer graphics and visualization topics: radiosity rendering and global illumination, procedure texturing and modeling, imagebased rendering, stereo imaging, real-time

Advanced Topics in Multimedia Database:
This course aims at an in-depth study of various aspects in the frontier research of multimedia database systems. These include image processing methods, indexing methods, system design issues, and basis of multimedia data such as compression techniques and resource management. Image processing methods for shape, color, texture manipulation, etc., will be covered. Indexing methods of R-trees, VP-trees, X-tree, etc., will be introduced. This course will provide the students with a theoretical background as well as a hands-on experience in the design and implementation of a multimedia database system.
Advanced Topics in Compiler Construction :
Advanced topics in compiler construction, including code optimization, partial evaluation, super compilers, compilation techniques for multiparadigm languages, concurrent compilers.

Combinatorial Search and Optimization with ConstraintsStudents will be exposed to various constraint-based combinatorial search and optimization techniques that arise in artificial intelligence, operations research, etc. Topics include, but are not limited to, local propagation, consistency algorithms, Boolean constraint solving, numerical constraint solving, linear programming, search, and their applications.
Information Retrieval and Search Engines
This course surveys the current research in information retrieval for the Internet and related topics. This course will focus on the theoretical development of information retrieval systems for multimedia contents as well as practical design and implementation issues associated with Internet search engines. Topics include probabilistic retrieval, relevance feedback, indexing of multimedia data, and applications in e-commerce.
Brain Theory and Sensorimotor Processing :
The main focus of the class will be to explore various aspects of biological neural network modelling for visuomotor coordination. Topics such as visual perception of form, texture, color, depth and motion, motor movement generation, sensorimotor interaction, neural mechanisms for learning and memory, and applications to intelligent robots will be examined. This will be an interdisciplinary course combining engineering, cognitive science, and neuroscience approaches. Students are expected to have knowledge in linear algebra, calculus, probability theory and programming.
Principles of Computational Learning :This course aims at providing theoretical guides and useful tools for students working on neural networks, pattern recognition, computer vision, artificial intelligence or other topics involving learning and mathematical modelling. The first part of this course is an extensive introduction to learning theories and techniques for neural networks or intelligent computational machinery in general. The second half will cover the major techniques such as supervised learning, unsupervised learning and self-organization, as well as reinforcement learning. It would be helpful to have some previous knowledge on probability theory, statistics, neural networks and pattern recognition.
Image Processing and Computer Vision :
Image Processing: enhancement technique, image compression, segmentation, morphology, color image processing and restoration. Computer Vision: representation, decision models, structural methods and image understanding.
Theory of Neural Computation: This course introduces state-of-the-art neural network research. It covers the learning algorithms of various neural network paradigms such as the backpropagation network, the Boltzmann machine, the Hopfield network, bidirectional associative memory, adaptive resonance theory, the Kohonen network, and learning vector quantizer. Techniques in the theoretical analysis of their characteristics, limitations, storage capacity, stability and convergence are included.

Computer Hacking

The term hacker has a double meaning within the field of computing. A hacker can be an expert computer programmer who creates complex software and hardware. These hackers are experts in the field of computing and have achieved a certain elite status within their field. The other commonly known meaning of the word is someone who breaks into computer security networks for his own purpose.

The media has perpetuate the more exciting connotation of the word hacker with films and books on the subject. Films such as War Games expose breaking into the Pentagon’s security system as similar to playing a computer game. A film about the computer hacker designing a software system would probably not do very big business at the box office.

A hacker who who breaks into systems primarily to steal is not regarded as a computer expert, although she can be. A hacker within the professional world of computing is regarded as a professional computer expert within his field. In the professional computing world, a hacker can be a computer and network security expert. She can also be a highly skilled software programmer or a hardware modifier. The type of hacker who breaks into bank accounts or a company’s network does exist, but the meaning is entirely different from that of a professional hacker.

The stereotypical image of a computer hacker, as portrayed by the media, is one of a shadowy figure, alone at a computer, stealing secrets and money. This type of computer hacking can bring rewards, but it can also bring huge fines and prison sentences. Thanks to the media, the average person is likely most proverbial with this definition of a computer hacker.

It is true that computer crime is on the increase, but it mainly takes the form of computer fraud. People are duped into giving out their bank and personal details after receiving bogus emails. This is not computer hacking, as it does not involve an attempt to break into a computer’s software system.

It is not on the whole difficult to gain access to someone’s email password. There are many Internet sites that claim to be able to gain access for a fee. However, these sites usually work by sending bogus emails asking the addressee to verify passwords for security reasons. This is not real computer hacking.

A real hacker in the field of computer security is someone employ to stop any unauthorized access to a network’s security system. If someone tells you that he is a computer hacker, it is not automatically a bad thing. He may be able to help upgrade your computer as a substitute of breaking into it.


Computer hacking is the practice of modifying computer hardware and software to complete a goal outside of the creator’s original rationale. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.

Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits. For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn Fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking.

In association to those who develop an interest in computer hacking out of simple logical curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s pecuniary data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years.
If you are interested in protecting your home computer against malicious hackers, investing in a good firewall is highly recommended. It’s also a good idea to check your software programs for updates on a regular basis

Computer Hacking

Computer hacking is the practice of modifying computer hardware and software to complete a goal outside of the creator’s original rationale. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.

Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits. For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn Fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking.

In association to those who develop an interest in computer hacking out of simple logical curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s pecuniary data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years.

If you are interested in protecting your home computer against malicious hackers, investing in a good firewall is highly recommended. It’s also a good idea to check your software programs for updates on a regular basis. For example, Microsoft offers a number of free security patches for its Internet Explorer browser.

NUMEROLOGY

A programmer, also recurrently referred to as a computer programmer, is commonly perceived as the brains behind a computer program. She typically writes detailed instructions that guide a computer through the logical steps necessary to process information to be used for specific applications. When a typical computer user initiate the screen command “view source,” the symbols and largely unidentifiable language that appear on the screen are normally the work of a programmer.

Programmers are employed by almost every sector of business, including profit and non-profit companies. They can be found in hospitals, educational institutions and government agencies. Engineering firms as well as production and manufacturing facilities regularly hire programmers. Some companies employ these professionals full-time while others only contract with programmers as required by the needs of the company.

Before a programmer embarks on a project, she normally confers with the employer to clearly understand the goals of the proposed program. Once she fully comprehends the program’s objective, the programmer typically constructs a flow chart that depicts how the information should travel through the system in a logical and orderly fashion. Software engineers and systems analysts are often asked to advise on this stage of the program development.

The language the programmer chooses for her program largely depends on the nature of the application. Some typical languages used to create Web sites and interactive forms include HTML, XML, XHTML and PHP. A common language for administrative, finance and business system applications is COBOL.

Once a program is complete, a programmer is generally required to run it to identify glitches in the context, content or language. This process, commonly called debugging, continues until the program is deemed complete and operational. Debugging can take anywhere from a few days to more than a year depending on the number of errors and the length of the program. A software engineer may again be called upon for assistance during this phase of programming.

The most common area in which programmers work is applications programming. Persons who focus on this type of programming normally specialize in writing language for a specific field, such as accounting or science. They differ from systems programmers who traditionally customize existing system programming to help old hardware successfully work with new hardware.

The minimum educational requirement for a programmer is usually a bachelor’s degree in information management, computer science, mathematics or systems programming. Solid experience in using various database systems is generally preferred. Certificates of completion in the latest programming languages and software are considered assets for job applicants.

Thursday, February 18, 2010



Motherboards sizes are as follows:
Standard AT = 12" w x 13.8" long
Baby AT = 8.57" w x 13.04" long
LPX = 9.0" w x 13.0
long ATX = 9.6" w x 12.00 long

Wednesday, February 17, 2010


Description:

The best way to describe the motherboard goes along well with my creature body analogy that I used for the CPU. The CPU is the brain, and the motherboard is the jumpy system. Therefore, just as a person would want to have fast message to the body parts, you want fast statement between the parts of your computer. Fast contact isn't as important as reliable communication though. If your brain wanted to move your arm, you want to be sure the nervous system can accurately and constantly carry the signal to do that! Thus, in my opinion, the motherboard is the second most important part of the computer.
The motherboard is the circuit board to which all the other components of the computer connect in some way. The video card, sound card, IDE hard drive, etc. all plug into the motherboard's various slots and connectors. The CPU also plugs into the motherboard via a Socket or a Slot.

This Guide, which I also call just the Reference Guide for dumpy, contains comprehensive metaphors of the major parts of a modern special computer, structured based on the various PC systems and components. I have attempted to be as complete as possible without getting too far into the technical details. The intention is to provide you, the reader, with a complete kind of how the PC works and what the issues are in designing and building one, while still being understandable by someone who isn't a PC expert.

In general, my focus in writing all of the objects on this site, is to look at the PC from the perspective of the home and business PC user, as well as the "do-it-yourselfer", superstar who wants to build or upgrade his or her own machine. I wanted to explain how the PC works from the inside out, so that you will be able to discriminate not just what the various parts of the system do, but why and how they do it.

I do not currently cover all of the components in a typical PC, even if I do cover the most important ones. Coverage for more peripherals will be upcoming in the future.

Tuesday, February 16, 2010

Hacker
The term hacker was once used to illustrate a clever programmer. Today, it’s applied to those who exploit security vulnerabilities to break into a workstation system. You can think of it as electronic burglary. Hackers regularly break into both character computers and large networks. Once they have access, they may install wicked programs, steal confidential data, or conceivably use compromised computers to share out spam.
Hackers are like electronic burglars, who use loopholes in your programs - vulnerabilities - to break into your computer system. You can protect yourself from hackers by using a firewall. A firewall program, which often comes as part of an anti-virus software package, protects a PC by detecting potential intruders and making the PC invisible to hackers.

Exposure
Today’s computer software is very complex, comprised of thousands of lines of code. Since software is written by humans, it’s hardly unexpected that they contain programming mistakes, known as vulnerabilities. These loophole are used by hackers to break into systems; they are also used by authors of mean code to launch their programs automatically on your computer.
Your computer behaves weirdly. in a way that you haven’t seen before.
You hear sudden sounds, played at accidental
Programs start unpredictably
Your personal firewall tells you that an application has tried to connect to the Internet.
Your computer ‘freezes’ frequently, or programs start running slowly.
You get lots of system error messages.
The operating system will not load when you start your computer.
You notice that files or folders have been deleted or changed.
You notice hard disk access when you’re not aware of any programs running.


Why is it essential to secure my wireless network?
These days, most computers are wireless-enabled: they let you connect to the Internet without a physical network cable. The major benefit, of course, is that you can use your computer anywhere in the house or office there are potential risks involved in wireless networking - unless you make your network secure:

A hacker could interrupt any data you send and receive;
A hacker could get access to your wireless network;
Another person could hijack your Internet access.
Therefore, if your wireless network is not protected, a hacker could intercept any data you send; access your network, and therefore your shared files; use your bond to connect to the Internet - especially significant if you have a download limit on your internet package and your bandwidth is being swallow up by a captor


symptoms

What are the symptoms of an contaminated computer?
It’s not always easy to tell if your computer has been compromised. More than ever before, the authors of viruses, worms, Trojans and spy ware are going to big lengths to secrete their code and conceal what their programs are doing on an infected computer. That’s why it’s essential to follow the advice given in this conduct in particular, install Internet security software, make sure you apply protection patches to your operating system and applications and backup your facts intermittently

Tuesday, February 2, 2010

Business software is generally any software program that helps a business increase efficiency or measure their productivity. The term covers a large variation of uses within the business environment, and can be categorized by using a small, medium and large matrix The small business market generally consists of home accounting software, and office suites such as Microsoft Office and OpenOffice.
The medium size, or SME, has a broader range of software applications, ranging from accounting, groupware, customer relationship management, human resources software, outsourcing relationship management, loan origination software, shopping cart software, ground service software, and other yield enhancing application
The last segment covers project level software applications, such as those in the fields of enterprise resource scheduling enterprise content management business process management and product lifecycle management. These applications are wide-ranging in scope, and often come with modules that either add native functions, or incorporate the functionality of third-party software programs.
Now, technologies that have beforehand only existed in peer-to-peer software applications, like Kazaa and Napster, are starting to feature within business applications. JXTA is an open source platform that enables the creation of machine and language neutral applications.

SYSTEM SOFTWARE

System software :
Device drivers
operating systems
servers
utilities
windowing systems
The purpose of systems software is to unburden the application programmer from the often complex details of the particular computer being used, including such accessories as communications devices, printers, device readers, displays and keyboards, and also to partition the computer's resources such as memory and processor time in a safe and stable manner. Examples are- Windows XP, Linux, and Mac OS X. integrated electronic environment that is available to and easily accessible by each employee and is structured to provide immediate, individualized on-line access to the full range of information, software, guidance, advice and assistance, data, images, tools, and assessment and monitoring systems to permit job performance with minimal support and intervention by others.
a computer-based system that improves worker productivity by providing on-the-job access to integrated information, advice, and learning experiences.

An electronic performance support system can also be described as any computer software program or component that improves employee performance by

Reducing the complexity or number of steps compulsory to perform a task,
providing the performance information an employee needs to perform a task, or
providing a decision support system that enables an employee to identify the action that is appropriate for a particular set of conditions.
Electronic concert Support Systems can help an society to reduce the cost of training staff while greater than ever productivity and routine It can empower an employee to achieve tasks with a minimum amount of peripheral intrusion or training. By using this type of system an employee, above all a new employee, will not only be able to inclusive their work more quickly and accurately, but as a secondary promote they will also learn more about their job and their employer's business.

EPSS must be famous from a long-established online help structure In her book, Glory Gery points out that on-line help habitually supports a single software application and is not necessarily focused on the entire range of job tasks but just that specific software. With online help, cross-referencing is often not available and the information provided is limited and rarely combined with procedures or complex tasks. Perhaps most critically, on-line help can not be customized to the user or the job task; in fact, the same software screen may require different inputs depending on the user and job task.

EPSS must also be differentiated from e-learning simulations that replay a series of steps on-demand within a software application. Simulations are more closely associated with on-demand training, not just-in-time support, because of the longer time considerations, complexity, and media restrictions for playing a simulation. Ted Gannan (2007) describes this differentiation and states that an EPSS can be considered a part of the e-learning category, as it is on-demand learning, and notes that the EPSS modality fits more within the informal learning definition.

A performance support system provides just-in-time, just enough training, information, tools, and help for users of a product or work environment, to enable optimum performance by those users when and where needed, thereby also enhancing the performance of the overall business.

In adding together to recommending consideration of an EPSS when knowledge is required to achieve individual performance in a business environment, Bezanson points out that an EPSS should be painstaking when skilled performers spend significant amount of time helping less skilled performers, when new workers must begin to perform immediately and training is impractical, unavailable or constrained, or employees need to be guided through a complex process/task that can’t be memorized. These situations often occur when new systems (e.g. Customer Relationship Management, Enterprise Resource Planning) are introduced, upgraded or consolidated, and in certain call centres when agents must perform using complex systems, processes or products

Monday, January 25, 2010

Dweller viruses :
Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses. This module, however, is not called by a finder module. The virus loads the imitation module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to make a certain operation. The reproduction module can be called, for example, each time the operating system executes a file. In this case the virus infects every suitable program that is executed on the computer.

Resident viruses are sometimes subdivided into a kind of fast infectors and a category of slow infectors. Fast infectors are considered to infect as many files as possible. A fast infector, for instance, canister infects every potential host file that is accessed. This poses a special problem when using anti-virus software, since a virus scanner will access every potential host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory the virus can "piggy-back" on the virus scanner and in this way infect all files that are scanned. Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently. Some slow infectors, for instance, only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably and will, at most, infrequently trigger anti-virus software that detects suspicious behavior by programs. The slow infector approach, however, does not seem very successful

Computer Virus

A computer virus is a computer plan that can copy itself and infect a computer. The term "virus" is also frequently but speciously used to refer to other types of malware, adware, and detective ware programs that do not have the reproductive ability. A true virus can only spread from one computer to another
when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or go unnoticed.

Friday, January 8, 2010

Hardware innovtive

Hardware of a modern Personal Computer:
1. Monitor
2. Motherboard
3. CPU
4. RAM Memory
5. Expansion card
6. Power supply
7. Optical disc drive
8. Hard Disk
9. Keyboard
10. Mouse


Inside a custom computer:
The motherboard is the main component indoors the case. It is a large rectangular board with integrated circuitry that connect the rest of the parts of the computer including the CPU, the RAM, the disk drives as well as any peripherals connected via the ports or the expansion slots. Computer Hardware course is very main in future being b'coz every work done by computer.
Components directly attached to the motherboard include:
The central processing unit (CPU) performs most of the calculations which enable a computer to function, and is sometimes referred to as the "brain" of the computer. It is usually cooled by a heat sink and fan.
The chip set mediates communication between the CPU and the other components of the system, including main memory.
RAM Stores all running processes (applications) and the current running OS. RAM Stands for Random Access Memory
The BIOS includes boot firmware and power management. The Basic Input Output System tasks are handled by operating system drivers.
Internal Buses connect the CPU to various internal components and to expansion cards for graphics and sound.
Current
The north bridge memory controller, for RAM and PCI Express
PCI Express, for expansion cards such as graphics and physics processors, and high-end network interfaces
PCI, for other expansion cards
SATA, for disk drives
Obsolete
ATA (superseded by SATA)
AGP (superseded by PCI Express)
VLB VESA Local Bus (superseded by AGP)
ISA (expansion card slot format obsolete in PCs, but still used in industrial computers)
External Bus Controllers
support ports for external peripherals. These ports may be controlled directly by the south bridge I/O controller or based on expansion cards attached to the motherboard through the PCI bus.
USB
FireWire
eSATA
SCSI
Power supply
A power supply unit (PSU) is the section that supplies influence to the other components in a computer. More specifically, a power supply unit is typically considered to convert general-purpose alternating current (AC) electric power from the mains (100-127V in North America, parts of South America, Japan, and Taiwan; 220-240V in most of the rest of the world) to usable low-voltage DC power for the internal components of the computer. Some power supplies have a switch to change between 230 V and 115 V. Other models have automatic sensors that switch input energy automatically, or are able to accept any voltage between those limits.