Different types of scanner devices

The scanner is a device that optically scans images, printed text, handwriting, any object, and which converts it into a digital image. Scanner which are Commonly used in offices are variations of the desktop flatbed scanner where the document is placed on a glass window for Scanning. Types of scanner Drum Flatbed CCD Scanner CIS … Read more

Piping in Unix or Linux

A pipe is a form of redirection that is used in Linux and other Unix-like operating systems to send the output of one program to another program for further processing. Redirection is the transferring of standard output to some other destination, such as another program, a file or a printer, instead of the display monitor … Read more

Local Area Network (LAN)

A local area network (LAN) is a network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings. Most LANs connect workstations and personal computers and enable users to access data and devices (e.g., printers and modems) anywhere on the network. The hardware components of … Read more

Web programming language: PHP

PHP is a well-known web programming language that has been widely used to create exceptional websites. According to W3Techs survey, PHP is being used by 82% of majority web server. This language is popular because of its collaborative features, excellent HTML and database integration support. Today, businesses are moving to the online world, and looking … Read more

The types of Keyboards

Keyboards and Screen Input Devices By: Sohel Shaikh(17BCE170) Keyboard is the most common and very popular input device which helps to input data to the computer. The layout of the keyboard is like that of traditional typewriter, although there are some additional keys provided for performing additional functions.Keyboards are of two sizes 84 keys or … Read more

Hadoop History

Hadoop is an open source, Java-based programming framework that supports the computing and storage of extremely large data sets in a distributed computing environment. It is section of the Apache project created by the Apache Software Foundation. Hadoop History As the World Wide Web grew in the late 1910s and 2010s, search engines and indexes … Read more

Steps of Referential Communication

Referential communication is composed of four steps. The first one is composed of a context-specific signal that has a meaning to the recipient (semantics). Secondly, there is a voluntary control over the signal being produced. In the third step, the signal is detected by the particular recipient. Finally, the signal is understood and the recipient’s … Read more

The Difference Between Desktop And Laptop

The difference between desktop and laptopIt is known to all, technology is of high development. No matter desktop or laptop has occupied their own situation in the share of market. But there are still many distinctions between them. We will talk about it in the next paragraph. At first, we should know what “computer” is. … Read more

TCP/IP (Transfer Control Protocol/Internet Protocol) model

TCP/IP (Transfer Control Protocol/Internet Protocol), is responsible for full-fledge data connectivity and transmitting data from one user to another. TCP handles the message part which is broken down into packets and then transmitted over the network. The packets are then received by equivalent TCP protocol in the receive and reassemble into the original message. The … Read more

8086 Microprocessor Overview

“ Microprocessor – the computer whose entire CPU is contained on one integrated circuits. The important characteristics of a microprocessor are the widths of its internal and external address bus and data bus (and instruction), its clock rate and its instruction set. Major Features 8086 Microprocessor is a 16-bit microprocessor. It is the highest data … Read more

Commonly used network devices

A network is a collection of computers, servers, mainframes, network devices and peripherals connected to one another to allow the sharing of data. Below are some of the commonly used network devices. Bridge A network bridge joins two different computer networks using the same protocol to enable them to work as a single network. Bridges … Read more

What is Virtual Reality?

Virtual reality is a computer technology that immerses a user in an imagined or replicated world (like video games, movies, or flight simulation), or simulates presence in the real world (like gliding through the canals on a gondola in Venice, or attending a Grammy Awards ceremony). The user experiences VR through a headset, sometimes in … Read more

Authentication and Authorization

How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two? Reasoning: Definition of Authentication: It is basically, check of who or what somebody is. Verification is required in frameworks all over the trade and business with a specific end goal to check the character of … Read more

User Datagram Protocol (UDP)

User Datagram Protocol (UDP) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing loss tolerant connections between two applications on the Internet. Both UDP and TCP run on top of the Internet Protocol (IP) in the transport layer and are sometimes referred to as UDP/IP or TCP/IP. Both protocols send … Read more

ASUS VivoBook F510UA FHD Laptop overview

The ASUS VivoBook F510UA FHD is a laptop with nice esthetics and a solid feature set, easily rivaling some of its premium competitors. The design and build quality of the laptop are really good. It’s easily one of the best you’ll find at this price, and as previously stated, it’s comparable with other premium laptops. … Read more

Basic facts about Grace Hopper

Basic facts about Grace Hopper. Grace Hopper’s full name and birth date/ place. Grace Hopper’s full name is Grace Brewster Murray Hopper. Grace Hopper was born on the 9th of December in 1906. Grace Hopper was born in New York City. Grace Hopper’s parents and her siblings. Grace Hopper’s father was named Walter Fletcher Murray. … Read more

The role of computer in education

Computer technology has had a deep impact on the education sector. The following are the importance of ICT in education as retrieved from several journals and databases. 1. Computers are a brilliant aid in teaching. Online education has revolutionized the education industry. Computer technology has made the dream of distance learning, a reality. Education is … Read more

Advanced Hands Free Computing. 

Discourse acknowledgment innovation is now accessible to Advanced education and Further Training as are a considerable lot of the contrasting options to a mouse. In this task, we have proposed another application for hands-free registering which utilizes voice as a noteworthy correspondence intend to help the client in checking and processing reason on his machine. … Read more

The Random Access Memory

RAM (random access memory) is the memory that the computer can use ‘randomly’, this is the memory that is kept available for programs to use – the memory available is measured in gigabytes (GB) and speed is measured in megahertz. This means the more RAM a computer has, the faster it will operate and will … Read more

Future Of Computing

Introduction For the past two decades, personal technology has made incredible advancement, bringing us into a fast paced, digital world that we live in today. In the 1980s we had supercomputers that took up the space of a whole room and today we all have computers with much more processing power than the supercomputers of … Read more

A Look at the Importance of Computer Skills

Though most students use computers for video games and social media, computers also hold a huge role in education in today’s world. Most high schools prepare students for college by having computer labs; where students can gain skills and a better understanding, of the significance of computers. In recent years, computers have become the ultimate … Read more

Computer Viruses

The Anna Kournikova worm Anna Kournikova (named by its author as “Vbs.OnTheFly Created By OnTheFly”) was a computer worm written by a 20-year-old Dutch student named Jan de Wit who called himself ‘OnTheFly’ on February 11, 2001. It was designed to trick email users into opening a mail message purportedly containing a picture of the … Read more

Review On Lenovo Ideapad 130 15-inch

According to Lenovo your search for a budget laptop with some really good features ends with Lenovo Ideapad 130. But to ensure that what they are saying is true, we need to look at the features and specifications in detail. Let us check out if this ideapad is just the right thing for people who … Read more

Wonders of the modern world

There are so many wonders of the world. But all of them are different in their nature. In the Ancient times there was Seven Wonders of the World: the Pyramids of Egypt, the Hanging Gardens of Babylon, the Statue of Zeus, the Temple of Artemis, the Mausoleum of Halicarnassus, the Pharos of Alexandria, and the … Read more

Common incoming email protocols

POP and IMAPPOP or post office protocol was created as a simplified way to download and delete messages on a remote email server. The latest version, POP, is supported by virtually all email clients and servers. Using POP an internet-connected email client accesses a remote mail server, downloads all email to your local computer, and … Read more

Hackers and computer industry

Explosive growth in the computer industry over the last decade has made new technologies cheaper and simpler for the average person to own. As result, computers play an intricate part in our daily lives. The areas in which computers affect life are infinite, ranging from entertainment to finances. If anything were to happen to these … Read more

Computer Viruses

In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the “Information Highway”, as it’s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In … Read more

Computer Hackers

Computer hackers in today’s world are becoming more intelligent. They are realizing that people are developing more hack-proof systems. This presents the hackers with a bigger challenge, which brings out more fun for them. The government is realizing this and needs to make harsher laws to scare the hackers more. With the increase in hacking … Read more

Morality and Ethics and Computers

There are many different sides to the discussion on moral and ethical uses of computers. In many situations, the morality of a particular use of a computer is up to the individual to decide. For this reason, absolute laws about ethical computer usage is almost, but not entirely, impossible to define. The introduction of computers … Read more

Chapter Account Manager

Ankit Fadia, 19 years old, is an independent computer security and digital intelligence consultant with definitive experience in the field of Internet security. He has authored seven internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. His books have sold … Read more

The computer crimes

As much as $40 billion are lost every year due to flourishing computer crimes. In 1993 alone, Internet, the world wide system of computer networks, was swindled out of approximately $2 billion, and about $50 million were stolen from various companies such as GTE Corp. , AT&T, Bell Atlantic and MCI ( Meyer and Underwood … Read more

Computer Hackers

The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non authorised people of the community. Hackers may use any type of system to access this information depending on what they intend on doing in the system. Methods Hackers may use a variety of ways to … Read more

An Evaluation Of Nullsoft Winamp

Nullsoft Winamp is a fast, flexible, high fidelity music player for Windows 95/98/NT. Winamp supports MP3, MP2, CD, MOD, WAV and other audio formats. Winamp also supports custom interfaces called skins, audio visualization and audio effect plug-ins. Nullsoft also provides a high quality website at http://www.winamp.com. The Winamp homepage provides support, information, software downloads, and … Read more

Computer crime and terrorism

Almost every major political candidate in recent history has used, and often exploited, on of the many facets of crime to attempt to convince American voters that they can feel secure and safe with the candidate at the leadership helm, coveted feelings in a tumultuous world. As a result, we have more policemen patrolling the … Read more

Staffing Orgs DELL

Dell’s mission is to be the most successful computer company in the world at delivering the best customer experience in markets we serve. In doing so, Dell will meet customer expectations of: Individual and company accountability Best-in-class service and support Flexible customization capability Dell’s vision of excellence through quality, innovation, pricing, accountability, service and support, … Read more

Computer Crime Essay

The technological revolution has taken full swing . If a business doesn’t have some form of e-commerce, or if a person does not have some form of an e-mail address, they are seen as living in the stone age. This new world of virtual life, where with the click of a button a person can … Read more