Wednesday, 30 October 2013

Dubai GITEX T 2013 set for strongest international year yet


Dubai GITEX T 2013 set for strongest international year yet

india

International exhibitors up 26 percent compared to 2012 with 80 percent of the world’s leading ICT brands present
  
        
DUBAI, UAE: The 33rd edition of GITEX Technology Week is on course to become one of the most internationally diverse and influential yet, with key players from across the globe increasingly drawn to the show's ability to shed light on the latest trends and generate strong business leads.
International exhibitors are up 26 percent compared to last year, and a total of 61 countries are present, including new countries like Belarus, Brazil, Finland, Kenya, Lithuania, Serbia, Slovenia, Tunisia and Ukraine.
This year's Official Country Partner is Serbia, and the union has already markedly boosted ICT trade links with the UAE. Delegations of senior officials were also present from countries including Bahrain, Egypt, India, Jordan, Morocco, Nigeria, Saudi Arabia, Tatarstan, Tunisia and United Kingdom.

Tuesday, 16 April 2013

Adidas Shoe With Computer Technology




Adidas, the athletic shoe and apparel giant, has married with computer technology with its latest running shoe, The shoes uses a 20-megahertz microprocessor implanted in the sole which collects readings and from the shoe’s movements and adjusts the fit of the shoe accordingly.








Tuesday, 19 March 2013

UK games industry returns to growth


UK games industry returns to growth

After three years of decline, the UK games development sector grew by 4 per cent in 2012 according to a new survey published by TIGA, the trade association representing the games industry.

Annual investment by studios also rose from £411 million to £427 million between 2011 and 2012. The research is based on an extensive survey of UK games businesses, analysis by Games Investor Consulting, and published by TIGA in the forthcoming report Making Games in the UK Today. A Census of the UK Developer and Digital Publishing Sector (March 2013).

Friday, 15 March 2013

SAMSUNG GALAXY S4


SAMSUNG KEEPS MUM ON EXACT RELEASE DATE AND PRICES
 
 
 













 
 
 
 
 
 
 
 
 
 
 
 Samsung Electronics Co premiered its latest flagship phone, the Galaxy S4,which sports a bigger display and unconventional features such as gesture controls, as the South Korean titan challengers Apple Inc on its home turf.

The phone, the first in the highly successful Galaxy S -series to make its global standalone debut on U.S. The S4 can stop and start videos depending on whether someone is looking on the screen, flip between songs and photos at the wave of a hand, and record sound to run alongside snapped still pictures

 

Wednesday, 13 March 2013

We are in fact the victims, says China



China on Tuesday strongly hit out a report issued by a U.S. cyber security firm linking a People’s Liberation Army (PLA) unit to a spate of hacking attacks, describing the claims as “groundless”.

Foreign Ministry spokesperson Hong Lei questioned security firm Mandiant’s findings, saying he did not know “how such evidence could be discovered, as cyber attacks are often carried out internationally and are typically done so anonymously”.

“China has been a major victim of cyber attacks and opposes all forms of such activity,” said Mr. Hong, adding that “groundless criticism is irresponsible and unprofessional, and it will not help to solve the problem”.

China army behind cyber attacks


U.S. firm says organisations across the globe, including in India, targeted

A shadowy Chinese military unit has been named as the source of cyber-attacks on hundreds of organisations around the world, after a Virginia-based security company traced the “Advanced Persistent Threat” to a nondescript building in Shanghai.

The cyber-security company, Mandiant, said in a report that the source — which it labelled APT1 — was “believed to be the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department, which is most commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398”.

While the nature of Unit 61398’s work was considered by China to be a state secret, Mandiant said it believed the unit engaged in harmful network operations from its site on Datong Road in Gaoqiaozhen, Pudong New Area of Shanghai.

APT1 had apparently “systematically stolen hundreds of terabytes of data from at least 141 organizations, and... demonstrated the capability and intent to steal from dozens of organizations simultaneously”, said Mandiant. The company mapped the wide-range of victims of Unit 61398’s alleged cyber-attacks, including three organisations in India. Countries that faced attacks included Canada, France, the United Kingdom, Norway, Belgium, Luxembourg, Israel, Switzerland, South Africa, Singapore, Taiwan and Japan.

WELL ORGANISED

While U.S. companies may be slow to gear up for the cyber-security challenge, the Mandiant report left little doubt that the alleged hackers were well-organised. Mandiant explained that Unit 61398’s central building was a 12-storey, 130,663-square-foot facility staffed by hundreds, perhaps thousands, and supplied by China Telecom with special fibre-optic communications infrastructure.

GOVERNMENT ROLE

On the role of the Chinese government, Mandiant added that in a January 2010 report it had said: “The Chinese government may authorise this activity, but there’s no way to determine the extent of its involvement.” However, three years later the security firm said it had obtained evidence to change its assessment and “The details we have analysed during hundreds of investigations convince us that the groups conducting these activities are based primarily in China and that the Chinese Government is aware of them.”


Sunday, 10 March 2013

Windows 8 Keyboard Shortcuts

Windows 8 Keyboard Shortcuts


The new Windows 8 operating system has the usual keyboard shortcuts, just like all the previous versions of Windows did but with extras. The difference is, Windows 8 has such a new interface, that it might be easier to use keyboard shortcuts.

Windows Key: Switch between the Start Screen and the desktop.

Windows Key + D: While on the Windows desktop this key combination will clear all the open windows and show the Desktop, a second press of the combination will reopen all the windows previously hidden. If this combination is pressed while on the Windows 8 Start Screen the Windows desktop is displayed.

Windows Key + F :   Brings up the files search menu

Windows Key + W : Brings up the settings search menu.

Windows Key + Q : Brings up the application search menu.

Windows Key + L :  Locks the machine.

Windows Key + a Number : Launches a program from the Taskbar. Windows Key + 1 runs the leftmost program and Windows Key + 0 runs the tenth from the left. If the app is already open, this shortcut will switch to it.

Windows Key + T : Cycles through items in the taskbar, from left to right. Pressing the return key will then launch the selected application.

Windows Key + Arrow Key : Perform Aero Snap. The up Arrow maximizes the window. Left Arrow snaps the application to the left half of the screen, The Right Arrow snaps the application it to the right side of the screen, and the Down Arrow minimizes it.

Windows Key + C : Launch the Charms Bar on the right side of the screen.

Windows Key + X : Launch the Power User Menu, providing many of the functions lost with the missing Start Menu, such as access to the Control Panel, System, Device Manager and Command Prompt.

Windows Key + Pause / Break : Open the System window

Windows Key + E : Launch Windows explorer.

Windows Key + P : Cycle through the second screen projection mode.

Windows Key + I : To avoid the Charms bar then choosing Settings it’s possible to go directly to Settings. This will reveal the Power button, too.

Windows Key + H : Used in applications to email or share its content with someone on a social network. The application must support this.

Windows Key + R : Opens Run menu where you can launch programs by typing in their executable file names.

Windows Key + . (period key): Docks the current Windows 8-style application to the right or left, depending on how many times you hit it.

Windows Key + Z: Doing this combination on the Start Screen will bring up app menu, which shows contextual options for the active app.

Windows Key + PrtScn (Print Screen) : Takes a screenshot and saves it to the pictures folders as a PNG files.

Windows Key + O : Locks the screen orientation.

Windows Key + Page Up / Page Down : Doing this combination on the Start Screen will cycle through which display the Start Screen is shown on.

Windows Key + Tab : Brings up the Task Switcher and toggles between Windows 8-style apps, note in Windows 8 this no longer switches between desktop applications.

Alt + Tab : Brings up the Task Switcher and toggles between all applications (Desktop or Windows 8-style).

Alt + Shift + Arrow Key : Doing this combination on the Start Screen will move the position of an applications shortcut.

Alt + F4 : Shut down the current application.


 

Thursday, 7 March 2013

CELLPHONE SALES INCREASED IN THE 2012



Cellphone sales up 16% in 2012






Aided by increasing adoption of smartphones in the country, the mobile phone market in India has touched about 218 million units in 2012,a growth of 16 percent over  Jan. – Dec. 2012 .

HP LAUNCHED ELITEPAD



Hewlett Packard Launched ElitePad Tablet.







Hewlett Packard has made a foray into the tablet segment with the launch of ElitePad, a business tablet that is aimed at the enterprise segment.

 The company(HP), though a late entrant into the segment, introduced the tablet with an eye on tapping on mobility applications where consumers want the quick responses from the devices, according to the HP regional head. 10.1 inch tablet, priced Rs.around 43000 and above.

 

Monday, 4 March 2013

New Virus Hacks Your Bank Account


New Virus Hacks Your Bank Account

Checking your bank account balance regularly online has been a pretty good way to guard against fraud—until now. An Israeli security firm has identified a new virus that not only steals the info fraudsters need to drain your bank account, it ensures you don't see those transactions when you visit your bank's site, reports MSNBC, likening it to a bank robber switching out the video on the building's security cameras.
Dubbed "SpyEye Trojan," the sophisticated virus first spies on your login information, and tricks you into divulging your credit card number. Once the hacker has that info, the virus keeps track of every fraudulent purchase he makes with it. The next time you check your account, it'll make sure those items don't show up onscreen, and change your balance to account for them. Checking from an ATM or uninfected computer will give up the game, but by then it may be too late. The security firm says the virus has already affected real customers—and they expect its use to spread.

MICROSOFT OFFICE 365

Microsoft launches latest version of office

Software giant Microsoft on Monday, launched the latest version of its "Office365" solution for businesses in India,which will enable them to access emails and other productivity tools from a variety of devices.
The new MS OFFICE 365is a comprehensive suite with Word,Excel,PowerPoint,Access,Outlook and One Note. It provides seamless sharing of data across multiple devices like desktops,Laptops,Mobiles and Tablet PCs.
Office 365 Home Premium

Office Home and Student 2013

Office Home and Business 2013

Office Professional 2013

Saturday, 2 March 2013

Nasa fixing computer glitch on Mars Curiosity rover

WASHINGTON (AFP) - Nasa's Mars rover Curiosity has been temporarily put into "safe mode," as scientists monitoring from Earth try to fix a computer glitch, the US space agency said.
Scientists switched to a backup computer on Thursday so that they could troubleshoot the problem, said to be linked to a glitch in the original computer's flash memory.
"We switched computers to get to a standard state from which to begin restoring routine operations," said Richard Cook of Nasa's Jet Propulsion Laboratory, the project manager for the Mars Science Laboratory Project, which built and operates Curiosity.

Nasa's Mars rover Curiosity is pictured in this Feb 3, 2013 handout self-portrait obtained by Reuters on Feb 9, 2013. Nasa's Mars rover Curiosity has been temporarily put into "safe mode," as scientists monitoring from Earth try to fix a computer glitch, the US space agency said. -- FILE PHOTO: REUTERS

Best Engineering Colleges for Computer Science Engineering in India


 
COLLEGE
CITY/STATE
1
Indian Institute of Technology (IIT)
Delhi(DL)
2
Indian Institute of Technology (IIT)
Kanpur (UP)
3
Indian Institute of Technology (IIT)
Mumbai (MH)
4
Indian Institute of Technology (IIT)
Kharagpur (WB)
5
Indian Institute of Technology (IIT)
Chennai (TN)
6
International Institute of Information Technology (IIIT)
Hyderabad (AP)
7
Institute of Technology - BanarasHindu University (IT-BHU)
Varanasi (UP)
8
Indian Institute of Technology (IIT)
Guwahati (AS)
9
Birla Institute of Technology & Science (BITS)
Pilani (RJ)
10
Bengal Engineering and Science University (BESU)
Shibpur (WB)
11
College of Engineering (COE)
Pune (MH)
12
Delhi Technological University (DTU)
Delhi (DL)
13
National Institute of Technology (NIT)
Warangal (AP)
14
National Institute of Technology (NIT)
Surathkal (KA)
15
Veermata Jijabai Technological Institute (VJTI)
Mumbai (MH)
16
Birla Institute of Technology (BIT)
Mesra (JKA)
17
Maulana Azad National Institute of Technology (MANIT)
Bhopal (MP)
18
ICFAIUniversity
Dehradun (UK)
19
PSGCollege of Technology
Coimbatore(TN)
20 ABV - Indian Institute of Information Technology & Management
Gwalior (MP)
 

Best 10 World University for computer science and information technology

 
Institution
Country
 
 
 

 
1 Massachusetts Institute of Technology (MIT)  
United States
 
     
2 Stanford University
United States
 
     
3 University of Cambridge United Kingdom  
 
    
4 University of California, Berkeley (UCB)
United States
 
      
5 Harvard University
United States
 
      
6 University of Oxford United Kingdom  
 
    
7 California Institute of Technology (Caltech)
United States
 
     
8 University of California, Los Angeles (UCLA)
 United States
 
      
9 Carnegie Mellon University (CMU)
United States
 
     
10   University of Toronto
Canada
    

Friday, 1 March 2013

India launches AKASH "world's cheapest" tablet computer



India launched what it dubbed the world's cheapest tablet computer Wednesday, to be sold to students at the subsidized price of $35 and later in shops for about $60.

Most of India's 1.2 billion people are poor and products such as Apple Inc's iPad are beyond the reach even of many in the fast-growing middle class.

"The rich have access to the digital world, the poor and ordinary have been excluded. Aakash will end that digital divide," Telecoms and Education Minister Kapil Sibal said.

The government is buying the first units of the lightweight touch-screen device, called Aakash, or "sky" in Hindi, for $50 each from a British company which is assembling the web-enabled devices in India.

A pilot run of 100,000 units will be given to students for free, with the first 500 handed out at the launch to a mixed response. It supports video conferencing, has two USB ports and a three-hour battery life but some users said it was slow.

India has a reputation for creating affordable products that are easy to use and sturdy enough to handle its rugged environment -- from Tata Motors' $2,000 Nano car to generic versions of pharmaceuticals.

Two years in development, the paperback book-sized Aakash may help the government's goal of incorporating information technology in education, although critics were doubtful of its mass appeal.

Despite being a leader in software and IT services, India trails fellow BRIC nations Brazil, Russia and China in the drive to get the masses connected to the Internet and mobile phones, a report by risk analysis firm Maplecroft said this year.

Thursday, 28 February 2013

India's first web browser


Epic is India's first-ever web browser and the only browser in the world with anti-virus protection built-in. Epic supports 12 Indian Languages.
Users can choose from 1500+ Indian themes including browser-based wallpapers. The India content sidebar includes everything from news headlines to regional news to live tv to live cricket commentary.

Epic is the first browser to include a suite of productivity applications including a free word processor, video sidebar (picture-in-picture functionality), communication apps like Facebook and Twitter, My Computer file browser, and 1500+ free, user-installable sidebar apps in the Epic Apps Store.



Wednesday, 27 February 2013

Personalize your music today

Personalize your music today

With fast technology improvements and advances today’s mobile phone is more like an PC, with many functions that you could do on you computer just a few years ago. Because of all this you need to buy many expensive applications that can customize their devices. All this mean that you need allot of money to bring out the full potential of your mobile phone. There are many different software that can help you customize you phone and one of those is ToneThis Ringtone Maker which can help you to easily add ringtones, games, video clips, wallpapers and other media.

With ToneThis you can ToneThis Ringtone Maker:
- Personalize your music
- Download free mobile games
- Send music, images, and even flash videos from the web to your phone
- Share media with friends and family

New version of Comrade ERP (POS Version) has Launched.


New version of Comrade ERP (POS Version) has Launched.

Comrade Accounting Software, Dubai
The Point of Sale software












The back office software is Our ERP Version with the facility to Receive data (day close procedure) from Outlets Data throuth intiernet by very fast and simple procedure.
See the screen shots.
Comrade POS is one of the leading POS available in the middle East.

For Trade Enquiries please contact
Qamar Dubai Computers
Telephone +971 4 266 81 82
Fax +971 4 266 91 92
email : comradeuae@gmail.com, samkurakar@gmail.com

Restaurant Management Software by Comrade Team

Restaurant Management Software by Comrade Team

COMRADE ERP SOFTWARE FOR PROPERTY MANAGEMENT


COMRADE ERP SOFTWARE FOR PROPERTY MANAGEMENT

Comrade Accounting Software, Dubai Comrade ERP Software is a very useful software for Real Estate companies. Building, Flat, Tenant masters can accept unlimited images. Dash board Control for Job control. Job Costing and Post dated cheque control. Job costing reports also available by flatwise and building wise. M/s Khalifa Lootah Group of Companies recenty installed the Comrade ERP system for their property management.
.

The best PC games of 2013


The best PC games of 2013



Watch Dogs



Publisher: Ubisoft
Release: Late 2013
Though in recent years, Ubisoft has been happy to milk the Assassin’s Creed licence until its ruddy teats squeaked, let us not forget that the space-wizards-thru-history mega-franchise was born of huge creative risk: a new IP that cost so much develop that, rumour has it, sales didn’t cover the cost of development until its sequels were on shelves. Now, the same gigantic studio, Ubisoft Montreal, has unveiled Watch Dogs – a game with no smaller a scope than Assassin’s Creed, combining the complex sedition of information warfare with brutish third-person action and, it is suspected, with some sort of clever multiplayer/singleplayer crossover. It’s not only a showcase for the kind of polygon-crunching power the cutting edge PC can generate (finally loosed from the shackles of last-gen cross platform releases) but it also establishes a fiction that Ubisoft hopes will see it through the next decade.

Dead Space 3


Publisher: EA
Release: February 8
The sudden appearance of a co-op mode in this venerable space-horror franchise may sound like the marketing department got a little trigger happy with the back-of-box checklist, but there are reasons to be optimistic. Firstly, didn’t we all the say the same gloomy things about Mass Effect 3’s excellent multiplayer? Secondly, Dead Space already showed it could deliver terror to a twosome in its (actually terrific, sadly undersold) Wii light-gun game. What’s more, the game’s roots have hardly been forgotten: it’s still perfectly possible to play the game on your tod. This one promises to add themes of insanity and perception to the traditional jump-scares and body-horror.

Tomb Raider


Publisher: Square Enix
Release: March 5
Vulnerability and survival are the watchwords for this reinvention of the Tomb Raider series, which finds a young and unworldly Lara Croft shipwrecked on an island – a far cry from the back flipping  dual-wielding daredevil treasure-seeker who murdered her way through polygonal archaeological hoards during the mid-nineties. Crystal Dynamics are certainly brave in taking this iconic character in such a dark, mature direction – but will the cost to our heroine’s empowerment prove too great a price to pay?


Star Wars 1313


Publisher: LucasArts
Release: Late 2013
Link
“Dark and mature” may not be the go-to description for Star Wars, particularly since LucasArts’ acquisition by the House of Mouse, but such is the promise for this third person actioner. Set in the bowels of Coruscant, the subterranean Level 1313, you take on the role of a bounty hunter embroiled in a murky criminal conspiracy. Early glimpses suggest the game will ignore light sabers and force powers in favour of gadgetry and guns, and the claims are for a more grounded and gritty fiction, instead of the fruity pan-galactic melodrama to which we are accustomed.

Strike Suit Zero



Publisher: Born Ready Games
Release: January 24
Space combat has proven popular on Kickstarter but the interplanetary dogfighting of Strike Suit Zero wasn’t born from the crowdfunding process. Instead, this rather beautiful off-world blaster had been a while in development already and will be using the $175k it raised to, uh, kickfinish the project, and then kickpolish it, too.


Fortnite

Publisher: Epic Games
Release: TBC 2013
Perhaps keen to prove that there’s more to Unreal Engine 4 than high-definition beefcakes gunning down space goblins in the destroyed beauty of a future city, Epic Games’ first proof of their new technology will be the cartoonish tower defence game, Fortnite. The clean, chirpy visuals belie technological innovation, however: UE4 will allow players huge freedom in the way they construct their anti-zombie fortifications, editing each wall with a 3×3 grid. The plan is that the game will have a long-tail, with many post-release updates, eventually allowing players to construct Rube Goldberg-style machines of death.


Starforge

Publisher: CodeHatch
Release: TBC 2013
Minecraft with guns, realistic graphics, and both ground and low-orbit construction. Interested? Starforge is a ridiculously ambitious crowd-funded indie project that’s already come a remarkably long way. You deform terrain and build a fortress to protect yourself from aliens, and when all else fails, use a shotgun to blast them into pieces. If the small team can make those weapons feel nice to fire, it’ll be a winner.
Grand Theft Auto 5

Publisher: Rockstar
Release: Spring 2013
There’s been no confirmation of Rockstar’s next blockbuster for PC, but it would be a world gone topsy-turvy if Grand Theft Auto 5 was marooned on consoles for ever. This isn’t Red Dead Redemption, a game developed by a studio with around three PC credits to its name – this is GTA, a series whose every main instalment has appeared on PC. And it’s developed by Rockstar North, a team that (even including its legacy as DMA Design) has brought all bar seven of its games to PC. And where are the internet petitions to port Walker over from the Amiga, I might ask?

Guaranteed to be one of the biggest releases of 2013, GTA 5 sees the player take on the role of three different characters trying to make a crust amid the tinseltown glamour and sunbaked squalor of Los Santos. And it’s likely to be an ill-gotten crust at that, given the series’ heritage of exuberant criminality: heists, hits and high-speed chases are all to be expected, interspersed with all the leisure activities a high-rolling hoodlum might desire.
Remember Me

Publisher: Capcom
Release: May
“We’ll always have Paris,” as the saying goes – not so much in the Neo-Paris of 2084, when memories can be erased or altered by Memory Hunters. You play as one such mnemonic saboteur, called Nilin, herself rendered amnesiac by agents of the oppressive Parisien regime. Thirdperson acrobatics and assassinations ensue as you try to piece together the conspiracy, and featuring the world’s mostcomplicated sounding combat system. You also get to wreck men’s minds by jumping into their memory and replaying events to reconfigure their recollection. Convince someone they killed their girlfriend during an argument, for instance, and you may just drive them to suicide. How lovely.

Monday, 25 February 2013

List of Some New Computer Virus

List of Some New Computer Virus

OPRAH WINFREY VIRUS

AT&T VIRUS

MCI VIRUS

PAUL REVERE VIRUS

POLITICALLY CORRECT VIRUS


RIGHT TO LIFE VIRUS

ROSS PEROT VIRUS

MARIO CUOMO VIRUS

TED TURNER VIRUS

ARNOLD SCHWARZENEGGER VIRUS

GOVERNMENT ECONOMIST VIRUS

NEW WORLD ORDER VIRUS

FEDERAL BUREAUCRAT VIRUS

GALLUP VIRUS

TERRY RANDALL VIRUS

TEXAS VIRUS

ADAM AND EVE VIRUS

CONGRESSIONAL VIRUS

AIRLINE VIRUS

FREUDIAN VIRUS

PBS VIRUS

ELVIS VIRUS

OLLIE NORTH VIRUS
NIKE VIRUS: Just does it.

SEARS VIRUS

JIMMY HOFFA VIRUS

CONGRESSIONAL VIRUS #2

KEVORKIAN VIRUS
IMELDA MARCOS VIRUS

STAR TREK VIRUS

HEALTH CARE VIRUS

GEORGE BUSH VIRUS

CLEVELAND INDIANS VIRUS

LAPD VIRUS

CHICAGO CUBS VIRUS

ORAL ROBERTS VIRUS




Sunday, 24 February 2013

FULL FORM OF COMPUTER


COMPUTER : COMMON OPERATING MACHINE PARTICULARLY USED FOR TRADE, EDUCATION, AND RESEARCH

PC : PERSONAL COMPUTER

CPU : CENTRAL PROCESSING UNIT

OS : OPERATING SYSTEM

UPS : UNINTERRUPTIBLE POWER SUPPLY

RAM : RANDOM-ACCESS MEMORY

ROM : READ-ONLY MEMORY

LCD : LIQUID CRYSTAL DISPLAY

LED : LIGHT-EMITTING DIODE

NTFS : NEW TECHNOLOGY FILE SYSTEM

FAT : FILE ALLOCATION TABLE

DOC : DOCUMENT

TXT = TEXT

MS : MICROSOFT

SD : SECURE DIGITAL

MMC : MULTIMEDIA CARD

CD : COMPACT DISC

DVD : DIGITAL VERSATILE DISC

BRD – BD : BLU-RAY DISC

ISO : INTERNATIONAL ORGANIZATION FOR STANDARDIZATION

DB : DATABASE

IC : INTEGRATED CIRCUIT

SYS : SYSTEM

CONFIG : CONFIGURATION

CTRL : CONTROL

ALT : ALTERNATE

ESC : ESCAPE

DEL : DELETE

NUM LOCK : NUMBER LOCK

FN : FUNCTION

PrtScn = Prt Scr = Print Scrn = Prt Scn = Prt Sc = Prt Scrn = Prnt Scrn : PRINT SCREEN

SysRq : SYSTEM REQUEST

ScrLk : SCROLL LOCK

PgUp : PAGE UP

PgDn : PAGE DOWN

Ins : INSERT

WINXP : WINDOWS XP

WIN7 : WINDOWS 7

SP : SERVICE PACK

CMD : COMMAND

TEMP : TEMPORARY

WMP : WINDOWS MEDIA PLAYER

MP3 : MOVING PICTURE EXPERTS GROUP PHASE 3 (MPEG-3)

MPEG : MOVING PICTURE EXPERTS GROUP PHASE (MPEG)

MPEG 1 : MOVING PICTURE EXPERTS GROUP PHASE 1 (MPEG-1)

MPEG 2 : MOVING PICTURE EXPERTS GROUP PHASE 2 (MPEG-2)

JPG : JOINT PHOTOGRAPHIC EXPERTS GROUP

AVI : AUDIO VIDEO INTERLEAVE

WMV : WINDOWS MEDIA VIDEO

GIF : GRAPHICS INTERCHANGE FORMAT

RGB : RED – GREEN – BLUE

CMYK : CYAN – MAGENTA – YELLOW – KEY (BLACK)

ACPI : ADVANCED CONFIGURATION AND POWER INTERFACE

APM : ADVANCED POWER MANAGEMENT

REGEDIT : REGISTRY EDITOR

PRO : PROFESSIONAL

BAT : BATCH

GPEDIT : GROUP POLICY EDITOR

OSK : ON-SCREEN KEYBOARD

COM : COMPONENT OBJECT MODEL

USB : UNIVERSAL SERIAL BUS

IT : INFORMATION TECHNOLOGY

NET : INTERNET

IP : INTERNET PROTOCOL

AP : ACCESS POINT

DNS : DOMAIN NAME SYSTEM

HTTP : HYPERTEXT TRANSFER PROTOCOL

HTTPS : HYPERTEXT TRANSFER PROTOCOL SECURE

HTML : HYPERTEXT MARKUP LANGUAGE

PHP : HYPERTEXT PREPROCESSOR

XML : EXTENSIBLE MARKUP LANGUAGE

CSS : CASCADING STYLE SHEETS

ASP : ACTIVE SERVER PAGES

SQL : STRUCTURED QUERY LANGUAGE

WWW : WORLD WIDE WEB

.COM : COMMERCIAL

.NET : NETWORK

.ORG : ORGANIZATION

.EDU : EDUCATIONAL

.GOV : GOVERMENTAL

.INFO : INFORMATION

.BIZ : BUSINESS

.BD : BANGLADESH

.US : UNITED STATE

.UK : UNITED KINGDOM

TLD : TOP-LEVEL DOMAIN

DL : DOWNLOAD

UL : UPLOAD

PR : PAGE RANK

SEO : SEARCH ENGINE OPTIMIZATION

E-MAIL : ELECTRONIC MAIL

SMS : SHORT MESSAGE SERVICE

MMS : MULTIMEDIA MESSAGING SERVICE

PW  : PASSWORD

AP : ALERTPAY

MB : MONEYBOOKERS

PP : PAYPAL

LR : LIBERTY RESERVE

INFO : INFORMATION

LAN : LOCAL AREA NETWORK

WLAN : WIRELESS LOCAL AREA NETWORK

 MAN :   METROPOLITAN AREA NETWORK

VIRUS : VITAL INFORMATION  RESOURCES UNDER SEIZE

NAT : NETWORK ADDRESS TRANSLATION

UPDATE : UP-TO-DATE

IDM : INTERNET DOWNLOAD MANAGER

DAP : DOWNLOAD ACCELERATOR PLUS

KB : KILOBYTE

MB : MEGA BYTE

GB : GIGA BYTE

GiB : GIBI BYTE

TB : TERA BYTE

TiB : TEBI BYTE

PB : PETA BYTE

PiB : PEBI BYTE

EB : EXA BYTE

EiB : EXBI BYTE

ZB : ZETTA BYTE

ZiB : ZEBI BYTE

YB : YOTTA BYTE

YiB : YOBI BYTE

GOOGLE : GOOGLE IS NOT AN ABBREVIATION . IT IS DISTORTED FORM OF GOOGOL NUMBER (10 TO THE POWER OF 100) , THAT IS 1 FOLLOWED BY 100 ZEROS (0) .

YAHOO : YET ANOTHER HIERARCHICAL OFFICIOUS ORACLE

INTEL : INTEGRATED ELECTRONICS

HP : HEWLETT PACKARD

LG : LIFE’S GOOD

IBM : INTERNATIONAL BUSINESS MACHINES

IPV4 : INTERNET PROTOCOL VERSION 4

IPV6 : INTERNET PROTOCOL VERSION 6

WI-FI : WIRELESS FIDELITY

GPRS : GENERAL PACKET RADIO SERVICE

3G : THIRD GENERATION

GPS : GLOBAL POSITIONING SYSTEM

UMTS : UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS)

HSDPA : HIGH- SPEED DOWNLINK PROTOCOL ACCESS

GSM : GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS

EDGE : ENHANCED DATA RATES FOR GSM EVOLUTION

IMEI : INTERNATIONAL MOBILE EQUIPMENT IDENTITY (DIAL *#06# TO KNOW YOUR MOBILE IMEI NUMBER)

IVRS : INTERACTIVE VOICE RESPONSE SYSTEM

VOIP : VOICE OVER INTERNET PROTOCOL

RSS : REALLY SIMPLE SYNDICATION

URL : UNIFORM RESOURCE LOCATOR or UNIVERSAL RESOURCE LOCATOR

FAQ : FREQUENTLY ASKED QUESTIONS

DMCA : DIGITAL MILLENNIUM COPYRIGHT ACT

ISP : INTERNET SERVICE PROVIDER

ASCII–AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE


Flying car (aircraft)


Flying car (aircraft)




The Waterman Aerobile at theSmithsonian

A flying car or roadable aircraft is an aircraft that can also travel along roads. All the working examples have required some manual or automated process of conversion between the two modes of operation.

A slightly different concept that is sometimes referred to as a "flying car", particularly in science fiction, is that of an aircraft that would be practical enough for every-day travel, but would not necessarily be drivable on the roads.

Driverless car (Autonomous car)




Driverless car (Autonomous car)


For the wider application of artificial intelligence to automobiles, see Vehicular automation.

Junior, a robotic Volkswagen Passatparked at Stanford University in 2009.

An autonomous car, also known as a personal automated vehicle, or informally as a robotic car or self-driving car, is a motor vehicle capable of automated driving and navigating entirely without direct human input. As defined here, automated vehicles exist mostly as prototypes as of 2013, but they are likely to be commercialised in the near future.

Automated vehicles sense their surroundings with such techniques as radar, lidar, GPS and computer vision. Advanced control systems interpret sensory information to identify appropriate navigation paths, as well as obstacles and relevant signage.[1] Some automated vehicles can furthermore update their maps based on sensory input, allowing them to navigate through uncharted environments.

Since the late 2000s, significant advances have been made in both technology and legislation relevant to autonomous cars. Numerous major companies and research organizations have developed working prototype automated vehicles, including Google, Continental Automotive Systems, Nissan, Toyota, Audi and Oxford University. In June 2011, the state of Nevada was the first jurisdiction in the United States to pass a law concerning the operation of autonomous cars. The Nevada law went into effect on March 1, 2012, and the Nevada Department of Motor Vehicles issued the first license for a self-driving car in May 2012. As of February 2013, three U.S. states have passed laws permitting driverless cars: Nevada, Florida and California.

Thursday, 21 February 2013

Firewall

Firewall 

The term "firewall" originally referred to fireproof walls that were designed to prevent the spread of fire from one room or building to the next. They were typically made of brick, steel, or another type of inflammable material that would effectively limit the spread of the fire. In the IT world, firewalls do not involve any fire or pyrotechnics, but they serve a similar purpose. A computer firewall limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.

Firewalls can be either hardware or software-based. A router is a good example of a hardware device that has a built-in firewall. Most routers can be configured to limit traffic from certain IP addresses or block requests based on other criteria. Software programs that monitor and restrict external access to a computer or network can also serve as firewalls. A network firewall only allows authorized traffic from the Internet to flow in and out of the network.


Graymail

Graymail describes email messages that are generally unwanted, but do not fit the definition of spam. Unlike spam, graymail includes messages from mailing lists and newsletters that you have legitimately signed up to receive. Over time, these messages can begin to clutter your inbox and can easily be mistaken for spam.

Pharming and Phishing


Pharming and Phishing

Pharming

Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture personal information by getting users to visit a fake website, pharming redirects users to false websites without them even knowing it.
While a typical website uses a domain name for its address, its actual location is determined by an IP address. When a user types a domain name into his or her Web browser's address field and hits enter, the domain name is translated into an IP address via a DNS server. The Web browser then connects to the server at this IP address and loads the Web page data. After a user visits a certain website, the DNS entry for that site is often stored on the user's computer in a DNS cache. This way, the computer does not have to keep accessing a DNS server whenever the user visits the website.


While pharming is not as common as phishing scams are, it can affect many more people at once. This is especially true if a large DNS server is modified. So, if you visit a certain website and it appears to be significantly different than what you expected, you may be the victim of pharming. Restart your computer to reset your DNS entries, run an antivirus program, then try connecting to the website again. If the website still looks strange, contact your ISP and let them know their DNS server may have been pharmed.

Phishing

Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e-mail. Some e-mails will ask that you enter even more information, such as your full name, address, phone number, social security number, and credit card number. However, even if you visit the false website and just enter your username and password, the phisher may be able to gain access to more information by just logging in to you account.

Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look surprisingly legitimate, and even the Web pages where you are asked to enter your information may look real.

If you receive an e-mail that asks that you update your information and you think it might be valid, go to the website by typing the URL in your browser's address field instead of clicking the link in the e-mail.

What is Cookies


What is Cookies

A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information about you, similar to a preference file created by a software application.

While cookies serve many functions, their most common purpose is to store login information for a specific site. Some sites will save both your username and password in a cookie, while others will only save your username. Whenever you check a box that says, "Remember me on this computer," the website will generate a login cookie once you successfully log in. Each time you revisit the website, you may only need to enter your password or you might not need to log in at all.

Cookies are also used to store user preferences for a specific site. For example, a search engine may store your search settings in a cookie. A news website may use a cookie to save a custom text size you select for viewing news articles. Financial websites sometimes use cookies to store recently viewed stock quotes. If a website needs to store a lot of personal information, it may use a cookie to remember who you are, but will load the information from the web server. This method, called "server side" storage, is often used when you create an account on a website.

Browser cookies come in two different flavors: "session" and "persistent." Session cookies are temporary and are deleted when the browser is closed. These types of cookies are often used by e-commerce sites to store items placed in your shopping cart, and can serve many other purposes as well. Persistent cookies are designed to store data for an extended period of time. Each persistent cookie is created with an expiration date, which may be anywhere from a few days to several years in the future. Once the expiration date is reached, the cookie is automatically deleted. Persistent cookies are what allow websites to "remember you" for two weeks, one month, or any other amount of time.

Most web browsers save all cookies in a single file. This file is located in a different directory for each browser and is not meant to be opened manually. Fortunately, most browsers allow you to view your cookies in the browser preferences, typically within the "Privacy" or "Security" tab. Some browsers allow you to delete specific cookies or even prevent cookies from being created. While disallowing cookies in your browser may provide a higher level of privacy, it is not recommended since many websites require cookies to function properly.

Wednesday, 20 February 2013

OUTPUT DEVICES



OUTPUT DEVICES
The devices which are used to display the data to the user either in the form of hard copy or soft copy are called output devices.
SPEAKERS
Speakers receive the sound in the form of electric current from the sound card & convert it to sound format. These are used for listening music, chatting , seminars for presentations etc.
  •  





VDU (Visual Display Unit)
This is also called monitor. It is used to get the data in the form of soft copy. Their functioning is exactly similar to the television. It contains a CRT which emits the electrons to trace a regular pattern of horizontal lines on the screen.





PRINTER
jpgThese devices gives the hard copy of the output. These are in different types.
Impact - Have mechanical contact in between paper & printing head
Non Impact - No mechanical contact between paper & printing head







DAISY PRINTER
jpg
IMPACT :
Line Printers - print line wise (E.g. Drum Printer)
Character Printer - print character wise (E.g. Daisy Printer)
NON IMPACT -
Electromagnet Printers
Thermal Printers
Electrostatic Printers
Inkjet Printers
Laser Printers





LCD (Liquid Crystal Display)
These screens are used in laptops & notebook sized PCs. A special type of liquid is sandwiched between two plates. The top plate is clear & bottom plate is reflective. The molecules in these liquids are normally aligned & the computer signals are used to align these molecules.

LED (Light Emitting Diodes) 
 
A LED screen is a video display which uses light-emitting diodes. An LED panel is a small display, or a component of a larger display or screen