Showing posts with label Computers-Basics. Show all posts
Showing posts with label Computers-Basics. Show all posts

How to Maintain pc

The internet is flooded with tips and advice on PC cleaning. Much of this advice urges you to buy useless programs that cost hundreds of [insert your currency here.] Look no further: you can follow this guide and get your PC clean without spending any money whatsoever. I do recommend programs, which have  paid upgrades; however, I am confident theseprograms,  when upgraded,  are  worth every penny and hundreds of Windows Guides...

What is Web browser?

Software that lets a user view HTML documents and access files and software related to those documents. Originally developed to allow users to view or browse documents on the World Wide Web, Web browsers can blur the distinction between local and remote resources for the user by also providing access to documents on a network, an intranet, or the local hard drive. Web browser software is built on the concept of hyperlinks, which allow users to point and click with a mouse in order to jump from document to document in whatever order they...

What is timing attack?

An attack on a cryptographic system that exploits the fact that different cryptographic operations take slightly different amounts of time to process. The attacker exploits these slight time differences by carefully measuring the amount of time required to perform private key operations. Taking these measurements from a vulnerable system can reveal the entire secret key. Cryptographic tokens, network-based cryptosystems, and other applications where attackers can make reasonably accurate timing measurements are potentially at risk from...

What is macro assembler?

An assembler that can perform macro substitution and expansion. The programmer can define a macro that consists of several statements and then use the macro name later in the program, thus avoiding having to rewrite the statements. For example, a macro called swap exchanges the values of two variables: After defining swap, the programmer can then insert an instruction such as “swap a, b” in the assembly language program. While assembling, the assembler replaces the instruction with the statements within the macro that swap the values of...

whiat is fuzzy logic?

A form of logic used in some expert systems and other artificial-intelligence applications in which variables can have degrees of truthfulness or falsehood represented by a range of values between 1-true and  0 -false. With fuzzy logic, the outcome of an operation can be expressed as a probability rather than as a certainty. For example, an outcome might be probably true, possibly true, possibly false, or probably false. fuzzy set :- A set constructed using the principles of fuzzy logic. It is used in artificial intelligence to deal...

what is file fragmentation?

The breaking apart of files as they are stored by the operating system into small, separate segments on disk. The condition is a natural consequence of enlarging files and saving them on a crowded disk that no longer contains contiguous blocks of free space large enough to hold them. File fragmentation is not an integrity problem, although it can eventually slow read and write access times if the disk is very full and storage is badly fragmented. Software products are available for redistributing optimizing file storage to reduce fragmentation....

What is data management?

The control of data from acquisition and input through processing, output, and storage. In microcomputers, hardware manages data by gathering it, moving it, and following instructions to process it. The operating system manages the hardware and ensures that the parts of the system work in harmony so that data is stored safely and accurately. Application programs manage data by receiving and processing input according to the user’s commands, and sending results to an output device or to disk storage. The user also is responsible for data...

HTTP status codes

Three-digit codes sent by an HTTP server that indicate the results of a request for data. Codes beginning with 1 respond to requests that the client may not have finished sending; with 2, successful requests; with 3, further action that the client must take; with 4, requests that failed because of client error; and with 5, requests that failed because of server error. 400, 401, 402, 403, 404, HTTP...

.NET Framework

A platform for building, deploying, and running XML Web services and applications. It provides a highly productive, standards-based, multilanguage environment for integrating existing investments with next generation applications and services, as well as the agility to solve the challenges of deployment and operation of Internet-scale applications. The .NET Framework consists of three main parts: the common language runtime, a hierarchical set of unified class libraries, and a componentized version of ASP called ASP.NET. See also ASP.NET,...

What is GPS receiver?

A device that includes an antenna, a radio receiver, and a processor for use with the worldwide GPS -Global Positioning System. A GPS receiver uses position and time information from four GPS satellites to calculate precise information about its current location, its speed of travel, and the current time. A portable GPS receiver may be a stand-alone device or a plug-in unit for use with a portable computer. GPS receivers are used for scientific work, such as surveying, mapping, and studies of volcanoes, as well as for land, sea, and air...

What is ini file?

ini file:-Short for initialization file, a text file containing information about the initial configuration of Windows and Windows-based applications, such as default settings for fonts, margins, and line spacing. Two ini files, win.ini and system.ini, are required to run the Windows operating system through version 3.1. In later versions of Windows, ini files are replaced by a database known as the registry. In addition to Windows itself, many older applications create their own ini files. Because they are composed only of text, ini files...

what is three-tier client/server?

A client/server architecture in which software systems are structured into three tiers or layers: the user interface layer, the business logic layer, and the database layer. Layers may have one or more components. For example, there can be one or more user interfaces in the top tier, each user interface may communicate with more than one application in the middle tier at the same time, and the applications in the middle tier may use more than one database at a time. Components in a tier may run on a computer that is separate from the other...

Whst is Password Authentication Protocol

Acronym for Password Authentication Protocol. A method for verifying the identity of a user attempting to log on to a Point-to-Point Protocol (PPP) server. PAP is used if a more rigorous method, such as the Challenge Handshake Authentication Protocol (CHAP), is not available or if the user name and password that the user submitted to PAP must be sent to another program without encryption. 2. Acronym for Printer Access Protocol. The protocol in AppleTalk networks that governs communication between computers and printer...

what is X Series for Network Communications

A set of recommendations adopted by the International Telecommunication Union Telecommunication Standardization Sector ITU-T, formerly the CCITT, and International Organization for Standardization ISO for standardizing equipment and protocols used in both public access and private computer networks. Recommendation Number What It Covers X.25 Interface required to connect a computer to a packet-switched network such as the Internet X.75 Protocols for connecting two public data networks X.200 Seven-layer set of protocols known as the...

What is MIME?

Acronym for Multipurpose Internet Mail Extensions. A protocol widely used on the Internet that extends the SMTP Simple Mail Transfer Protocol to permit data, such as video, sound, and binary files, to be transmitted by Internet e-mail without having to be translated into ASCII format first. This is accomplished by the use of MIME types, which describe the contents of a document. A MIME-compliant application sending a file, such as some e-mail programs, assigns a MIME type to the file. The receiving application, which must also be MIME-compliant,...

What is memory management?

In operating systems for personal computers, procedures for optimizing the use of RAM (random access memory). These procedures include selectively storing data, monitoring it carefully, and freeing memory when the data is no longer needed. Most current operating systems optimize RAM usage on their own; some older operating systems, such as early versions of MS-DOS, required the use of third-party utilities to optimize RAM usage and necessitated that the user be more knowledgeable about how the operating system and applications used memory....

What is markup language?

A set of codes in a text file that instructs a computer how to format the file on a printer or video display or how to index and link its contents. Examples of markup languages are Hypertext Markup LanguageHTML and Extensible Markup Language XML, which are used in Web pages, and Standard Generalized Markup Language SGML, which is used for typesetting and desktop publishing purposes and in electronic documents. Markup languages of this sort are designed to enable documents and other files to be platform-independent and highly portable between...

why need For a relational database?

A database or database management system that stores information in tables—rows and columns of data—and conducts searches by using data in specified columns of one table to find additional data in another table. In a relational database, the rows of a table represent records (collections of information about separate items) and the columns represent fields (particular attributes of a record). In conducting searches, a relational database matches...

Os registry?

A central hierarchical database in Windows 9x, Windows CE, Windows NT, and Windows 2000 used to store information necessary to configure the system for one or more users, applications, and hardware devices. The Registry contains information that Windows continually references during operation, such as profiles for each user, the applications installed on the computer and the types of documents each can create, property sheet settings for folders and application icons, what hardware exists on the system, and which ports are being used.  The...

Whai is macro?

In applications, a set of keystrokes and instructions recorded and saved under a short key code or macro name. When the key code is typed or the macro name is used, the program carries out the instructions of the macro. Users can create a macro to save time by replacing an often-used, sometimes lengthy, series of strokes with a shorter version. 2. In programming languages, such as C or assembly language, a name that defines a set of instructions that are substituted for the macro name wherever the name appears in a program a process called...