Thursday 28 February 2013

India's first web browser


Epic is India's first-ever web browser and the only browser in the world with anti-virus protection built-in. Epic supports 12 Indian Languages.
Users can choose from 1500+ Indian themes including browser-based wallpapers. The India content sidebar includes everything from news headlines to regional news to live tv to live cricket commentary.

Epic is the first browser to include a suite of productivity applications including a free word processor, video sidebar (picture-in-picture functionality), communication apps like Facebook and Twitter, My Computer file browser, and 1500+ free, user-installable sidebar apps in the Epic Apps Store.



Wednesday 27 February 2013

Personalize your music today

Personalize your music today

With fast technology improvements and advances today’s mobile phone is more like an PC, with many functions that you could do on you computer just a few years ago. Because of all this you need to buy many expensive applications that can customize their devices. All this mean that you need allot of money to bring out the full potential of your mobile phone. There are many different software that can help you customize you phone and one of those is ToneThis Ringtone Maker which can help you to easily add ringtones, games, video clips, wallpapers and other media.

With ToneThis you can ToneThis Ringtone Maker:
- Personalize your music
- Download free mobile games
- Send music, images, and even flash videos from the web to your phone
- Share media with friends and family

New version of Comrade ERP (POS Version) has Launched.


New version of Comrade ERP (POS Version) has Launched.

Comrade Accounting Software, Dubai
The Point of Sale software












The back office software is Our ERP Version with the facility to Receive data (day close procedure) from Outlets Data throuth intiernet by very fast and simple procedure.
See the screen shots.
Comrade POS is one of the leading POS available in the middle East.

For Trade Enquiries please contact
Qamar Dubai Computers
Telephone +971 4 266 81 82
Fax +971 4 266 91 92
email : comradeuae@gmail.com, samkurakar@gmail.com

Restaurant Management Software by Comrade Team

Restaurant Management Software by Comrade Team

COMRADE ERP SOFTWARE FOR PROPERTY MANAGEMENT


COMRADE ERP SOFTWARE FOR PROPERTY MANAGEMENT

Comrade Accounting Software, Dubai Comrade ERP Software is a very useful software for Real Estate companies. Building, Flat, Tenant masters can accept unlimited images. Dash board Control for Job control. Job Costing and Post dated cheque control. Job costing reports also available by flatwise and building wise. M/s Khalifa Lootah Group of Companies recenty installed the Comrade ERP system for their property management.
.

The best PC games of 2013


The best PC games of 2013



Watch Dogs



Publisher: Ubisoft
Release: Late 2013
Though in recent years, Ubisoft has been happy to milk the Assassin’s Creed licence until its ruddy teats squeaked, let us not forget that the space-wizards-thru-history mega-franchise was born of huge creative risk: a new IP that cost so much develop that, rumour has it, sales didn’t cover the cost of development until its sequels were on shelves. Now, the same gigantic studio, Ubisoft Montreal, has unveiled Watch Dogs – a game with no smaller a scope than Assassin’s Creed, combining the complex sedition of information warfare with brutish third-person action and, it is suspected, with some sort of clever multiplayer/singleplayer crossover. It’s not only a showcase for the kind of polygon-crunching power the cutting edge PC can generate (finally loosed from the shackles of last-gen cross platform releases) but it also establishes a fiction that Ubisoft hopes will see it through the next decade.

Dead Space 3


Publisher: EA
Release: February 8
The sudden appearance of a co-op mode in this venerable space-horror franchise may sound like the marketing department got a little trigger happy with the back-of-box checklist, but there are reasons to be optimistic. Firstly, didn’t we all the say the same gloomy things about Mass Effect 3’s excellent multiplayer? Secondly, Dead Space already showed it could deliver terror to a twosome in its (actually terrific, sadly undersold) Wii light-gun game. What’s more, the game’s roots have hardly been forgotten: it’s still perfectly possible to play the game on your tod. This one promises to add themes of insanity and perception to the traditional jump-scares and body-horror.

Tomb Raider


Publisher: Square Enix
Release: March 5
Vulnerability and survival are the watchwords for this reinvention of the Tomb Raider series, which finds a young and unworldly Lara Croft shipwrecked on an island – a far cry from the back flipping  dual-wielding daredevil treasure-seeker who murdered her way through polygonal archaeological hoards during the mid-nineties. Crystal Dynamics are certainly brave in taking this iconic character in such a dark, mature direction – but will the cost to our heroine’s empowerment prove too great a price to pay?


Star Wars 1313


Publisher: LucasArts
Release: Late 2013
Link
“Dark and mature” may not be the go-to description for Star Wars, particularly since LucasArts’ acquisition by the House of Mouse, but such is the promise for this third person actioner. Set in the bowels of Coruscant, the subterranean Level 1313, you take on the role of a bounty hunter embroiled in a murky criminal conspiracy. Early glimpses suggest the game will ignore light sabers and force powers in favour of gadgetry and guns, and the claims are for a more grounded and gritty fiction, instead of the fruity pan-galactic melodrama to which we are accustomed.

Strike Suit Zero



Publisher: Born Ready Games
Release: January 24
Space combat has proven popular on Kickstarter but the interplanetary dogfighting of Strike Suit Zero wasn’t born from the crowdfunding process. Instead, this rather beautiful off-world blaster had been a while in development already and will be using the $175k it raised to, uh, kickfinish the project, and then kickpolish it, too.


Fortnite

Publisher: Epic Games
Release: TBC 2013
Perhaps keen to prove that there’s more to Unreal Engine 4 than high-definition beefcakes gunning down space goblins in the destroyed beauty of a future city, Epic Games’ first proof of their new technology will be the cartoonish tower defence game, Fortnite. The clean, chirpy visuals belie technological innovation, however: UE4 will allow players huge freedom in the way they construct their anti-zombie fortifications, editing each wall with a 3×3 grid. The plan is that the game will have a long-tail, with many post-release updates, eventually allowing players to construct Rube Goldberg-style machines of death.


Starforge

Publisher: CodeHatch
Release: TBC 2013
Minecraft with guns, realistic graphics, and both ground and low-orbit construction. Interested? Starforge is a ridiculously ambitious crowd-funded indie project that’s already come a remarkably long way. You deform terrain and build a fortress to protect yourself from aliens, and when all else fails, use a shotgun to blast them into pieces. If the small team can make those weapons feel nice to fire, it’ll be a winner.
Grand Theft Auto 5

Publisher: Rockstar
Release: Spring 2013
There’s been no confirmation of Rockstar’s next blockbuster for PC, but it would be a world gone topsy-turvy if Grand Theft Auto 5 was marooned on consoles for ever. This isn’t Red Dead Redemption, a game developed by a studio with around three PC credits to its name – this is GTA, a series whose every main instalment has appeared on PC. And it’s developed by Rockstar North, a team that (even including its legacy as DMA Design) has brought all bar seven of its games to PC. And where are the internet petitions to port Walker over from the Amiga, I might ask?

Guaranteed to be one of the biggest releases of 2013, GTA 5 sees the player take on the role of three different characters trying to make a crust amid the tinseltown glamour and sunbaked squalor of Los Santos. And it’s likely to be an ill-gotten crust at that, given the series’ heritage of exuberant criminality: heists, hits and high-speed chases are all to be expected, interspersed with all the leisure activities a high-rolling hoodlum might desire.
Remember Me

Publisher: Capcom
Release: May
“We’ll always have Paris,” as the saying goes – not so much in the Neo-Paris of 2084, when memories can be erased or altered by Memory Hunters. You play as one such mnemonic saboteur, called Nilin, herself rendered amnesiac by agents of the oppressive Parisien regime. Thirdperson acrobatics and assassinations ensue as you try to piece together the conspiracy, and featuring the world’s mostcomplicated sounding combat system. You also get to wreck men’s minds by jumping into their memory and replaying events to reconfigure their recollection. Convince someone they killed their girlfriend during an argument, for instance, and you may just drive them to suicide. How lovely.

Monday 25 February 2013

List of Some New Computer Virus

List of Some New Computer Virus

OPRAH WINFREY VIRUS

AT&T VIRUS

MCI VIRUS

PAUL REVERE VIRUS

POLITICALLY CORRECT VIRUS


RIGHT TO LIFE VIRUS

ROSS PEROT VIRUS

MARIO CUOMO VIRUS

TED TURNER VIRUS

ARNOLD SCHWARZENEGGER VIRUS

GOVERNMENT ECONOMIST VIRUS

NEW WORLD ORDER VIRUS

FEDERAL BUREAUCRAT VIRUS

GALLUP VIRUS

TERRY RANDALL VIRUS

TEXAS VIRUS

ADAM AND EVE VIRUS

CONGRESSIONAL VIRUS

AIRLINE VIRUS

FREUDIAN VIRUS

PBS VIRUS

ELVIS VIRUS

OLLIE NORTH VIRUS
NIKE VIRUS: Just does it.

SEARS VIRUS

JIMMY HOFFA VIRUS

CONGRESSIONAL VIRUS #2

KEVORKIAN VIRUS
IMELDA MARCOS VIRUS

STAR TREK VIRUS

HEALTH CARE VIRUS

GEORGE BUSH VIRUS

CLEVELAND INDIANS VIRUS

LAPD VIRUS

CHICAGO CUBS VIRUS

ORAL ROBERTS VIRUS




Sunday 24 February 2013

FULL FORM OF COMPUTER


COMPUTER : COMMON OPERATING MACHINE PARTICULARLY USED FOR TRADE, EDUCATION, AND RESEARCH

PC : PERSONAL COMPUTER

CPU : CENTRAL PROCESSING UNIT

OS : OPERATING SYSTEM

UPS : UNINTERRUPTIBLE POWER SUPPLY

RAM : RANDOM-ACCESS MEMORY

ROM : READ-ONLY MEMORY

LCD : LIQUID CRYSTAL DISPLAY

LED : LIGHT-EMITTING DIODE

NTFS : NEW TECHNOLOGY FILE SYSTEM

FAT : FILE ALLOCATION TABLE

DOC : DOCUMENT

TXT = TEXT

MS : MICROSOFT

SD : SECURE DIGITAL

MMC : MULTIMEDIA CARD

CD : COMPACT DISC

DVD : DIGITAL VERSATILE DISC

BRD – BD : BLU-RAY DISC

ISO : INTERNATIONAL ORGANIZATION FOR STANDARDIZATION

DB : DATABASE

IC : INTEGRATED CIRCUIT

SYS : SYSTEM

CONFIG : CONFIGURATION

CTRL : CONTROL

ALT : ALTERNATE

ESC : ESCAPE

DEL : DELETE

NUM LOCK : NUMBER LOCK

FN : FUNCTION

PrtScn = Prt Scr = Print Scrn = Prt Scn = Prt Sc = Prt Scrn = Prnt Scrn : PRINT SCREEN

SysRq : SYSTEM REQUEST

ScrLk : SCROLL LOCK

PgUp : PAGE UP

PgDn : PAGE DOWN

Ins : INSERT

WINXP : WINDOWS XP

WIN7 : WINDOWS 7

SP : SERVICE PACK

CMD : COMMAND

TEMP : TEMPORARY

WMP : WINDOWS MEDIA PLAYER

MP3 : MOVING PICTURE EXPERTS GROUP PHASE 3 (MPEG-3)

MPEG : MOVING PICTURE EXPERTS GROUP PHASE (MPEG)

MPEG 1 : MOVING PICTURE EXPERTS GROUP PHASE 1 (MPEG-1)

MPEG 2 : MOVING PICTURE EXPERTS GROUP PHASE 2 (MPEG-2)

JPG : JOINT PHOTOGRAPHIC EXPERTS GROUP

AVI : AUDIO VIDEO INTERLEAVE

WMV : WINDOWS MEDIA VIDEO

GIF : GRAPHICS INTERCHANGE FORMAT

RGB : RED – GREEN – BLUE

CMYK : CYAN – MAGENTA – YELLOW – KEY (BLACK)

ACPI : ADVANCED CONFIGURATION AND POWER INTERFACE

APM : ADVANCED POWER MANAGEMENT

REGEDIT : REGISTRY EDITOR

PRO : PROFESSIONAL

BAT : BATCH

GPEDIT : GROUP POLICY EDITOR

OSK : ON-SCREEN KEYBOARD

COM : COMPONENT OBJECT MODEL

USB : UNIVERSAL SERIAL BUS

IT : INFORMATION TECHNOLOGY

NET : INTERNET

IP : INTERNET PROTOCOL

AP : ACCESS POINT

DNS : DOMAIN NAME SYSTEM

HTTP : HYPERTEXT TRANSFER PROTOCOL

HTTPS : HYPERTEXT TRANSFER PROTOCOL SECURE

HTML : HYPERTEXT MARKUP LANGUAGE

PHP : HYPERTEXT PREPROCESSOR

XML : EXTENSIBLE MARKUP LANGUAGE

CSS : CASCADING STYLE SHEETS

ASP : ACTIVE SERVER PAGES

SQL : STRUCTURED QUERY LANGUAGE

WWW : WORLD WIDE WEB

.COM : COMMERCIAL

.NET : NETWORK

.ORG : ORGANIZATION

.EDU : EDUCATIONAL

.GOV : GOVERMENTAL

.INFO : INFORMATION

.BIZ : BUSINESS

.BD : BANGLADESH

.US : UNITED STATE

.UK : UNITED KINGDOM

TLD : TOP-LEVEL DOMAIN

DL : DOWNLOAD

UL : UPLOAD

PR : PAGE RANK

SEO : SEARCH ENGINE OPTIMIZATION

E-MAIL : ELECTRONIC MAIL

SMS : SHORT MESSAGE SERVICE

MMS : MULTIMEDIA MESSAGING SERVICE

PW  : PASSWORD

AP : ALERTPAY

MB : MONEYBOOKERS

PP : PAYPAL

LR : LIBERTY RESERVE

INFO : INFORMATION

LAN : LOCAL AREA NETWORK

WLAN : WIRELESS LOCAL AREA NETWORK

 MAN :   METROPOLITAN AREA NETWORK

VIRUS : VITAL INFORMATION  RESOURCES UNDER SEIZE

NAT : NETWORK ADDRESS TRANSLATION

UPDATE : UP-TO-DATE

IDM : INTERNET DOWNLOAD MANAGER

DAP : DOWNLOAD ACCELERATOR PLUS

KB : KILOBYTE

MB : MEGA BYTE

GB : GIGA BYTE

GiB : GIBI BYTE

TB : TERA BYTE

TiB : TEBI BYTE

PB : PETA BYTE

PiB : PEBI BYTE

EB : EXA BYTE

EiB : EXBI BYTE

ZB : ZETTA BYTE

ZiB : ZEBI BYTE

YB : YOTTA BYTE

YiB : YOBI BYTE

GOOGLE : GOOGLE IS NOT AN ABBREVIATION . IT IS DISTORTED FORM OF GOOGOL NUMBER (10 TO THE POWER OF 100) , THAT IS 1 FOLLOWED BY 100 ZEROS (0) .

YAHOO : YET ANOTHER HIERARCHICAL OFFICIOUS ORACLE

INTEL : INTEGRATED ELECTRONICS

HP : HEWLETT PACKARD

LG : LIFE’S GOOD

IBM : INTERNATIONAL BUSINESS MACHINES

IPV4 : INTERNET PROTOCOL VERSION 4

IPV6 : INTERNET PROTOCOL VERSION 6

WI-FI : WIRELESS FIDELITY

GPRS : GENERAL PACKET RADIO SERVICE

3G : THIRD GENERATION

GPS : GLOBAL POSITIONING SYSTEM

UMTS : UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS)

HSDPA : HIGH- SPEED DOWNLINK PROTOCOL ACCESS

GSM : GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS

EDGE : ENHANCED DATA RATES FOR GSM EVOLUTION

IMEI : INTERNATIONAL MOBILE EQUIPMENT IDENTITY (DIAL *#06# TO KNOW YOUR MOBILE IMEI NUMBER)

IVRS : INTERACTIVE VOICE RESPONSE SYSTEM

VOIP : VOICE OVER INTERNET PROTOCOL

RSS : REALLY SIMPLE SYNDICATION

URL : UNIFORM RESOURCE LOCATOR or UNIVERSAL RESOURCE LOCATOR

FAQ : FREQUENTLY ASKED QUESTIONS

DMCA : DIGITAL MILLENNIUM COPYRIGHT ACT

ISP : INTERNET SERVICE PROVIDER

ASCII–AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE


Flying car (aircraft)


Flying car (aircraft)




The Waterman Aerobile at theSmithsonian

A flying car or roadable aircraft is an aircraft that can also travel along roads. All the working examples have required some manual or automated process of conversion between the two modes of operation.

A slightly different concept that is sometimes referred to as a "flying car", particularly in science fiction, is that of an aircraft that would be practical enough for every-day travel, but would not necessarily be drivable on the roads.

Driverless car (Autonomous car)




Driverless car (Autonomous car)


For the wider application of artificial intelligence to automobiles, see Vehicular automation.

Junior, a robotic Volkswagen Passatparked at Stanford University in 2009.

An autonomous car, also known as a personal automated vehicle, or informally as a robotic car or self-driving car, is a motor vehicle capable of automated driving and navigating entirely without direct human input. As defined here, automated vehicles exist mostly as prototypes as of 2013, but they are likely to be commercialised in the near future.

Automated vehicles sense their surroundings with such techniques as radar, lidar, GPS and computer vision. Advanced control systems interpret sensory information to identify appropriate navigation paths, as well as obstacles and relevant signage.[1] Some automated vehicles can furthermore update their maps based on sensory input, allowing them to navigate through uncharted environments.

Since the late 2000s, significant advances have been made in both technology and legislation relevant to autonomous cars. Numerous major companies and research organizations have developed working prototype automated vehicles, including Google, Continental Automotive Systems, Nissan, Toyota, Audi and Oxford University. In June 2011, the state of Nevada was the first jurisdiction in the United States to pass a law concerning the operation of autonomous cars. The Nevada law went into effect on March 1, 2012, and the Nevada Department of Motor Vehicles issued the first license for a self-driving car in May 2012. As of February 2013, three U.S. states have passed laws permitting driverless cars: Nevada, Florida and California.

Thursday 21 February 2013

Firewall

Firewall 

The term "firewall" originally referred to fireproof walls that were designed to prevent the spread of fire from one room or building to the next. They were typically made of brick, steel, or another type of inflammable material that would effectively limit the spread of the fire. In the IT world, firewalls do not involve any fire or pyrotechnics, but they serve a similar purpose. A computer firewall limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.

Firewalls can be either hardware or software-based. A router is a good example of a hardware device that has a built-in firewall. Most routers can be configured to limit traffic from certain IP addresses or block requests based on other criteria. Software programs that monitor and restrict external access to a computer or network can also serve as firewalls. A network firewall only allows authorized traffic from the Internet to flow in and out of the network.


Graymail

Graymail describes email messages that are generally unwanted, but do not fit the definition of spam. Unlike spam, graymail includes messages from mailing lists and newsletters that you have legitimately signed up to receive. Over time, these messages can begin to clutter your inbox and can easily be mistaken for spam.

Pharming and Phishing


Pharming and Phishing

Pharming

Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture personal information by getting users to visit a fake website, pharming redirects users to false websites without them even knowing it.
While a typical website uses a domain name for its address, its actual location is determined by an IP address. When a user types a domain name into his or her Web browser's address field and hits enter, the domain name is translated into an IP address via a DNS server. The Web browser then connects to the server at this IP address and loads the Web page data. After a user visits a certain website, the DNS entry for that site is often stored on the user's computer in a DNS cache. This way, the computer does not have to keep accessing a DNS server whenever the user visits the website.


While pharming is not as common as phishing scams are, it can affect many more people at once. This is especially true if a large DNS server is modified. So, if you visit a certain website and it appears to be significantly different than what you expected, you may be the victim of pharming. Restart your computer to reset your DNS entries, run an antivirus program, then try connecting to the website again. If the website still looks strange, contact your ISP and let them know their DNS server may have been pharmed.

Phishing

Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e-mail. Some e-mails will ask that you enter even more information, such as your full name, address, phone number, social security number, and credit card number. However, even if you visit the false website and just enter your username and password, the phisher may be able to gain access to more information by just logging in to you account.

Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look surprisingly legitimate, and even the Web pages where you are asked to enter your information may look real.

If you receive an e-mail that asks that you update your information and you think it might be valid, go to the website by typing the URL in your browser's address field instead of clicking the link in the e-mail.

What is Cookies


What is Cookies

A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information about you, similar to a preference file created by a software application.

While cookies serve many functions, their most common purpose is to store login information for a specific site. Some sites will save both your username and password in a cookie, while others will only save your username. Whenever you check a box that says, "Remember me on this computer," the website will generate a login cookie once you successfully log in. Each time you revisit the website, you may only need to enter your password or you might not need to log in at all.

Cookies are also used to store user preferences for a specific site. For example, a search engine may store your search settings in a cookie. A news website may use a cookie to save a custom text size you select for viewing news articles. Financial websites sometimes use cookies to store recently viewed stock quotes. If a website needs to store a lot of personal information, it may use a cookie to remember who you are, but will load the information from the web server. This method, called "server side" storage, is often used when you create an account on a website.

Browser cookies come in two different flavors: "session" and "persistent." Session cookies are temporary and are deleted when the browser is closed. These types of cookies are often used by e-commerce sites to store items placed in your shopping cart, and can serve many other purposes as well. Persistent cookies are designed to store data for an extended period of time. Each persistent cookie is created with an expiration date, which may be anywhere from a few days to several years in the future. Once the expiration date is reached, the cookie is automatically deleted. Persistent cookies are what allow websites to "remember you" for two weeks, one month, or any other amount of time.

Most web browsers save all cookies in a single file. This file is located in a different directory for each browser and is not meant to be opened manually. Fortunately, most browsers allow you to view your cookies in the browser preferences, typically within the "Privacy" or "Security" tab. Some browsers allow you to delete specific cookies or even prevent cookies from being created. While disallowing cookies in your browser may provide a higher level of privacy, it is not recommended since many websites require cookies to function properly.

Wednesday 20 February 2013

OUTPUT DEVICES



OUTPUT DEVICES
The devices which are used to display the data to the user either in the form of hard copy or soft copy are called output devices.
SPEAKERS
Speakers receive the sound in the form of electric current from the sound card & convert it to sound format. These are used for listening music, chatting , seminars for presentations etc.
  •  





VDU (Visual Display Unit)
This is also called monitor. It is used to get the data in the form of soft copy. Their functioning is exactly similar to the television. It contains a CRT which emits the electrons to trace a regular pattern of horizontal lines on the screen.





PRINTER
jpgThese devices gives the hard copy of the output. These are in different types.
Impact - Have mechanical contact in between paper & printing head
Non Impact - No mechanical contact between paper & printing head







DAISY PRINTER
jpg
IMPACT :
Line Printers - print line wise (E.g. Drum Printer)
Character Printer - print character wise (E.g. Daisy Printer)
NON IMPACT -
Electromagnet Printers
Thermal Printers
Electrostatic Printers
Inkjet Printers
Laser Printers





LCD (Liquid Crystal Display)
These screens are used in laptops & notebook sized PCs. A special type of liquid is sandwiched between two plates. The top plate is clear & bottom plate is reflective. The molecules in these liquids are normally aligned & the computer signals are used to align these molecules.

LED (Light Emitting Diodes) 
 
A LED screen is a video display which uses light-emitting diodes. An LED panel is a small display, or a component of a larger display or screen
  
 
 












































































   













INPUT DEVICES

INPUT DEVICES

The input unit is formed by the input devices attached to the computer. Ex - Keyboard, Microphone etc. An input unit takes the input & converts it into binary form so that it can be understood by the computer.

KEYBOARD
This is most commonly used device which acts as input device. Its structure is like typewriter.It contains no. of  keys which have some specific ASCII values. Like ‘A’ has ASCII value 65. When this is pressed , it is converted into 65 & this 65 is sent to CPU in the form of Binary language (i.e. 1000001). Then operations are done on this data.

MOUSE

This is a pointing device which contains a roller in its base. When the mouse is moved on any surface, the pointer on the screen is also moved. It contains a potentiometer coupled with the roller. This potentiometer senses the motion of mouse & convert it into digital value. A mouse may contain two or three buttons. Now a day's optical mouse are very popular.

BAR CODE READER
It is a device which is used to read the code from the products which are usually in the form of Bars. It contains a light sensitive detector which identifies the values of the bars on the product & converts them into numeric code. These Bar readers are used in Shopping malls in a very large scale.
DIGITAL CAMERA

As the name specifies, these camera stores the data digitally, which then can be stored in the computer & can be stored for a long time. But it has very limited storage capacity. These are very popular because of less expensive photographs & Speed.
LIGHT PEN
It is a pointing device which contains a photocell mounted at its tip. It senses the light from the screen when it becomes closer to the screen, & generates a pulse. So for identifying a particular location on the screen these light pens are very useful. But this is not in very much use these days.
SCANNER
The scanner is an input device like the photocopier machine which makes the electronic copy of the picture or document which can be further edited.
MIC's or MICROPHONES
The scanner is an input device like the photocopier machine which makes the electronic copy of the picture or document which can be further edited. 


CPU

Central Processing Unit

The CPU is the control center for a computer. It guides, directs & governs its performance. It is the brain of the computer.
CPU CONTAINS :
1. Arithmetic & Logical Unit
2. Control Unit

ARITHMETIC & LOGICAL UNIT
An Arithmetic and Logical Unit (ALU) is a digital circuit  that performs arithmetic and logical operations. The ALU is a fundamental building block of the central processing unit (CPU) of a computer. ALU is a combination of Arithmetic Unit & Logical Unit.
ARITHMETIC UNIT
Arithmetic Unit performs all the arithmetic operations like addition , subtraction , multiplication & division performed on the operands.
For example :
a + b
a - b
a * B
a / b
CONTROL UNIT
Control Unit is most important part which controls all the internal as well as external functions in the computer.
THE MAIN FUNCTIONS PERFORMED BY THE CONTROL UNIT ARE :
1. It controls & guides the interpretation , flow    & manipulation of all data & information.
2. It sends control signals until the required operations are done properly by ALU & memory.
3. It gets program instructions from memory & executes them one after another.
4. It controls the flow of data from input device to memory & from memory to output devices.

 




CPU HARDWARE


 
 
      

Tuesday 19 February 2013





GENERATIONS OF COMPUTER

FIRST GENERATION



FEATURES OF FIRST GENERATION
1. Use of vacuum tubes
2. Big & Clumsy
3. High Electricity Consumption
4. Programming in Mechanical Language
5. Larger AC were needed
6. Lot of electricity failure occured

SECOND GENERATION


FEATURES OF SECOND GENERATION
1. Transistors were used
2. Core Memory was developed
3. Faster than First Generation computers
4. First Operating System was developed
5. Programming was in Machine Language & Assembly Language
6. Magnetic tapes & discs were used
7. Computers became smaller in size than the First Generation computers
8. Computers consumed less heat & consumed less electricity

THIRD GENERATION

THIRD GENERATION FEATURES
1. Integrated circuits developed
2. Power consumption was low
3. SSI & MSI Technology was used
4. High level languages were used

FOURTH GENERATION


FOURTH GENERATION COMPUTERS
1. LSI & VLSI Technology used
2. Development of Portable Computers
3. RAID Technology of data storage
4. Used in virtual reality, multimedia, simulation
5. Computers started in use for Data Communication
6. Different types of memories with very high accessing speed & storage capacity

FIFTH GENERATION


 FIFTH GENERATION COMPUTERS
1. Used in parallel processing
2. Used superconductors
3. Used in speech recognition
4. Used in intelligent robots
5. Used in artificial intelligence

        

Monday 18 February 2013

Top 10 Windows 8 tips and tricks

Customize your tiles
Windows 8 tilesMake the most of your Windows Start screen tiles by adjusting the sizes, where they are located, and what is listed.
  • Move any tile by clicking and dragging the tile. While moving a tile, if you need a larger view of the Start screen move the tile towards the top or bottom of the screen to zoom out.
  • Use your mouse wheel to scroll left-to-right through your tiles.
  • Any Desktop shortcut or program can be pinned to the Start screen by right-clicking the icon and choosing Pin to Start.
  • In the bottom right-hand corner of the start screen is a magnifying glass with tiles, click this icon to get a zoomed out view of your Start screen. In this view, if you right-click on a group of tiles you'll be given the option to name group, which can be useful if you have a group of related tiles (e.g. games). In this view, you can also click and drag a group to organize your tile groups.
  • Create a new speed bump between tile groups by moving a tile to a speed bump.
  • Resize any User tile or Live tile by right-clicking the tile and choosing resize.
  • If there is a tile you want on your Taskbar, right-click the tile and choose Pin to taskbar.
  • Show admin applications on the Start screen by clicking Settings in Charms, click Settings, and change the Show administrative tools from No to Yes.
  • In Internet Explorer 10, you can also pin any of your favorite web pages to your Start Screen