Friday, 19 July 2013

COMPUTER -MEMORY

Types of Memory:-
1.) Main-memroy / Semi Conductor /
PrimaryMemory:-
A. RAM (Volatie):- The content of this memory
will erased when we switch off power supply.
In this memory we currently working
a. Static b. Dynamic
B. ROM (Non-volatile): -The content of this
memory will not erased. Even when computer
is switch of.
a. PROM
b. EPROM
c. EEPROM
2.) Secondary Memory:-
a. Hard disk
b. Floppy disk
c. Magnetic disk

ABBREVIATION -TERMS-RELATED- TO- COMPUTER-BASIC

C.P.U:- Central Processing Unit
C.M.O.S:- Complementary Metal Oxide
Semiconductor
P.C.I:- Peripherals Component Interface
B.I.O.S:- Basic Input Output System
Mhz:- Mega Hetz or Ghz:- Giga Hetz
DIMM:- Dual In Memory Modules
D.D.R:- Doble Data Rate
U.S.B:- Universal Data Bus
F.D.D:- Floppy Disk Drive
SATA:- Serial Advance Technology Attachment
H.D.D:- Hard Disk Drive
P.O.S.T:- Power On Self Test
P.G.N:- Pin Grid Array
E.P.P:- Enhanced Parallel Port
E.C.P:- Extended Capabilities’ Port
F.S.B:- Front Side Bus
L.C.D:- Liquid Crystal Display
T.F.T:- Thin Film Transistor
S.C.S.I :- Small Computer System Interface
P.S.U:- Power Supply Unit
R.P.M:- Rotation Per Minutes

COMPUTER RELATED FULL FORMS

* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership
Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
* AAC = Advanced Audio Coding
* GIF = Graphic Interchangeable
Format
* JPEG = Joint Photographic Expert
Group
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (Microsoft
Corporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (SonyEricsson)
* MMF = Synthetic Music Mobile
Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup
Language
* WML = Wireless Markup Language
* CD - Compact Disk.
* DVD - Digital Versatile Disk.
* CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI - Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - Uninterruptible Power Supply.
* URL - Uniform Resource Locator.
* USB - Universal Serial Bus.
* VIRUS - Vital Information Resource
Under Seized.
* 3G - 3rd Generation.
* GSM - Global System for Mobile
Communication.
* CDMA - Code Divison Multiple
Access.
* UMTS - Universal Mobile
Telecommunicati on System.
* SIM - Subscriber Identity Module.
* HSDPA - High Speed Downlink
Packet Access.
* EDGE - Enhanced Data Rate for
GSM [ Global System for Mobile
Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General Packet Radio
Service.
* WAP - Wireless Application Protocol.
* TCP - Transmission Control
Protocol .
* ARPANET - Advanced Research
Project Agency Network.
* IBM - Internation Business Machine
Corporation.
* HP - Hewlett Packard.
* AM/FM - Amplitude/ Frequency
Modulation.
* WLAN - Wireless Local Area Network

So why did they decide to call it Java (Prog. Language)?



James Gosling, Mike Sheridan, and Patrick Naughton initiated the Java language project in June 1991.

The language was initially called Oak after an oak tree that stood outside Gosling's office; it went by the name Green later, and was later renamed Java, from Java coffee, said to be consumed in large quantities by the language's creators.

Cognizant: Keep Challenging

Thursday, 18 July 2013

Top 10 most popular programming languages


1) C language
2) C++
3) Java
4) C#
5) VB.NET(Visual Basic. NET)
6) PHP
7) JavaScript
8 ) Perl
9) Python
10) Ruby

Abbreviation of major IT companies.......!!!


GOOGLE :- Global Organisation Of Oriented Group Language of Earth

APPLE:- Asian Passenger Payload Experiment

HP :- Hewlett-Packard

IBM:- International Business Machines Corporation

HCL:-Hindustan Computer Limited

WIPRO:- Western India Product Limited

GE:-General Electronics

INFOSYS:-Information System

TCS:- Tata Consultancy Services

AOL:- American Online

BPL:- British Process Laboratory

INTEL:- Integrated Electronics

CISCO:- Computer Information System Company
via > geekofreak.com
DELL:- michael DELL

SONY:-Sound Of New York

AMD:- Advance micro devices

LENOVO:- LE(Legend),NOVO(New)

COMPAQ:- Compatibility And Quality

INVENTORS OF COMPUTER HARDWARE:

(1) Key board — Herman Hollerith, first keypunch device in 1930’s

(2) Transistor — John Bardeen, Walter Brattain & Wiliam Shockley (1947 - 1948)

(3) RAM — An Wang and Jay Forrester (1951)

(4) Trackball — Tom Cranston and Fred Longstaff (1952)

(5) Hard Disk — IBM , The IBM Model 350 Disk File (1956 )

(6) Integrated Circuit— Jack Kilby & Robert Noyce (1958)

(7) Computer Mouse — Douglas Engelbart (1964)

(8) Laser printer— Gary Stark weather at XEROX in 1969.

(9) Floppy Disk— Alan Shugart & IBM( 1970)

(10) Microprocessor — Faggin, Hoff & Mazor – Intel 4004

Monday, 15 July 2013

What is PSTN?

Public switched telephone network. Basically the normal phone network, or land line.
PSTN is a ‘hard wired’ connection which on industrial premises is usually routed through the switchboard. Past experience shows that it can be very difficult to get a PSTN connection in the depths of the manufacturing plant. These connections are also unreliable with people unplugging cables and reassigning lines within the switchboard. Remote telemetry units use the telephone line very little compared so when the administrator analyses phone line use sees little or sometimes no activity and assumes it is no longer in use and cancels it.
For these reasons we recommend wireless data acquisition solutions, therefore ensuring the long term reliability of your remote monitoring system.

ISDN (Integrated Services Digital Network)

ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire as well as over other media. Home and business users who install an ISDN adapter (in place of a telephone modem) receive Web pages at up to 128 Kbps compared with the maximum 56 Kbps rate of a modem connection. ISDN requires adapters at both ends of the transmission so your access provider also needs an ISDN adapter. ISDN is generally available from your phone company in most urban areas in the United States and Europe. In many areas where DSL and cable modem service are now offered, ISDN is no longer as popular an option as it was formerly.
There are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users. Both rates include a number of B-channels and a D-channels. Each B-channel carries data, voice, and other services. Each D-channel carries control and signaling information.

Thursday, 4 July 2013

Important abbreviations related to internet

FM –> Frequency Modulation
SIM –> Subscriber Identity Module
RIM –> Removable Identity Module
GSM –> Global System For Mobile
LAN –> Local Area Network
WAN –> Wide Area Network
RTE –> Rich Text Format
MAN –> Metropolitan Area Network
URL –> Uniform Resource Locator
ISP –> Inter Net Service Provide
@ –> At The Rate Of
DVD –> Digital Versatile Disk
CD –> Compact Disk
EDGE –> Enhanced Data for GSM Evolution
GPRS –> General Packet Radio Service
FDM –> Frequency Division Multiplexing
SDR –> Software Defined Radio
ATM –> Asynchronous Transfer Mode
DCA –> Dynamic Channel Allocation
FCA –> Fixed Channel Allocation
AMPS –> Advance Mobile Phone System
IMTS –> Improved Mobile Telephone System
CDMA –> Code Division
MultipleAccess
MTSO –> Mobile Telephone Switching
Office
HTTP –> Hypertext Transfer Protocol
FIDI –> Fiber Distributed Data Interface
ISDN –> Integrated Services Digital
Network
PSTN –> Public Switched Telephone Network
CSMA –> Carrier Sense Multiple Access
RADAR –> Radio Detection AndRanging
SONET –> Synchronous Optical Fiber Network
DAMPS –> Digital Advanced Mobile
Phone System
WWW –> World Wide Web
IP –> Internet Protocol
TCP –> Transmission Control Protocol
HTML –> HyperText Markup Language
USB –> Universal Serial Bus
PAN -> Personal Area Network
TDM -> Time Division Multiplexing.

Wednesday, 3 July 2013

Founder and Headquarters

1) Nokia: 
Founder - Fredrik Indestam and Leo Mechelin 
Headquarters - Finland.

2) Apple: 
Founder - Steve Jobs, Steve Wozniak and Ronald Wayne
Headquarters - California U.S.

3) HTC:
Founder - Cher Wang, HT Chou and Peter Chou
Headquarters - Taiwan.

4) Sony:
Founder - Masaru Ibuka and Akio Morita
Headquarters - Minato, Tokyo, Japan.

5) Micromax:
Founder - Rajesh Agarwal, Sumeet Arora, Rahul Sharma and Vikas Jain
Headquarters - Gurgaon, Haryana, India.

6) LG:
Founder - Koo In-Hwoi
Headquarters - Seoul, South Korea.

7) Samsung:
Founder - Lee Byung-Chull
Headquarters - Korea.

8) Motorola:
Headquaters - Schaumburg, Illinois, United States

9) Google :
The founders are Sergey Brin and Larry Page. Both are alumni of Stanford University. They were friends and Google was started as a Stanford University Project. To know better about them read the book "The Google Story". Its worth reading if you are fascinated by Google and its fascinating growth

10) Facebook :
Founder - Eduardo Saverin, Andrew McCollum, Dustin Moskovitz and Chris Hughes and Mark Elliot Zuckerberg.

Saturday, 29 June 2013

Father of java

Top 7 Ways to Avoid Cyber Attacks

Viruses and identity theft are not new issues, but recently,
individuals and companies are at a much greater risk as a result of the unanticipated increase in internet and technology use.

Follow these tips to protect yourself from such an attack so that you won’t be the next victim.
Anyone who uses the internet needs to be aware of basic computer security:

1. Don't click the link If you don't know who sent the email, or if it's not a trusted website, then don't click the link.
Beware: there is always an increase in email phishing scams around Christmas, whereby scammers have a fake retail store website and capture your credit card details when you buy online.
2. Install Antivirus software Always have up-to-date antivirus protection and get regular updates, Don't press 'do it later' and update six weeks later.
3. Use strong passwords, most of the population is still using '1234567' or their first name and last name, The problem is that there are about 20 different things that require passwords.
Also reset all your online passwords.
* Never click 'remember my password'.
* Use capitals, lower case, numbers and symbols in passwords. Don't use words in the dictionary.
* Change passwords regularly.
* Password software is good at generating strong passwords but the human brain is the best tool of all.
4. Keep software up to date, this will ensure your software has the latest security upgrades.
Attackers are always thinking up new ways to penetrate security. Don't ignore update notifications.
5. Reconfigure wireless routers, buy a router with secure wireless
encryption, otherwise your information is unprotected and can be stolen: for example, when banking or shopping online.
When you get a new modem from a network provider, it may not be secured to encrypt traffic. People should go to the administration panel and configure their wireless network to WPA (Wi-Fi Protected Access) or WPA2 encryption.
Reconfiguring routers is easy and something people don't do properly.
Change the name of the router to something obscure, otherwise it gives attackers information on how best to attack that router.
Also, change the default login to a unique password.
6. Encrypt email:
Learn to use email encryption for sensitive documents. Don't send emails such as a child's health resume using Gmail or Hotmail. "There was [the recent case] where a Gmail employee started going through people's email accounts."
7. Use a secure web browser Firefox or Opera are secure web
browsers.
Eliminating internet and computer
use from your life is impossible,
so be sure to practice safe
computing habits to protect
yourself from cyber attacks.

Friday, 28 June 2013

Why Should We Use Encrypted Emails ?



We all know that the big corporation people can read each and every one of our emails and we can't do nothing about it. There are huge amount of people that filed cases against Gmail, Yahoo, and Hotmail because they have been reading peoples emails. There is no complete privacy while you send a email or receive one. All the big corporation have bots that look for phrases or words that they want to find more information about. They have this things searching the emails all day.

What should I do?

Well I have made a list of email websites that have their emails encrypted or you can have the words encrypted.

1) HushMail --> it’s one of the most popular. You sign up and you get an account you can send encrypted e-mails from. If the recipient hasn’t an HushMail account it will be asked to respond a secret question you decided. If the answer is correct then he/she will be able to read the email.

2) Enigmail --> it's a free extension to the email client Mozilla Thunderbird. In this case you have to install it and select “encrypt this message” in the writing box. Obviously it’s not necessary to sign up for a new account, you use the one you have already.

3) Lockbin --> it's an online service you can send encrypted emails from. Just click "Start Now" to start composing a new message, and then set a password to protect it. The recipient will receive an email from Lockbin in which he/she will find a link that leads to a Lockbin HTTPS page. In this page he/she will have to type in the password to get the email.

4) Encipher.it --> it's the most quick and simple system that protects emails with Advanced Encryption Standard (AES). It’s a bookmarklet and requires the recipient to have it too.

5) Last but not the least: send a .txt or .doc file in a ZIP/RAR password protected archive as an attachment.

25 People Who Changed the Internet Forever

1. Sir Tim Berners-Lee – World Wide Web
2. Vint Cerf And Bob Kahn – TCP/IP
3. Larry Page and Sergey Brin – Google Inc.
4. David Filo and Jerry Yang – Yahoo! Inc.
5. Bill Gates – Microsoft
6. Steven Paul Jobs – Apple Inc.
7. Mark Zuckerberg – Facebook
8. Chad Hurley and Steve Chen – YouTube
9. Linus Torvalds – Linux
10. Jack Dorsey – Twitter
11. Kevin Rose – Digg
12. Bram Cohen – BitTorrent
13. Mike Morhaime – Blizzard
Entertainment
14. Jimmy Wales – Wikipedia
15. Jeff Preston Bezos – Amazon
16. Shawn Fanning – Napster, Rupture
17. Pierre Omidyar – eBay
18. Jack Ma – Alibaba
19. Craig Newmark – Craigslist
20. Matt Mullenweg – WordPress
21. Thomas Anderson – MySpace
22. Garrett Camp – StumbleUpon
23. Jon Postel – Internet Pioneer
24. Caterina Fake – Flickr
25. Marc Andreessen – Netscape

Thursday, 27 June 2013

Hacker VS Programmer

1. A hacker beats the system.
A programmer maintains the system.

2. A hacker is trying to get in.
A programmer is trying to stop things getting in.

3. A hacker does things because he believes in them.
A programmer does what he is supposed to.

4. A hacker changes the way things are.
A programmer tries to keep the status quo.

5. A hacker is agile.
A programmer is a small cog in a big slow machine.

6. A hacker has many points of attack.
A programmer has one job.

7. A hacker has to be fast.
A programmer doesn’t.

8. A hacker is self-reliant.
A programmer relies on others.

9. A hacker finds paths that don’t exist.
A programmer guards the old ones that already do.

10. A hacker is about being interesting.
A programmer is about being perfect.

Types of Hackers

1. Black Hat Hackers

Black Hat Hackers that are also referred to as Crackers are people who enter computer systems and networks without any prior authorization. They may be the individuals who break many different reasons forexample thievery, retaliation, showing-off their skills, causing destruction or perhaps any random motive. Black Hat Hackers can be deemed the new criminals in this electronic age. Several federal laws and regulations are already enacted to curb Black Hat Hacking. The IT Act 2000 which can be then several countries have listed out several ways to cope and penalize Black Hat Hackers. Many network security agencies are formed after several hacking cases being reported. These agencies work for planning security policies and actions to protect companies and folks alikefrom getting hacked. 

2. Grey Hat Hackers

Grey Hat Hackers are hackers thathave designed their own good reasons to hack computers and networks. They're like Robin Hoods of today's age. They can be seen as a mixture of White Hatand Black Hat Hackers. Grey Hat Hackers can perform good for some individuals which enables it to even cause damage based on their approach. One example is, Grey Hat Hackers commonly hack sites they will feel is socially bad like adult and gambling sites.Some from these breed of hackers hack systems and networks, find out the weaknesses and loop holes and report them to the particular organizations or owners. This is done exclusively for getting recognition, showing-off or some of their own motives and dreams.

3. White Hat Hackers

White Hate Hackers are the type who are known as ethical hackers. These are the basic oneswho practices values, ethics, abides because of the laws yet still hack! It seems like strange, but yes, that's the actual way it is! This is one way it happens - an ethical hacker is authorized tohack computers or networks andthat he tries his best to hack it. Now the dilemma arises - why? Adistinct respond to that is that unless we have an knowledge of what is insecure in your system or network, we will never manage to protect it. An ethical hacker supplies with vulnerabilities or loop holes from the system or network through extensive usage of various hacking tactics. These weaknesses and faults are then typically fixed through restorativeand preventive measures.

Friday, 7 June 2013

HOW TO READ BAR CODES…!(everyonemust know)



ALWAYS READ THE LABELS ON THE FOODS YOU BUY–NO MATTER WHAT THE FRONT OF THE BOX OR PACKAGE SAYS, TURN IT OVER AND

READ THE BACK—CAREFULLY!
With all the food and pet products now coming from China, it is best to make sure you read label at the supermarket and especially when buying food products. Many products no longer show where they were made, only give where the distributor is located. The whole world is concerned about China-made “black-hearted goods”. Can you differentiate which one is made in Taiwan or China ? The world is also concerned about GMO (Genetically Modified Organism) foods; steroid fed animals (ex: 45 days old
broiler chicken). It is important to read the bar code to track its origin. How to read Bar Codes….interesting ! If the first 3 digits of the bar code are 690, 691 or 692, theproduct is MADE IN
CHINA. 471is Made in Taiwan . If the first 3 digits of the barcode are 00-09 then it’s made or sourced in USA. This is our right to know, but the government and related departments never educate the public, therefore we have to RESCUE ourselves. Nowadays, Chinese businessmen know that consumers do not prefer products “MADE IN CHINA”, so they don’t show from which country it is
made. However, you may now refer to the barcode – remember if the first 3 digits are:

890……MADE IN INDIA
690, 691, 692 … then it is
MADE IN CHINA
00 – 09 … USA and CANADA
30 – 37 … FRANCE
40 – 44 … GERMANY
471 …….. Taiwan
49 ………. JAPAN
50 ………. UK

Wednesday, 5 June 2013

Create a nameless folder in windows



1. Make a Newfolder on desktop or where ever you want.

2. Right click on this newly created folder and select rename.

3. Erase the text showing "New Folder".

4. Now keep Pressing Alt (i.e alter key) and type 255 . If you are on laptop then you need to enable your Num Lock and type
from the highlighted number keys not from those below function keys.
5. After that leave alt key and Press enter.
6. Done you just created nameless folder.\


Photo: Create a nameless folder in windows

1. Make a Newfolder on desktop or where ever you want.

2. Right click on this newly created folder and select rename.

3. Erase the text showing "New Folder".

4. Now keep Pressing Alt (i.e alter key) and type 255 . If you are on laptop then you need to enable your Num Lock and type
from the highlighted number keys not from those below function keys.
5. After that leave alt key and Press enter.
6. Done you just created nameless folder.

Exercise to Relax body From Computer Stress

Photo: Exercise to Relax body From Computer Stress —

!.......keep sharing.....

Trick to hide files and folders using Command Prompt



Press windowkey+R: Run command dialog box appears.
Now type "cmd" and hit enter. A command prompt window displays.
Now type "attrib +s +h E:\collegephotos" and hit enter.
The folder "collegephotos" will be hidden (Note: It cannot be viewed by any search options)

(To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h')
Photo: Trick to hide files and folders using Command Prompt..

Press windowkey+R: Run command dialog box appears.
Now type "cmd" and hit enter. A command prompt window displays.
Now type "attrib +s +h E:\collegephotos" and hit enter.
The folder "c
ollegephotos" will be hidden (Note: It cannot be viewed by any search options)

(To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h')
Enjoy.... !!

How far do you know?

1 Bit = Binary Digit
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
Alphabyte = 1024 Pijabyte
Kryatbyte = 1024 Alphabyte
Amosbyte = 1024 Kryatbyte
Pectrolbyte = 1024 Amosbyte
Bolgerbyte = 1024 Pectrolbyte
Sambobyte = 1024 Bolgerbyte
Quesabyte = 1024 Sambobyte
Kinsabyte = 1024 Quesabyte
Rutherbyte = 1024 Kinsabyte
Dubnibyte = 1024 Rutherbyte
Seaborgbyte = 1024 Dubnibyte
Bohrbyte = 1024 Seaborgbyte
Hassiubyte = 1024 Bohrbyte
Meitnerbyte = 1024 Hassiubyte
Darmstadbyte = 1024 Meitnerbyte
Roentbyte = 1024 Darmstadbyte
Coperbyte = 1024 Roentbyte

Photo: How far do u know?

1 Bit = Binary Digit
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
Alphabyte = 1024 Pijabyte
Kryatbyte = 1024 Alphabyte
Amosbyte = 1024 Kryatbyte
Pectrolbyte = 1024 Amosbyte
Bolgerbyte = 1024 Pectrolbyte
Sambobyte = 1024 Bolgerbyte
Quesabyte = 1024 Sambobyte
Kinsabyte = 1024 Quesabyte
Rutherbyte = 1024 Kinsabyte
Dubnibyte = 1024 Rutherbyte
Seaborgbyte = 1024 Dubnibyte
Bohrbyte = 1024 Seaborgbyte
Hassiubyte = 1024 Bohrbyte
Meitnerbyte = 1024 Hassiubyte
Darmstadbyte = 1024 Meitnerbyte
Roentbyte = 1024 Darmstadbyte
Coperbyte = 1024 Roentbyte

- Internet Security

History of caps lock

Photo: History of CAPS LOCK !

Top 25 peoples who changed internet forever

1• Sir Tim Berners Lee – World Wide Web
2• Vint Cerf And Bob Kahn –TCP/IP
3• Larry Page and Sergey Brin – Google Inc.
4• David Filo and Jerry Yang – Yahoo! Inc.
5• Bill Gates – Microsoft
6• Steven Paul Jobs – Apple Inc.
7• Mark Zuckerberg – Facebook
8• Chad Hurley and Steve Chen – YouTube
9• Linus Torvalds – Linux
10• Jack Dorsey – Twitter
11• Kevin Rose – Digg
12• Bram Cohen – Bit Torrent
13• Mike Morhaime – Blizzard Entertainment
14• Jimmy Wales – Wikipedia
15• Jeff Preston Bezos – Amazon
16• Shawn Fanning – Napster, Rupture
17• Pierre Omidyar – eBay
18• Jack Ma – Alibaba
19• Craig Newmark – Craigslist
20• Matt Mullenweg – WordPress
21• Thomas Anderson – MySpace
22• Garrett Camp – Stumble Upon
23• Jon Postel – Internet Pioneer
24• Caterina Fake – Flickr
25• Marc Andreessen – Netscape

PC Errors & Solutions

1. MONITOR LED IS BLINKING Check all the connections like Monitor Cable, Data cables,RAM, Display Card , CPU connections.

2. CONTINUOS THREE BEEPS Problem in RAM Connection.

3. THREE BEEPS ( 1 Long 2 Short) Problem in Display Card Connection

4. THREE LONG BEEPS PERIOD WISE Problem in BIOS or RAM (Basic Input Output System)

5. CONTINUOS NON-STOP BEEPING Key Board Problem (I.e.; Some Key is pressed for Longer time)

6. FDD LED IS GLOWING CONTINUOSLY Data cable to be connected properly (twisted cable).

7. NO DISPLAY ON THE SCREEN AT ALL Hard Disk cable connected wrongly. Connect rightly seeing the Red mark (Faces power supply) and then Restart.

8. POWER LED IS OFF a. Check main power cord b. Check S.M.P.S. c. Check Mother Board connection

9. SHOWING CMOS ERROR Replace 3 Volt battery of Mother Board . Set Original Settings Manually.(Refer CMOS Setup chart) Enter your search termsSubmit search form

10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT WORKING PROPERLY Check Power cord of FDD , Data Cables , set CMOS & Finally the Check drive.

11. SHOWING HDD ERROR OR HARD DISK FAILURE a. Check Power Cord b. Check connection of HDD c. Check Data cable d. Check Hard Disk parameters in CMOS or Auto detecting Setting Partitions by Fdisk Command, then format it to set track 0.

12. MOTHER BOARD HANGS DUE TO UNSTABILIZED POWER SUPPLY a. Check S.M.P.S b. RAM not functioning properly. c. Software problem (due to using pirated software) d. CPU fan not functioning properly.

13. DANCING SCREEN a. Check Display card connection b. Virus Problem c. Video Memory Problem

14. SHAKING SCREEN a. Earthing problem b. Magnetic waves comes around.

15. CPU CABINET SHOCK a. Check Earthing b. Check main power cord.

16. NON-SYSTEM DISK ERROR a. Floppy Drive having different disk (Non-Bootable Disk) OR CMOS Parameters for Hard Disk may not be set properly. b. Hard Disk Partitions may not be created. c. Hard Disk may not be formatted.

17. MISSING OPERATING SYSTEM The System files missing namely Ie; command.com} - User File IO.SYS & MS_DOS.SYS } - Hidden Files. These above three files required for Start up of the system that can be transferred by using SYS C: Command OR While the time of formatting by using Format c:/u/s

18. MISSING COMMAND INTERPRETOR May the file Command.com is corrupted OR Infected by Virus OR Some one has Erased it.

19. SHOWING I/O ERROR
a. The type of Hard Disk in CMOS may not be set properly. b. Operating system used for formatting is not valid

20. SHOWING DIVIDE OVER- FLOW MESSAGE a. May some Directories or Files crash with other files. b. Use CHKDSK/F or SCANDISK Command to correct it.

21. HARD DISK MAKING NOISE WHILE PROCESSING a. Unstabilized power supply. b. Check for Loose Contact. c. Do not use Y Connectors for Hard Disk. d. It may create Bad Sector OR Weak Hard Disk.

22. HARD DISK HANGS WHILE PROCESSING Check for Bad Sector by using CHKDSK or SCANDISK Command. If found format the Hard Disk and set Partition before that area.(This is the only procedure to use Hard Disk with Bad Sector) OR (To avoid Bad Sectors use Standard Power Supply)

23. HARD DISK NOT DETECTED a. Check Power Connector b. Check Data Cables c. Check Jumpers

24. PARTITION NOT SHOWN Operating System where the Hard Disk formatted is not supported with present Mother Board. For Eg: Hard Disk formatted with Pentium System will hide their partitions for 486 System.

25. MMX/DLL FILE MISSING May the above files may be corrupted due to power failure or Virus. Make available above files from other Computer. OR Reinstall Windows 98 Operating System. (This procedure will not make any effect on existing Data).

26. WINDOWS REGISTRY ERROR This will happen due to sudden ON/OFF of the system. Final solution is to Reinstall Operating System.

27. DISPLAY COLOUR DOES NOT MATCH a. Configure Display Card properly with their CD. b. The Standard setting for Windows is set it to 800x600 for better performance.

28. UNKNOWN DEVICE FOUND May the Driver utility is not provided with operating system . Insert Driver CD and install software for the above Device. (Every Device requires driver utility to set active


Photo: PC Errors & Solutions

1. MONITOR LED IS BLINKING Check all the connections like Monitor Cable, Data cables,RAM, Display Card , CPU connections.

2. CONTINUOS THREE BEEPS Problem in RAM Connection.

3. THREE BEEPS ( 1 Long 2 Short) Problem in Display Card Connection

4. THREE LONG BEEPS PERIOD WISE Problem in BIOS or RAM (Basic Input Output System)

5. CONTINUOS NON-STOP BEEPING Key Board Problem (I.e.; Some Key is pressed for Longer time)

6. FDD LED IS GLOWING CONTINUOSLY Data cable to be connected properly (twisted cable).

7. NO DISPLAY ON THE SCREEN AT ALL Hard Disk cable connected wrongly. Connect rightly seeing the Red mark (Faces power supply) and then Restart.

8. POWER LED IS OFF a. Check main power cord b. Check S.M.P.S. c. Check Mother Board connection

9. SHOWING CMOS ERROR Replace 3 Volt battery of Mother Board . Set Original Settings Manually.(Refer CMOS Setup chart) Enter your search termsSubmit search form

10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT WORKING PROPERLY Check Power cord of FDD , Data Cables , set CMOS & Finally the Check drive.

11. SHOWING HDD ERROR OR HARD DISK FAILURE a. Check Power Cord b. Check connection of HDD c. Check Data cable d. Check Hard Disk parameters in CMOS or Auto detecting Setting Partitions by Fdisk Command, then format it to set track 0.

12. MOTHER BOARD HANGS DUE TO UNSTABILIZED POWER SUPPLY a. Check S.M.P.S b. RAM not functioning properly. c. Software problem (due to using pirated software) d. CPU fan not functioning properly.

13. DANCING SCREEN a. Check Display card connection b. Virus Problem c. Video Memory Problem

14. SHAKING SCREEN a. Earthing problem b. Magnetic waves comes around.

15. CPU CABINET SHOCK a. Check Earthing b. Check main power cord.

16. NON-SYSTEM DISK ERROR a. Floppy Drive having different disk (Non-Bootable Disk) OR CMOS Parameters for Hard Disk may not be set properly. b. Hard Disk Partitions may not be created. c. Hard Disk may not be formatted.

17. MISSING OPERATING SYSTEM The System files missing namely Ie; command.com} - User File IO.SYS & MS_DOS.SYS } - Hidden Files. These above three files required for Start up of the system that can be transferred by using SYS C: Command OR While the time of formatting by using Format c:/u/s

18. MISSING COMMAND INTERPRETOR May the file Command.com is corrupted OR Infected by Virus OR Some one has Erased it.

19. SHOWING I/O ERROR 
a. The type of Hard Disk in CMOS may not be set properly. b. Operating system used for formatting is not valid

20. SHOWING DIVIDE OVER- FLOW MESSAGE a. May some Directories or Files crash with other files. b. Use CHKDSK/F or SCANDISK Command to correct it.

21. HARD DISK MAKING NOISE WHILE PROCESSING a. Unstabilized power supply. b. Check for Loose Contact. c. Do not use Y Connectors for Hard Disk. d. It may create Bad Sector OR Weak Hard Disk.

22. HARD DISK HANGS WHILE PROCESSING Check for Bad Sector by using CHKDSK or SCANDISK Command. If found format the Hard Disk and set Partition before that area.(This is the only procedure to use Hard Disk with Bad Sector) OR (To avoid Bad Sectors use Standard Power Supply)

23. HARD DISK NOT DETECTED a. Check Power Connector b. Check Data Cables c. Check Jumpers

24. PARTITION NOT SHOWN Operating System where the Hard Disk formatted is not supported with present Mother Board. For Eg: Hard Disk formatted with Pentium System will hide their partitions for 486 System.

25. MMX/DLL FILE MISSING May the above files may be corrupted due to power failure or Virus. Make available above files from other Computer. OR Reinstall Windows 98 Operating System. (This procedure will not make any effect on existing Data).

26. WINDOWS REGISTRY ERROR This will happen due to sudden ON/OFF of the system. Final solution is to Reinstall Operating System.

27. DISPLAY COLOUR DOES NOT MATCH a. Configure Display Card properly with their CD. b. The Standard setting for Windows is set it to 800x600 for better performance.

28. UNKNOWN DEVICE FOUND May the Driver utility is not provided with operating system . Insert Driver CD and install software for the above Device. (Every Device requires driver utility to set active

Most of us come across the internet errors, during browsing

Error 400 - Bad request.
Error 401 - unauthorized
request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not supported/DNS Lookup Fail/unknwn host
Error 500-599 - Server Errors.

Collection Of Shortcut Keys For Windows 8 !!!



1) Windows key : Access the Start screen
2) Windows+D : Access the Desktop.
3) Windows+C : Show the Charms.
4) Windows+Q (or just start typing when you are on the Start menu) : Search
5) Windows+H : Share
6) Windows+K : Start Windows Devices
7) Windows+I : Settings
Tip: When you’re ready to shut down your computer, use Windows+I and then click or tap the Power button, found on the bottom right.
Windows+Z : Show the App Bar while in any app.
9) Windows+Tab or Alt+Tab : Cycle through open apps.
10) Zoom in and out : Ctrl+- to zoom out and Ctrl++ to zoom in
11) Windows+period : Snap an app to one side of the screen : .
Tip: You’ll find that many of the traditional shortcuts you’ve always used still exist, such as Windows+L to lock and Windows+P to project to another display.
12) Start Screen : Windows Key
13) Right Shift key : If you press it for eight seconds, it turns on Filter Keys. If you press it five times in a row, it turns on Sticky Keys.
14) Ctrl+mouse wheel : When used on the desktop, it changes the size of your desktop icons. When used on the Start screen, it zooms in and out.
15) Ctrl+A : Select all.
16) Win+C : Open the charms.
17) Ctrl+C : Copy.
18) Win+D : Show the desktop.
19) Alt +D : Select the address bar in Internet Explorer.
20) Ctrl+Alt +D : Enable the Docked mode in the Magnifier tool.
21) Win+E : Open File Explorer.
22) Ctrl+E : Select the search box in File Explorer.
23) Win+F : Show Files in the Search charm.
24) Win+Ctrl+F : Open the Find Computers window, which can find computers on a network (used mostly in business networks).
25) Win+G : Cycle through desktop gadgets.
26) Win+H : Open the Share charm.
27) Win+I : Open the Settings charm.
28) Ctrl+Alt +I : Invert colors in the Magnifier tool.
29) Win+J : Switch the focus between snapped apps and larger apps.
30) Win+K : Open the Devices charm.
31) Win+L : Lock the computer and display the Lock screen.
32) Ctrl+Alt +L : Enable Lens mode in the Magnifier tool.
33) Win+M : Minimize all the windows on the desktop.
34) Ctrl+N : Open a new File Explorer window.
35) Ctrl+Shift +N : Create a new folder in File Explorer.
36) Win+O : Change the Lock screen orientation.
37) Win+P : Open the project options for a second screen.
38) Win+Q : Open the Search charm.
39) Win+R : Open the Run window.
40) Ctrl+R : Refresh.
41) Win+T : Set the focus on the taskbar and cycle through the running desktop apps.
42) Win+U : Launch the Ease of Access Center.
43) Win+V : Cycle through notifications.
44) Win+Shift +V : Cycle through notifications in backward order.
45) Ctrl+V : Paste.
46) Win+W : Open Settings in the search charm.
47) Ctrl+W : Close the current window. It works only in desktop apps.
48) Win+X : Open the hidden system menu.
49) Ctrl+X : Cut.
50) Ctrl+Y : Redo.

Photo: Collection Of Shortcut Keys For Windows 8 !!!

1) Windows key : Access the Start screen
2) Windows+D : Access the Desktop.
3) Windows+C : Show the Charms.
4) Windows+Q (or just start typing when you are on the Start menu) : Search
5) Windows+H : Share
6) Windows+K : Start Windows Devices
7) Windows+I : Settings
Tip: When you’re ready to shut down your computer, use Windows+I and then click or tap the Power button, found on the bottom right.
Windows+Z : Show the App Bar while in any app.
9) Windows+Tab or Alt+Tab : Cycle through open apps.
10) Zoom in and out : Ctrl+- to zoom out and Ctrl++ to zoom in
11) Windows+period : Snap an app to one side of the screen : .
Tip: You’ll find that many of the traditional shortcuts you’ve always used still exist, such as Windows+L to lock and Windows+P to project to another display.
12) Start Screen : Windows Key
13) Right Shift key : If you press it for eight seconds, it turns on Filter Keys. If you press it five times in a row, it turns on Sticky Keys.
14) Ctrl+mouse wheel : When used on the desktop, it changes the size of your desktop icons. When used on the Start screen, it zooms in and out.
15) Ctrl+A : Select all.
16) Win+C : Open the charms.
17) Ctrl+C : Copy.
18) Win+D : Show the desktop.
19) Alt +D : Select the address bar in Internet Explorer.
20) Ctrl+Alt +D : Enable the Docked mode in the Magnifier tool.
21) Win+E : Open File Explorer.
22) Ctrl+E : Select the search box in File Explorer.
23) Win+F : Show Files in the Search charm.
24) Win+Ctrl+F : Open the Find Computers window, which can find computers on a network (used mostly in business networks).
25) Win+G : Cycle through desktop gadgets.
26) Win+H : Open the Share charm.
27) Win+I : Open the Settings charm.
28) Ctrl+Alt +I : Invert colors in the Magnifier tool.
29) Win+J : Switch the focus between snapped apps and larger apps.
30) Win+K : Open the Devices charm.
31) Win+L : Lock the computer and display the Lock screen.
32) Ctrl+Alt +L : Enable Lens mode in the Magnifier tool.
33) Win+M : Minimize all the windows on the desktop.
34) Ctrl+N : Open a new File Explorer window.
35) Ctrl+Shift +N : Create a new folder in File Explorer.
36) Win+O : Change the Lock screen orientation.
37) Win+P : Open the project options for a second screen.
38) Win+Q : Open the Search charm.
39) Win+R : Open the Run window.
40) Ctrl+R : Refresh.
41) Win+T : Set the focus on the taskbar and cycle through the running desktop apps.
42) Win+U : Launch the Ease of Access Center.
43) Win+V : Cycle through notifications.
44) Win+Shift +V : Cycle through notifications in backward order.
45) Ctrl+V : Paste.
46) Win+W : Open Settings in the search charm.
47) Ctrl+W : Close the current window. It works only in desktop apps.
48) Win+X : Open the hidden system menu.
49) Ctrl+X : Cut.
50) Ctrl+Y : Redo.

ANDROID VERSION HISTORY

ANDROID 4.2 -------------------->JELLY BEAN MR1
ANDROID 4.1, 4.1.1 ------------>JELLY BEAN
ANDROID 4.0.3, 4.0.4----------->ICE CREAM SANDWICH MR1
ANDROID 4.0, 4.0.1, 4.0.2------>ICE CREAM SANDWICH
ANDROID 3.2--------------------->HONEYC ¬OMB MR2
ANDROID 3.1x-------------------->HONEYC ¬OMB MR1
ANDROID 3.0x-------------------->HONEYC ¬OMB
ANDROID 2.3.4, 2.3.3------------>GINGERBREAD MR1
ANDROID 2.3.2, 2.3.1, 2.3------->GINGE ¬RBREAD
ANDROID 2.2x--------------------->FROYO
ANDROID 2.1x-------------------->ECLAIR ¬ MR1
ANDROID 2.0.1------------------->ECLAIR ¬_0_1
ANDROID 2.0--------------------->ECLAIR
ANDROID 1.6--------------------->DONUT
ANDROID 1.5--------------------->CUPCAK ¬E
ANDROID 1.1--------------------->BASE1_ ¬1(PETIT FOUR)
ANDROID 1.0--------------------->BASE

Languages Used....

1. Google – Java (Web), –C (indexing).
2. Facebook – PHP.
3. YouTube- Flash, Python, Java.
4. Yahoo– PHP and Java.
5. MicrosoftLive.com–.NET
6. Baidu – Unknown
7. Wikipedia – PHP
8. Blogger – Java
9. MSN – .NET
10.Twitter – Ruby on Rails, Scala, Java.

Why internet is slow?



At some point in time, everyone experiences a slow or dragging Internet connection. It can be extremely frustrating when browsing the information superhighway at a slow stagger. Rest assured, there are actions that you can take to prevent your Internet connection from slowing down. These elements are standard maintenance and should be performed regularly for the best results. So, I have tried to list down the points which could help you speed up your internet connection .

1. Check Your Connection: It may sound simple, but most Internet slow downs are caused by an incorrect connection to your network or Internet Service Provider. The poor souls who are stuck using dial-up Internet can try to use a different access number that has fewer people trying to connect. Most of the time, using a different access number will speed you up especially during peak Internet traffic hours. If you are using a broadband connection, be sure which network you are using. Many times, your computer will latch on to any available network in your area. You can be connected to the network of your neighbor and not even know it. You could be receiving low signal strength that can really slow down your connection.

2. Secure Your Network: Internet users who make the jump from dial-up to broadband are in such a hurry that they do not think to secure their network router from outside access. Anyone can access an unsecured network if their computer is in range of it by using Wi-Fi. This network sharing method steals your available bandwidth without you ever knowing it. Your router could be giving away free IP addresses to anyone that makes requests. In your router configuration settings, disable network sharing and secure your network with a password or passphrase. This way, anyone who attempts to connect to your network must enter your secret password. If they do not know the password, they cannot steal your connection. This will greatly improve your Internet speed.

3. Clear Your DNS Cache: Each time that your computer makes a request to visit a website, it secretly traces the IP address from the host name. This IP trace may be requested by thousands of users at the same time. Therefore, your local computer creates its own log file for IP address information known as DNS cache. This may not sound like a big deal, but you can easily visit hundreds of websites in a short time. This log data is used by your computer when trying to access a website. Instead of relying on third party DNS servers, your computer searches its own log file. This log file can hold large amounts of data or even become corrupted. Clearing this file often will speed up your Internet connection and keep the log file from becoming a problem.

4. Delete Temporary Files: Your computer stores every byte of information from each website that you visit. This information is stored in temporary data files on your computer for faster access to the websites in the future. The theory is that this method makes pages load faster since the information has already been stored on your computer. While this is true, it can also slow down your Internet connection if you do not delete the files you do not need. Regularly deleting unused temporary files will speed up your Internet connection and save valued storage space on your hard drive.

5. Turn Off Virus Protection [Potentially Harmful]: Modern virus scanning software constantly operates in the background. Most do a fantastic job of scanning files and folders for possible attacks. However, it also is using your bandwidth to send and receive data updates from the software company web server. By simply disabling your virus software while browsing the Internet, your bandwidth will increase and your Internet connection will be faster. When you need a virus protection scan in the future, enable the program for scanning.

Learning how your Internet connection can be misused is the first step to making it faster. Adhering to these tips will keep your Internet connection safe and fast.

World Environment Day

World Environment Day ('WED') is celebrated every year on 5 June to raise global awareness of the need to take positive environmental action. It is run by the United Nations Environment Programme (UNEP).
It was the day that United Nations Conference on the Human Environment began. The United Nations Conference on the Human Environment was from 5–16 June 1972. It was established by the United Nations General Assembly in 1972.[1] The first World Environment Day was in 1973. World Environment Day is hosted every year by a different city with a different theme and is commemorated with an international exposition in the week of 5 June. World Environment Day is in spring in the Northern Hemisphere and fall in the Southern Hemisphere.
"Stockholm was without a doubt the landmark event in the growth of international environmentalism", writes John McCormick in the book Reclaiming Paradise. "It was the first occasion on which the political, social and economic problems of the global environment were discussed at an intergovernmental forum with a view to actually taking corrective action."
World Environment Day is similar to Earth Day

How to disable right click menu in blog and website

How To Disable Right Click On Your Website Or Blog ?

If you own a blog or a website then you always want to prevent other malicious bloggers from copying the content from your blog. You might have written an article with great efforts and lots of research and other just copy/paste it on their blog. To prevent such users from copying content from your blog i will show you Javascript Trick to disable right click on your blog.

1. Got to your blogger Dashboard and then Click on Layout.

2. Now Click on Add Gadget and select Html/Javascript.

3. Now paste code given below in the pop up window.

<!--MBW Code-->
<script language='JavaScript1.2'>
function disableselect(e){
return false
}
function reEnable(){
return true
}
document.onselectstart=new Function ("return false")
if (window.sidebar){
document.onmousedown=disableselect
document.onclick=reEnable
}
</script>

4. Save it and done. Now users will not be able to right click on your website.

Photo: How To Disable Right Click On Your Website Or Blog ?

If you own a blog or a website then you always want to prevent other malicious bloggers from copying the content from your blog. You might have written an article with great efforts and lots of research and other just copy/paste it on their blog. To prevent such users from copying content from your blog i will show you Javascript Trick to disable right click on your blog.

1. Got to your blogger Dashboard and then Click on Layout.

2. Now Click on Add Gadget and select Html/Javascript.

 3. Now paste code given below in the pop up window.

<!--MBW Code-->
<script language='JavaScript1.2'>
function disableselect(e){
return false
}
function reEnable(){
return true
}
document.onselectstart=new Function ("return false")
if (window.sidebar){
document.onmousedown=disableselect
document.onclick=reEnable
}
</script>

4. Save it and done. Now users will not be able to right click on your website.