Saturday, June 29, 2013

About windows explorer

when you have a computer then you obviously use your computer. when you turn on your computer after it says. "Loading your personal information" then you go to your desktop and everything are loaded means "Start Menu, Desktop Items, Folders...etc.." yes this is all the functionality of the windows explorer if you end the "explorer" process from the task manager then you won't be able to see your start menu even you can't open your folders yes opening folders and start menu these are the important functions of windows explorer. when a folder sticks then windows says that the "Windows explorer is not responding" so that means all the files and folders are opened in Windows Explorer. I hope you got what Windows explorer does.

Monday, June 24, 2013

Computer Glossary

  • Applet
    A small Java application that is downloaded by an ActiveX or Java-enabled web browser. Once it has been downloaded, the applet will run on the user's computer. Common applets include financial calculators and web drawing programs.
  • Application
    Computer software that performs a task or set of tasks, such as word processing or drawing. Applications are also referred to as programs.
  • ASCII
    American Standard Code for Information Interchange, an encoding system for converting keyboard characters and instructions into the binary number code that the computer understands.
  • Bandwidth
    The capacity of a networked connection. Bandwidth determines how much data can be sent along the networked wires. Bandwidth is particularly important for Internet connections, since greater bandwidth also means faster downloads.
  • Binary code
    The most basic language a computer understands, it is composed of a series of 0s and 1s. The computer interprets the code to form numbers, letters, punctuation marks, and symbols.
  • Bit
    The smallest piece of computer information, either the number 0 or 1. In short ther are called binary digits.
  • Boot
    To start up a computer. Cold boot.restarting computer after having turned off the power. Warm boot.restarting computer without having turned off the power.
  • Browser
    Software used to navigate the Internet. Netscape Navigator and Microsoft Internet Explorer are today's most popular browsers for accessing the World Wide Web.
  • Bug
    A malfunction due to an error in the program or a defect in the equipment.
  • Byte
    Most computers use combinations of eight bits, called bytes, to represent one character of data or instructions. For example, the word .cat. has three characters, and it would be represented by three bytes.
  • Cache
    A small data-memory storage area that a computer can use to instantly re-access data instead of re-reading the data from the original source, such as a hard drive. Browsers use a cache to store web pages so that the user may view them again without reconnecting to the Web.
  • CAD-CAM
    Computer Aided Drawing-Computer Aided Manufacturing. The instructions stored in a computer that will be translated to very precise operating instructions to a robot, such as for assembling cars or laser-cutting signage.
  • CD-ROM
    Compact Disc Read-Only Memory. An optically read disc designed to hold information such as music, reference materials, or computer software. A single CD-ROM can hold around 640 megabytes of data, enough for several encyclopedias. Most software programs are now delivered on CD-ROMs.
  • CGI
    Common Gateway Interface. A programming standard that allows visitors to fill out form fields on a Web page and have that information interact with a database, possibly coming back to the user as another Web page. CGI may also refer to Computer-Generated Imaging, the process in which sophisticated computer programs create still and animated graphics, such as special effects for movies.
  • Chat
    Typing text into a message box on a screen to engage in dialog with one or more people via the Internet or other network.
  • Chip
    A tiny wafer of silicon containing miniature electric circuits that can store millions of bits of information.
  • Client
    A single user of a network application that is operated from a server. A client/server architecture allows many people to use the same data simultaneously. The program's main component (the data) resides on a centralized server, with smaller components (user interface) on each client.
  • Cookie
    A text file sent by a Web server that is stored on the hard drive of a computer and relays back to the Web server things about the user, his or her computer, and/or his or her computer activities.
  • CPU
    Central Processing Unit. The brain of the computer.
  • Cracker
    A person who .breaks in. to a computer through a network, without authorization and with mischievous or destructive intent.
  • Crash
    A hardware or software problem that causes information to be lost or the computer to malfunction. Sometimes a crash can cause permanent damage to a computer.
  • Cursor
    A moving position-indicator displayed on a computer monitor that shows a computer operator where the next action or operation will take place.
  • Cyberspace
    Slang for internet ie. An international conglomeration of interconnected computer networks. Begun in the late 1960s, it was developed in the 1970s to allow government and university researchers to share information. The Internet is not controlled by any single group or organization. Its original focus was research and communications, but it continues to expand, offering a wide array of resources for business and home users.
    • Database
      A collection of similar information stored in a file, such as a database of addresses. This information may be created and stored in a database management system (DBMS).
    • Debug
      Slang. To find and correct equipment defects or program malfunctions.
    • Default
      The pre-defined configuration of a system or an application. In most programs, the defaults can be changed to reflect personal preferences.
    • Desktop
      The main directory of the user interface. Desktops usually contain icons that represent links to the hard drive, a network (if there is one), and a trash or recycling can for files to be deleted. It can also display icons of frequently used applications, as requested by the user.
    • Desktop publishing
      The production of publication-quality documents using a personal computer in combination with text, graphics, and page layout programs.
    • Directory
      A repository where all files are kept on computer.
    • Disk
      Two distinct types. The names refer to the media inside the container:

      A hard disc stores vast amounts of data. It is usually inside the computer but can be a separate peripheral on the outside. Hard discs are made up of several rigid coated metal discs. Currently, hard discs can store 15 to 30 Gb (gigabytes)

      A floppy disc, 3.5" square, usually inserted into the computer and can store about 1.4 megabytes of data. The 3.5" square .floppies. have a very thin, flexible disc inside. There is also an intermediate-sized floppy disc, trademarked Zip discs, which can store 250 megabytes of data.

    • Disk drive
      The equipment that operates a hard or floppy disc.
    • Domain
      Represents an IP (Internet Protocol) address or set of IP addresses that comprise a domain. The domain name appears in URLs to identify web pages or in email addresses. For example, the email address for the First Lady is first.lady@whitehouse.gov, .whitehouse.gov. being the domain name. Each domain name ends with a suffix that indicates what .top level domain. it belongs to. These are: ..com. for commercial, ..gov. for government, ..org. for organization, ..edu. for educational institution, ..biz. for business, ..info. for information, ..tv. for television, ..ws. for website. Domain suffixes may also indicate the country in which the domain is registered. No two parties can ever hold the same domain name.
    • Domain name
      The name of a network or computer linked to the Internet. Domains are defined by a common IP address or set of similar IP (Internet Protocol) addresses.
    • Download
      The process of transferring information from a web site (or other remote location on a network) to the computer. It is possible to .download a file. or .view a download.
    • DOS
      Disk Operating System. An operating system designed for early IBM-compatible PCs.
    • Drop-down menu
      A menu window that opens vertically on-screen to display context-related options. Also called pop-up menu or pull-down menu.
    • DSL
      Digital Subscriber Line. A method of connecting to the Internet via a phone line. A DSL connection uses copper telephone lines but is able to relay data at much higher speeds than modems and does not interfere with telephone use.
    • DVD
      Digital Video Disc.Similar to a CD-ROM, it stores and plays both audio and video.
    • E-book
      An electronic (usually hand-held) reading device that allows a person to view digitally stored reading materials.
    • Email
      Electronic mail; messages, including memos or letters, sent electronically between networked computers that may be across the office or around the world.
    • Emoticon
      A text-based expression of emotion created from ASCII characters that mimics a facial expression when viewed with your head tilted to the left. Here are some examples:
      :-) Smiling
      :-( Frowning
      ;-) Winking
      :_( Crying
    • Encryption
      The process of transmitting scrambled data so that only authorized recipients can unscramble it. For instance, encryption is used to scramble credit card information when purchases are made over the Internet.
    • Ethernet
      A type of network.
    • Ethernet card
      A board inside a computer to which a network cable can be attached.
    • File
      A set of data that is stored in the computer.
    • Firewall
      A set of security programs that protect a computer from outside interference or access via the Internet.
    • Folder
      A structure for containing electronic files. In some operating systems, it is called a .directory.
    • Fonts
      Sets of typefaces (or characters) that come in different styles and sizes.
    • Freeware
      Software created by people who are willing to give it away for the satisfaction of sharing or knowing they helped to simplify other people's lives. It may be freestanding software, or it may add functionality to existing software.
    • FTP
      File Transfer Protocol. A format and set of rules for transferring files from a host to a remote computer.
    • Gigabyte (GB)
      1024 megabytes. Also called gig.
    • Glitch
      The cause of an unexpected malfunction.
    • Gopher
      An Internet search tool that allows users to access textual information through a series of menus, or if using FTP, through downloads.
    • GUI
      Graphical User Interface. A system that simplifies selecting computer commands by enabling the user to point to symbols or illustrations (called icons) on the computer screen with a mouse.
    • Groupware
      Software that allows networked individuals to form groups and collaborate on documents, programs, or databases.
    • Hacker
      A person with technical expertise who experiments with computer systems to determine how to develop additional features. Hackers are occasionally requested by system administrators to try and .break into. systems via a network to test security. The term hacker is sometimes incorrectly used interchangeably with cracker. A hacker is called a .white hat. and a cracker a .black hat.
    • Hard copy
      A paper printout of what you have prepared on the computer.
    • Hard drive
      Another name for the hard disc that stores information information in a computer.
    • Hardware
      The physical and mechanical components of a computer system, such as the electronic circuitry, chips, monitor, disks, disk drives, keyboard, modem, and printer.
    • Home page
      The main page of a Web site used to greet visitors, provide information about the site, or to direct the viewer to other pages on the site.
    • HTML
      Hypertext Markup Language. A standard of text markup conventions used for documents on the World Wide Web. Browsers interpret the codes to give the text structure and formatting (such as bold, blue, or italic).
    • HTTP
      Hypertext Transfer Protocol. A common system used to request and send HTML documents on the World Wide Web. It is the first portion of all URL addresses on the World Wide Web
    • HTTPS
      Hypertext Transfer Protocol Secure. Often used in intracompany internet sites. Passwords are required to gain access.
    • Hyperlink
      Text or an image that is connected by hypertext coding to a different location. By selecting the text or image with a mouse, the computer .jumps to. (or displays) the linked text.
    • Hypermedia
      Integrates audio, graphics, and/or video through links embedded in the main program.
    • Hypertext
      A system for organizing text through links, as opposed to a menu-driven hierarchy such as Gopher. Most Web pages include hypertext links to other pages at that site, or to other sites on the World Wide Web.
    • Icons
      Symbols or illustrations appearing on the computer screen that indicate program files or other computer functions.
    • Input
      Data that goes into a computer device.
    • Input device
      A device, such as a keyboard, stylus and tablet, mouse, puck, or microphone, that allows input of information (letters, numbers, sound, video) to a computer.
    • Instant messenging (IM)
      A chat application that allows two or more people to communicate over the Internet via real-time keyed-in messages.
    • Interface
      The interconnections that allow a device, a program, or a person to interact. Hardware interfaces are the cables that connect the device to its power source and to other devices. Software interfaces allow the program to communicate with other programs (such as the operating system), and user interfaces allow the user to communicate with the program (e.g., via mouse, menu commands, icons, voice commands, etc.).
    • Internet
      An international conglomeration of interconnected computer networks. Begun in the late 1960s, it was developed in the 1970s to allow government and university researchers to share information. The Internet is not controlled by any single group or organization. Its original focus was research and communications, but it continues to expand, offering a wide array of resources for business and home users.
    • IP (Internet Protocol) address
      An Internet Protocol address is a unique set of numbers used to locate another computer on a network. The format of an IP address is a 32-bit string of four numbers separated by periods. Each number can be from 0 to 255 (i.e., 1.154.10.266). Within a closed network IP addresses may be assigned at random, however, IP addresses of web servers must be registered to avoid duplicates.
    • Java
      An object-oriented programming language designed specifically for programs (particularly multimedia) to be used over the Internet. Java allows programmers to create small programs or applications (applets) to enhance Web sites.
    • Javascript/ECMA script
      A programming language used almost exclusively to manipulate content on a web page. Common Javascript functions include validating forms on a web page, creating dynamic page navigation menus, and image rollovers.
    • kilobyte (K or KB)
      Equal to 1,024 bytes.


      • Linux
        A UNIX.-like, open-source operating system developed primarily by Linus Torvalds. Linux is free and runs on many platforms, including both PCs and Macintoshes. Linux is an open-source operating system, meaning that the source code of the operating system is freely available to the public. Programmers may redistribute and modify the code, as long as they don't collect royalties on their work or deny access to their code. Since development is not restricted to a single corporation more programmers can debug and improve the source code faster.
      • Laptop and notebook
        Small, lightweight, portable battery-powered computers that can fit onto your lap. They each have a thin, flat, liquid crystal display screen.
      • Macro
        A script that operates a series of commands to perform a function. It is set up to automate repetitive tasks.
      • Mac OS
        An operating system with a graphical user interface, developed by Apple. for Macintosh. computers. Current System .X.1. (10) combines the traditional Mac interface with a strong underlying UNIX. operating system for increased performance and stability.
      • Megabyte (MB)
        Equal to 1,048,576 bytes, usually rounded off to one million bytes (also called a .meg.).
      • Memory
        Temporary storage for information, including applications and documents. The information must be stored to a permanent device, such as a hard disc or CD-ROM before the power is turned off, or the information will be lost. Computer memory is measured in terms of the amount of information it can store, commonly in megabytes or gigabytes.
      • Menu
        A context-related list of options that users can choose from.
      • Menu bar
        The horizontal strip across the top of an application's window. Each word on the strip has a context sensitive drop-down menu containing features and actions that are available for the application in use.
      • Merge
        To combine two or more files into a single file.
      • MHz
        An abbreviation for Megahertz, or one million hertz. One MHz represents one million clock cycles per second and is the measure of a computer microprocessor's speed. For example, a microprocessor that runs at 300 MHz executes 300 million cycles per second. Each instruction a computer receives takes a fixed number of clock cycles to carry out, therefore the more cycles a computer can execute per second, the faster its programs run. Megahertz is also a unit of measure for bandwidth.
      • Microprocessor
        A complete central processing unit (CPU) contained on a single silicon chip.
      • Minimize
        A term used in a GUI operating system that uses windows. It refers to reducing a window to an icon, or a label at the bottom of the screen, allowing another window to be viewed.
      • Modem
        A device that connects two computers together over a telephone or cable line by converting the computer's data into an audio signal. Modem is a contraction for the process it performs: modulate-demodulate.
      • Monitor
        A video display terminal.
      • Mouse
        A small hand-held device, similar to a trackball, used to control the position of the cursor on the video display; movements of the mouse on a desktop correspond to movements of the cursor on the screen.
      • MP3
        Compact audio and video file format. The small size of the files makes them easy to download and e-mail. Format used in portable playback devices.
      • Multimedia
        Software programs that combine text and graphics with sound, video, and animation. A multimedia PC contains the hardware to support these capabilities.
      • MS-DOS
        An early operating system developed by Microsoft Corporation (Microsoft Disc Operating System).
      • Network
        A system of interconnected computers.
      • Open source
        Computer programs whose original source code was revealed to the general public so that it could be developed openly. Software licensed as open source can be freely changed or adapted to new uses, meaning that the source code of the operating system is freely available to the public. Programmers may redistribute and modify the code, as long as they don't collect royalties on their work or deny access to their code. Since development is not restricted to a single corporation more programmers can debug and improve the source code faster.
      • Operating system
        A set of instructions that tell a computer on how to operate when it is turned on. It sets up a filing system to store files and tells the computer how to display information on a video display. Most PC operating systems are DOS (disc operated system) systems, meaning the instructions are stored on a disc (as opposed to being originally stored in the microprocessors of the computer). Other well-known operating systems include UNIX, Linux, Macintosh, and Windows.
      • Output
        Data that come out of a computer device. For example, information displayed on the monitor, sound from the speakers, and information printed to paper.
        • Palm
          A hand-held computer.
        • PC
          Personal computer. Generally refers to computers running Windows with a Pentium processor.
        • PC board
          Printed Circuit board. A board printed or etched with a circuit and processors. Power supplies, information storage devices, or changers are attached.
        • PDA
          Personal Digital Assistant. A hand-held computer that can store daily appointments, phone numbers, addresses, and other important information. Most PDAs link to a desktop or laptop computer to download or upload information.
        • PDF
          Portable Document Format. A format presented by Adobe Acrobat that allows documents to be shared over a variety of operating systems. Documents can contain words and pictures and be formatted to have electronic links to other parts of the document or to places on the web.
        • Pentium chip
          Intel's fifth generation of sophisticated high-speed microprocessors. Pentium means .the fifth element..
        • Peripheral
          Any external device attached to a computer to enhance operation. Examples include external hard drive, scanner, printer, speakers, keyboard, mouse, trackball, stylus and tablet, and joystick.
        • Personal computer (PC)
          A single-user computer containing a central processing unit (CPU) and one or more memory circuits.
        • Petabyte
          A measure of memory or storage capacity and is approximately a thousand terabytes.
        • Petaflop
          A theoretical measure of a computer's speed and can be expressed as a thousand-trillion floating-point operations per second.
        • Platform
          The operating system, such as UNIX., Macintosh., Windows., on which a computer is based.
        • Plug and play
          Computer hardware or peripherals that come set up with necessary software so that when attached to a computer, they are .recognized. by the computer and are ready to use.
        • Pop-up menu
          A menu window that opens vertically or horizontally on-screen to display context-related options. Also called drop-down menu or pull-down menu.
        • Power PC
          A competitor of the Pentium chip. It is a new generation of powerful sophisticated microprocessors produced from an Apple-IBM-Motorola alliance.
        • Printer
          A mechanical device for printing a computer's output on paper. There are three major types of printers: Dot matrix: creates individual letters, made up of a series of tiny ink dots, by punching a ribbon with the ends of tiny wires. (This type of printer is most often used in industrial settings, such as direct mail for labeling.)
          Ink jet: sprays tiny droplets of ink particles onto paper.
          Laser: uses a beam of light to reproduce the image of each page using a magnetic charge that attracts dry toner that is transferred to paper and sealed with heat.
        • Program
          A precise series of instructions written in a computer language that tells the computer what to do and how to do it. Programs are also called .software. or .applications.
        • Programming language
          A series of instructions written by a programmer according to a given set of rules or conventions (.syntax.). High-level programming languages are independent of the device on which the application (or program) will eventually run; low-level languages are specific to each program or platform. Programming language instructions are converted into programs in language specific to a particular machine or operating system (.machine language.) so that the computer can interpret and carry out the instructions. Some common programming languages are BASIC, C, C++, dBASE, FORTRAN, and Perl.
        • Puck
          An input device, like a mouse. It has a magnifying glass with crosshairs on the front of it that allows the operator to position it precisely when tracing a drawing for use with CAD-CAM software.
        • Pull-down menu
          A menu window that opens vertically on-screen to display context-related options. Also called drop-down menu or pop-up menu.
        • Push technology
          Internet tool that delivers specific information directly to a user's desktop, eliminating the need to surf for it. PointCast, which delivers news in user-defined categories, is a popular example of this technology.
        • QuickTime.
          Audio-visual software that allows movie-delivery via the Internet and e-mail. QuickTime mages are viewed on a monitor.
        • RAID
          Redundant Array of Inexpensive Disks. A method of spreading information across several disks set up to act as a unit, using two different techniques:
          Disk striping: storing a bit of information across several discs (instead of storing it all on one disc and hoping that the disc doesn't crash).
          Disk mirroring: simultaneously storing a copy of information on another disc so that the information can be recovered if the main disc crashes.
        • RAM
          Random Access Memory. One of two basic types of memory. Portions of programs are stored in RAM when the program is launched so that the program will run faster. Though a PC has a fixed amount of RAM, only portions of it will be accessed by the computer at any given time. Also called memory.
        • Right-click
          Using the right mouse button to open context-sensitive drop-down menus.
        • ROM
          Read-Only Memory. One of two basic types of memory. ROM contains only permanent information put there by the manufacturer. Information in ROM cannot be altered, nor can the memory be dynamically allocated by the computer or its operator.
        • Scanner
          An electronic device that uses light-sensing equipment to scan paper images such as text, photos, and illustrations and translate the images into signals that the computer can then store, modify, or distribute.
        • Search engine
          Software that makes it possible to look for and retrieve material on the Internet, particularly the Web. Some popular search engines are Alta Vista, Google, HotBot, Yahoo!, Web Crawler, and Lycos.
        • Server
          A computer that shares its resources and information with other computers, called clients, on a network.
        • Shareware
          Software created by people who are willing to sell it at low cost or no cost for the gratification of sharing. It may be freestanding software, or it may add functionality to existing software.
        • Software
          Computer programs; also called .applications.
        • Spider
          A process search engines use to investigate new pages on a web site and collect the information that needs to be put in their indices.
        • Spreadsheet
          Software that allows one to calculate numbers in a format that is similar to pages in a conventional ledger.
        • Storage
          Devices used to store massive amounts of information so that it can be readily retrieved. Devices include RAIDs, CD-ROMs, DVDs
        • Streaming
          Taking packets of information (sound or visual) from the Internet and storing it in temporary files to allow it to play in continuous flow.
        • Stylus and tablet
          A input device similar to a mouse. The stylus is pen shaped. It is used to .draw. on a tablet (like drawing on paper) and the tablet transfers the information to the computer. The tablet responds to pressure.the firmer the pressure used to draw, the thicker the line appears.
        • Surfing
          Exploring the Internet.
        • Surge protector
          A controller to protect the computer and make up for variances in voltage.
          • Telnet
            A way to communicate with a remote computer over a network.
          • Trackball
            Input device that controls the position of the cursor on the screen; the unit is mounted near the keyboard, and movement is controlled by moving a ball.
          • Terabytes (TB)
            A thousand gigabytes.
          • Teraflop
            A measure of a computer's speed. It can be expressed as a trillion floating-point operations per second.
          • Trojan Horse
            See virus.
          • UNIX.
            A very powerful operating system used as the basis of many high-end computer applications.
          • Upload
            The process of transferring information from a computer to a web site (or other remote location on a network). v. To transfer information from a computer to a web site (or other remote location on a network).
          • URL
            Uniform Resource Locator.
            1. The protocol for identifying a document on the Web.
            2. A Web address (e.g., www.tutorialspoint.com). A URL is unique to each user. See also domain.
          • UPS
            Universal Power Supply or Uninterruptible Power Supply. An electrical power supply that includes a battery to provide enough power to a computer during an outage to back-up data and properly shut down.
          • USB
            A multiple-socket USB connecter that allows several USB-compatible devices to be connected to a computer.
          • USENET
            A large unmoderated and unedited bulletin board on the Internet that offers thousands of forums, called newsgroups. These range from newsgroups exchanging information on scientific advances to celebrity fan clubs.
          • User friendly
            A program or device whose use is intuitive to people with a nontechnical background.
          • Video teleconferencing
            A remote "face-to-face chat," when two or more people using a webcam and an Internet telephone connection chat online. The webcam enables both live voice and video.
          • Virtual reality (VR)
            A technology that allows one to experience and interact with images in a simulated three-dimensional environment. For example, you could design a room in a house on your computer and actually feel that you are walking around in it even though it was never built. (The Holodeck in the science-fiction TV series Star Trek: Voyager would be the ultimate virtual reality.) Current technology requires the user to wear a special helmet, viewing goggles, gloves, and other equipment that transmits and receives information from the computer.
          • Virus
            An unauthorized piece of computer code attached to a computer program or portions of a computer system that secretly copies itself from one computer to another by shared discs and over telephone and cable lines. It can destroy information stored on the computer, and in extreme cases, can destroy operability. Computers can be protected from viruses if the operator utilizes good virus prevention software and keeps the virus definitions up to date. Most viruses are not programmed to spread themselves. They have to be sent to another computer by e-mail, sharing, or applications. The worm is an exception, because it is programmed to replicate itself by sending copies to other computers listed in the e-mail address book in the computer. There are many kinds of viruses, for example:
            Boot viruses place some of their code in the start-up disk sector to automatically execute when booting. Therefore, when an infected machine boots, the virus loads and runs.
            File viruses attached to program files (files with the extension ..exe.). When you run the infected program, the virus code executes.
            Macro viruses copy their macros to templates and/or other application document files.
            Trojan Horse is a malicious, security-breaking program that is disguised as something benign such as a screen saver or game.
            Worm launches an application that destroys information on your hard drive. It also sends a copy of the virus to everyone in the computer's e-mail address book.
          • WAV
            A sound format (pronounced .wave.) used to reproduce sounds on a computer.
          • Webcam
            A video camera/computer setup that takes live images and sends them to a Web browser.
          • Window
            A portion of a computer display used in a graphical interface that enables users to select commands by pointing to illustrations or symbols with a mouse. "Windows" is also the name Microsoft adopted for its popular operating system.
          • World Wide Web ("WWW" or "the Web")
            A network of servers on the Internet that use hypertext-linked databases and files. It was developed in 1989 by Tim Berners-Lee, a British computer scientist, and is now the primary platform of the Internet. The feature that distinguishes the Web from other Internet applications is its ability to display graphics in addition to text.
          • Word processor
            A computer system or program for setting, editing, revising, correcting, storing, and printing text.
          • Worm
            See virus.
          • WYSIWYG
            What You See Is What You Get. When using most word processors, page layout programs (See desktop publishing), and web page design programs, words and images will be displayed on the monitor as they will look on the printed page or web page.

Sunday, June 23, 2013

Internet Protocols & OSI Model

Internet Protocols

A network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.
Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into messages sent and received. Some protocols also support message acknowledgement and data compression designed for reliable and/or high-performance network communication. Hundreds of different computer network protocols have been developed each designed for specific purposes and environments.

Internet Protocols

The Internet Protocol family contains a set of related (and among the most widely used network protocols. Besides Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. These higher level protocols interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.

Routing Protocols

Routing protocols are special-purpose protocols designed specifically for use by network routers on the Internet. Common routing protocols include EIGRP, OSPF and BGP.

How Network Protocols Are Implemented

Modern operating systems like Microsoft Windows contain built-in services or daemons that implement support for some network protocols. Applications like Web browsers contain software libraries that support the high level protocols necessary for that application to function. For some lower level TCP/IP and routing protocols, support is implemented in directly hardware (silicon chipsets) for improved performance.

The Layers

Think of the seven layers as the assembly line in the computer. At each layer, certain things happen to the data that prepare it for the next layer. The seven layers, which separate into two sets, are:

Application Set

  • Layer 7: Application - This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities.
  • Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand.
  • Layer 5: Session - Layer 5 establishes, maintains and ends communication with the receiving device.

Transport Set

  • Layer 4: Transport - This layer maintains flow control of data and provides for error checking and recovery of data between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one application and integrates each application's data into a single stream for the physical network.
  • Layer 3: Network - The way that the data will be sent to the recipient device is determined in this layer. Logical protocols, routing and addressing are handled here.
  • Layer 2: Data - In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and the packet sequencing is defined.
  • Layer 1: Physical - This is the level of the actual hardware. It defines the physical characteristics of the network such as connections, voltage levels and timing.
The OSI Reference Model is really just a guideline. Actual protocol stacks often combine one or more of the OSI layers into a single layer.

Network Topology

Network Topology

A network topology describes the arrangement of systems on a computer network

. It defines how the computers, or nodes, within the network are arranged and connected to each other. Some common network topologies include star, ring, line, bus, and tree configurations. These topologies are defined below:
  1. Star - One central note is connected to each of the other nodes on a network. Similar to a hub connected to the spokes in a wheel.
  2. Ring - Each node is connected to exactly two other nodes, forming a ring. Can be visualized as a circular configuration. Requires at least three nodes.
  3. Line - Nodes are arranged in a line, where most nodes are connected to two other nodes. However, the first and last node are not connected like they are in a ring.
  4. Bus - Each node is connected to a central bus that runs along the entire network. All information transmitted across the bus can be received by any system in the network.
  5. Tree - One "root" node connects to other nodes, which in turn connect to other nodes, forming a tree structure. Information from the root node may have to pass through other nodes to reach the end nodes.
It is helpful for a network administrator to know the pros and cons of different network topologies when putting together a network. By weighing the benefits of each type, the administrator can choose the configuration that is most efficient for the network's intended purpose.

HISTORY & GENERATIONS OF COMPUTER

HISTORY & GENERATIONS

 COMPUTER GENERATIONS
The development of computers has followed difference steps in the technology used and these steps of technological differences are called as generations.
FIRST GENERATION (1945-1960):
The first generation of computer were those computers which use Vacuum Tubes or Valves technology. Almost all the early computer like ENIAC, EDVAC, EDSAC etc. were made a reality only by the invention of vacuum tube, which is a fragile glass device that can control and amplify electronic signals. In this computer they are using 18,000
vacuum tubes, 70,000 resisters, 10,000 capacitors and 60,000 switches. It took 150 kilo watt electric power and it produce large amount of heat. They were bulky and required large space. They had small primitive memories and no auxiliary storage.
SECOND GENERATION (1960-1965):
With the development of transistors and their use in circuits, magnetic core for memory storage, the vacuum tubes of first generation are replaced by transistors to arrive at second generation of computers. The size of transistors is much smaller when compared to vacuum tubes. They consumed less power generated less heat and are faster and reliable. William B Shickley, John Burdeen and Walter H Brattain are the scientists develop the transistors. They are working bell telephone, U.S.A. They got noble prize. The major advantage use of transistors was that the size of computer has come down as well as the power consumption. Even the cost of transistors is less in comparison with the cost of vacuum tubes, the cost of computer reduced drastically, they were more reliable then first generation computers. Fortran, cobol, snowbal, algol etc. like high level languages are developed in this generation. In this generation they are using magnetic tapes for storing.
THIRD GENERATION (1965-1975):
With the development of silicon chips. The third generation of computers came into existence. These computers used compact integrated circuits (IC's) of silicon chips in place of transistors. Each of these IC's consisted of large number of chips in very small packages. With these IC's coming into picture the size of computers, cost, heat generation and power consumption decreased to a great extent, speed and reliability increased as compared to previous generations. These machines used IC's with LSI (Large Scale Integration).
FOURTH GENERATION (FROM 1975):
The computers belonging to these generation used Integrated Circuits with VLSI (Very Large Scale Integration). These computers have high processing powers, low maintenance, high reliability and very low power consumption. These computer reduces the cost as well as the size of the computer.
FIFTH GENERATION:
These computers use optic fiber technology to handle Artificial Intelligence, expert systems, robotics etc. These computers have very high processing speeds and are more reliable.
POST BY : https://www.facebook.com/dashrat.giri

Tuesday, June 18, 2013

Random Access Memory (RAM)

The primary storage is referred to as random access memory (RAM) because it is possible to randomly select and use any location of the memory directly for storing and retrieving data. It takes same time to reach any address of the memory whether it is in the beginning or in the last. It is also called read/write memory. The storage of data and instructions inside the primary storage is temporary. It disappears from RAM as soon as the power to the computer is switched off. The memory, which loose its contents on failure of power supply, are known as volatile memories. So now we can say that RAM is volatile memory.