Monday, 29 April 2013

Turn On/Off Firewall Protection from Command Line

Here are some simple commands that you can use to check status of firewall or to Turn On or Off Windows Firewall.
Press Windows + R Button to run command





Type netsh and hit Enter.netsh Prompt will open.










How to Enable Netmeeting in Windows XP?

Net meeting is used for the remote sharing of desktop.The main advantage of using this technique is that you can also transfer files, Using Headphones and mic you can also communicate.Another advantage is that there is no need to install any third party software and the control remains to both the users simultaneously.here are some simple steps to activate net meeting in Windows XP based PC:

and enter conf Command as shown below an hit enter
















Sunday, 28 April 2013

DBMS Languages

 DBMS Support a variety of users and provides appropriate languages and interface or each category of users.Here are some languages that are provided by DBMS:
1) Data Definition Language (DDL): This Language is used define data structures and specially database schemas. these statements are used to create, alter, or drop data structures. ALTER ,CREATE ,DROP are some examples of DDL.

2) Storage Definition Language (SDL): This language is used to define internal schema. It defines that what will be the Physical structure of database, How many bites per field will be used, what will be the order of fields, and how records will be accesses etc.

3) View Definition Language (VDL): This language is used to specify user views and their mapping to conceptual schema. It defines the subset of records available to classes of users. It creates virtual tables and the view appears to users like conceptual level.It specifies user interfaces.

Database Independence

"The ability to change the Schema at one level of database system without having to change the Schema at the next higher level is called data independence". Data Independence is divided into two categories:

1) Logical Data Independence: It is the ability to change conceptual schema without making any changes to application programs or external schema. In Logical data Independence new rows and columns are added without changing user views and programs.it is more difficult to achieve rather than Physical Data Independence.

DBMS Users

It is very difficult to design and maintain large databases for a single user.To perform such activities no. of users are involved .These users are called DBMS users and can be categorized as:-
1) Database Administrator: DBA is a person that performs installation, configuration, up gradation monitoring and maintenance of databases in an organization.He is also responsible for the database recovery and security.

2) Database Designers: Database designers are responsible for data identification that is to be stored and choosing database structure that represents and stores this data.They communicate with the user and designs database as per their requirements. They creates Tables, Indexes, Views, Constraints, Triggers, Storage Parameters etc. 

Thursday, 25 April 2013

Semaphores

These are like integers but has the following three difference from them:
1) Its value can be initialized as integer but only increment or decrement operations are allowed and its current value can't be read.
2) If any thread decrements its value and result is negative then thread itself can't continue until any other thread increments the Semaphore.
3) If any thread increments Semaphore and their are another threads waiting ,one of the thread gets blocked which was in waiting list.


Explanation : Consider the example of a Cyber Cafe which has 20 cabins and is used by one person at a time for the prevention of dispute user requests a cabin from front counter to use PC.When user work is over he returns to counter makes payment and indicates that now one cabin is free.If no cabin is free than user has to wait until any cabin is free.

What is Process?

 Any Program that is under execution is called a Process e.g. scanning an image is a process.

For the completion of a process resources are required. These resources are allocated to process either when process is created or is under execution. For Example you have typed a page in Microsoft Word and you want to print it, as you give print command the print process is created and it requires Printer as resource. If any other process is using the printer then your page will be queued and will be printed when first process of printing is complete. A process may have sub processes which are called child processes.A Process can demand only those resources which are available e.g. if 8 resources are available than process can demand all 8 resources but 9th resource can't be demanded.


Wednesday, 24 April 2013

Round-Robin Scheduling

It is the CPU Scheduling Technique specially designed  for the time shared systems. This Technique is similar to FCFS Technique but the difference is that processes are switched at a regular interval of time and the regular internal is called time quantum.The can be from 0 to 100 milliseconds.

The ready queue is used in a circular fashion. The CPU is allocated to each process for a regular interval of time of 1 time quantum each new process is added to the tail ready queue. CPU scheduling picks first process from ready queue, set a timer to interrupt after 1 time quantum and then process is dispatched.If the burst time of process is less than a time quantum then it will automatically release the CPU.The average waiting time a round Robin policy is often high.


Consider the following ready queue of processes.
Process               Burst time
   P1                           10
   P2                           20
   P3                           5


Let the time Quantum be 5 miliseconds. The Gantt chart will be as given below


Priority Scheduling

It is a CPU Scheduling Technique in which CPU is allocated to the process with highest priority. Equal priority processes are served in FCFS order.Priority is indicated by fixed range of numbers, it can be 0 to 10 or 0 to 1000. However there is no protocol that whether 0 will be highest priority or lowest. Some systems used lower numbers as lower priority and some systems uses lower numbers as highest priority.

Consider the following set of processes assumed to arrive at 0 in the order P1, P2 and P3 with the CPU Burst time in milliseconds.
Process             Burst time           Priority
    P1                       10                        3
    P2                       5                          1
    P3                       6                          2


Gantt Chart using priority scheduling will be.








Shortest Job First (SJF) CPU Scheduling

It is a CPU Scheduling Technique in which CPU is allocated to the process whose burst time is minimal.
Consider the following set of processes with the length of the CPU burst given in millisecond.
Process             Burst time
   P1                         10
   P2                          5
   P3                          1
   P4                          4



Using SJF Scheduling we Schedule these process according to Gantt chart as:






First Come First Serve (FCFS) CPU Scheduling

It is the simplest CPU scheduling algorithm in which CPU is allocated first to the process that request it first. This policy is managed by FCFS queue. When CPU is free it is allocated to the first process of the ready Queue and the running process is removed from the ready queue. The code generation for FCFS algorithm is simple. The main draw back of this technique is that average waiting time of a process is quite long.Consider the Following queue of process.

Process              Burst Time
    P1                         10
    P2                         40
    P3                         1


Let the process arrive in the order P1,P2 and P3 in ready queue and are to be served in FCFS order. The Gantt chart we will get is:


Hard Disk Drive (HDD)

It is a data storage device and is made up of a thin circular discs, called "Platters", which are coated on both the sides by Magnetic Material. A Disk pack may consist of number of Platters and are mounted on a central shaft that rotates them in same direction with same speed.The Data is written or accessed in a random manner and individual blocks of data can be stored or retrieved in any order rather than just sequentially.It is connected to computer using different interfaces such as IDE, SATA or SCSI.


Information Storage: In HDD information is stored on all surfaces of platters except upper and lower surface of top and bottom platters respectively. thus,a  disk with 5 disk platters will have 8 recording surfaces. Each plotter is consist of no. of invisible concentric circles which are called tracks. A set of such corresponding tracks in all the surfaces is called cylinder. Tracks are further divided into sectors. * bit EBCDIC code is used for the information storage.The Information is stored in form of invisible magnetic spots. The Presence of magnetic spot represents binary 1 and absence represents binary 0.

Tuesday, 23 April 2013

OCR (Optical Character Reader)

This Device is used to detect alphabetic and numeric characters that are printed on the paper. These Characters can be handwritten or typed. These words must follow a standard size and no style should be used. If characters are typed than they must be typed using special OCR fonts. The standard OCR fonts are: OCR-A (American Standard) and OCR-B (European Standard).



Floppy Disk

It is a Magnetic type secondary storage media.It is Composed of a thin magnetic disk encapsulated in a rectangular plastic cover lined with fabric that is used to remove dust particles.They came in different sizes i.e. 8-Inch, 5.25-Inch and 3.5 Inch.The 8-Inch and 5.25-Inch floppy disks are obsolete now and only 3.5 Inch floppy is used rarely for the emergency start up of system or to update firmwares.Fig(1) given below shows a 3.5 Inch Floppy disk and various Parts of it.It mainly consist of Following Parts:

i)A hub that engages with drive motor
ii) A hole that identifies its capacity.
iii)A Shutter for protection,when removed from computer.
iv)A Plastic Housing
v)two polyester sheet to sandwich the magnetic disk in the middle to reduce friction.
vi)Magnetic coated plastic disk.
vii)A write Protection notch.

OMR (Optical Mark Reader)

It is a device that is used to read marked data from document forms such as tests or surveys.Some OMR devices uses dedicated scanner.It consist of a light source and light detector.When light falls on the paper it reflects it.Intensity of reflected light is more where paper is blank whereas darken areas of paper reflects less light.

In some OMR trans optic papers are used.when light is passed through paper,the intensity of light received at another end is low from darken areas and intensity is high from blank areas of paper.This combination of high low intensity is converted into binary values.OMR has the advantage that unlike OCR no complicated pattern recognition engine is required.Marks are constructed in such a way that their is no chance of error.




Monday, 22 April 2013

Computer Generations

First Generation(1942-1955)

This Generation is considered to be form 1942-1955. These Machines were designed with the help of vacuum tubes. The main features of this Generation Computer were:
1. Were designed with vacuum tube’s which was only electronic component available during those days.
2. These computers were fastest of their time and could perform calculations in milliseconds.
3. They were bulk in size due to the use of thousands of vacuum tubs.
4. These devices were non-potable and were more frequent to failure.

Characteristics of Computers

1) Speed: Computer is a very fast device it is capable of performing calculations in a few seconds that a human can do in entire month.

2) Accuracy: This is another Characteristic of computer that it performs all calculations with high accuracy. But this accuracy is dependent on its design and programming. If programming error occurs then result will also be affected by that.

3) No IQ: It is not a magical device and can perform only those tasks for which it is programmed or designed. But if it is designed with high class design then it can perform task with unthinkable speed and accuracy

Bus (Computing)

CPU is connected to I/O and devices and memory by a group of lines these lines are called as Buses. There are three types of buses that are used in computer system.

1) Address Bus: This Bus carries the Address of I/O device or Memory that CPU wants to access. Address bus can be 8 bit, 16 bit or more. A system with n address lines can reference 2address locations. This bus is a unidirectional bus and is also called A-Bus.

2) Data Bus: This bus is used to transfer data between Memory, processor and I/O devices. This bus is a bidirectional bus and is also called as D-Bus.

How to Use Change Text Case in Office 2010 ?

  1. Select the text for which you want to change the case.



  2. Right Click on Selected text and select Font.

Friday, 19 April 2013

Direct Memory Access (DMA)

Data transfer between I/O devices and memory is slow due to the speed mismatch in their speeds. This is avoided by removing the CPU from the path and letting the peripheral device manage the memory buses directly. This   data transfer between I/O device and memory without the involvement of CPU is called Direct Memory Access or DMA”.  

In this type of data transfer CPU remains free for another processes and has no control of the memory buses.  In DMA CPU make use of two control signals i.e. Bus Request (BR) and Bus Grant (BG). BR signal is used by the DMA controller to request the CPU for the control of buses. When this signal is active, CPU terminate the current execution of instruction and places  data bus, address bus, and read and write lines into high impedance state. This high impedance state works like open circuit and output is disconnected.BG Signal is used by the CPU to inform that all buses are now in high impedance state and the DMA controller can take the control of buses.

Thursday, 18 April 2013

Cache Memory

It is the smallest and the fastest memory which stores copies of data from most frequently used main memory locations. It is very near to Processor or even in the Processor. The main idea behind the use of Cache memory is to reduce average time to access memory. Its speed approaches to the speed of CPU components.

Operation: -Whenever CPU wants to access the main memory, it first looks the Cache Memory. If the word is found in the Cache then it is read from there. But if the word is not found in Cache it is read from the main memory. Block of word that is read from main memory is transferred to cache memory .Only those words are kept in Cache that are most frequently used.

Pipelining

It is the Process in which sequential task is decomposed into sub operations. Each sub operation is executed in a special dedicated segment which is concurrently operates with all other segments. In Pipelining result obtained from one segment is transferred to next segment of the Pipeline. To get the final result the data is passed through all segments. This Process looks like the flow of data in pipes hence named Pipelining. In Pipelining several segments performs several computations at the same time. The overlapping of computation is made possible by associating a register with each segment. Isolation between each segment is provided by the registers so that each can operate on distinct data simultaneously.

Let we want to calculate A*B +C * D. To Perform Arithmetic Operation of A*B +C * D
A and B are kept in Different Registers and then Multiplied with the help of Multiplier. Similarly C and D are kept in Two Other registers and are multiplied with the help of Multiplier. The Result of A * B and C * D is then transferred to the Adder to obtain the Final result.

Difference Between Testing and Debugging



S. No.
Testing
Debugging
1
It is a Process in which a Program is validated.
It is the Process in which program errors are removed.
2
It is a Positive activity that demonstrates that Program is correct and meets its design specifications.
It is a negative activity in which known errors or bugs are removed.
3
Testing finishes when all verifications against desired specifications have been done.
Debugging Finishes when all known errors are removed.

Wednesday, 17 April 2013

Functions of Operating System

1) Process Management: - Operating System allocates resources to Processes, enable processes to share and exchange information, protect the resources of each process from other processes and enable synchronization among processes. Deadlock avoidance and recovery is also function of Operating System.

2) Input / Output Management:-Assignment of various input and output devices to one or more programs is done by the operating system.

3) Memory Management: - Allocation of main memory and secondary memory to the system programs as well as user data is done by the Operating System.

4) File Management:-How files will be transferred from one device to another and how they will be saved or accessed is managed by the Operating System

5) Determine and maintain order of Jobs: - It is the Responsibility of the Operating System to decide that jobs will be completed in which order. It decides that first preference should be given to which request and which can be delayed.

Tuesday, 16 April 2013

FSK (Frequency Shift Keying)

It is the Modulation Technique in which Amplitude and Phase of Signal are kept Constant while frequency is varies to represent binary 1 or 0.One level of frequency represents binary 1 and other represents binary 0.The main advantage of using this technique is that it is less prone to noise and sender is only concerned about the frequency and not about the amplitude.


Figure given Below clearly illustrates FSK.where one level of frequency is representing binary 1 and another level is representing binary 0.

How to Clone Disks?

Its not possible to install every machine if you want to install them in bulk in lesser time.and if you install them one by one than it is a time consuming process.Another alternate is to clone the disks.This technique is only useful when you want to install machines with same software's , same configurations.To do so one of the most popular software is Acronics True Image Home.

 before performing clone install a fresh machine with all configurations and application software's or you may copy an existing machine.The main Advantage of using this software is that it is very fast.

Here are Some simple steps that are used in Acronics True Image.

STEP1-->Download and Install Acronics True Image Home from Official website of Acronics.
STEP2-->Open Acronics True Image ,click on Tools and utilities and select clone disks

Monday, 15 April 2013

Drive not opening on double click

Many time it happens that when you open any drive of your Computer,it Does not Open Directly and gives out a choice to open with program.This Problem can be resolved by the use of a Software Called Combo fix without formatting the Hard Disk Drive.It is a free utility .(Click Here To Download).Figure given below illustrates the screen that appears to you when you double click any partition of your HDD.




Here are some simple steps to use this Software 

Thursday, 11 April 2013

Difference Between Structure and Union



Characteristics
Structure
Union
Definition
A structure is a collection of variables under a single name. These variables can be of different types, and each has a name which is used to select it from the structure.
A union is a special data type that enables to store different data types in the same memory location. You can define a union with many members, but only one member can contain a value at any given time
Declaration
typedef struct {
          char name[64];
          char course[128];
          int age;
          int year;
  } student;
union Data
{
   int i;
   float f;
   char  str[20];
} data;  
Memory Allocation
In a structure, all of its data members are stored in contiguous memory locations. The size of an object of a struct is, therefore, the size of the sum of all its data members.

Example for Structure:

struct tech
{
char p;
int x;
float Q;
int y;
}D;

memory allocated for D will be  1+2+4+2= 9 bytes

A union is a class all of whose data members are mapped to the same address within its object. The size of an object of a union is, therefore, the size of its largest data member.

Example for union :

Swicth to Yahoo Mail Classic

Here are some simple steps that you can use to switch from new yahoo mail to yahoo mail classic

STEP1-->Open Mozilla Firefox

STEP2-->Click on Tools and select Options





Amplitude Shift Keying (ASK)


Amplitude Shift Keying (ASK) is a Modulation technique that is used in Digital to analog Conversions. This technique uses strength of signal to represent binary 0 or 1 value.in this only amplitude changes while frequency and phase both are kept constant.it uses finite number of amplitudes, each assigned a unique pattern of binary digits that represents binary 1 or 0.
The main Disadvantage of this technique is that unwanted energy or noise from other sources may vary signal amplitude and can change original sent value. Another problem is that Transmission speed is dependent on the physical characteristics of the transmission media.

Wednesday, 10 April 2013

Network Protocols and Their Functions

Protocols

Whenever a person want to talk with another person then their communicating language should be same so that they can easily communicate with each other .If they will use different languages then they can not understand what the other is saying. Similarly in Computer Networks certain rules are defined so that computers can communicate with one another.These Pre defined rules are called Protocols and can be defined as "Protocols are the predefined rules between the communicating devices that govern the communication between them."

Functions Of Protocols

i)  Sequencing of Data:- Protocols split large size messages to equal size pieces called Packets which can be transmitted easily.each packet contains unique identification number and can be easily arranged at receiver end to create original message.

ii) Flow Control of Data:-This is another important function of protocols.if sender is sending continuously data and receiver is not in a condition to receive that data or having less receiving speed then their are the chances of data loss.This data loss is avoided by the use of Protocols.

Problems Associated with Wired Media

Attenuation

With The increase in the distance the energy of signal decreases.This energy loss is called Attenuation.This Energy loss is due to the Resistance of the Transmission wire which gets warm when signals are passed through them.This energy loss is Frequency Dependent.To re-boost these weak signals amplifiers are used and signal can travel long distance.


Tuesday, 9 April 2013

Identification of Computer Ports



Port Name
Used for Connecting
Looks Like
PS/2
Keyboard/Mouse

RS-232 or Communication Port or Serial Port
Used to Connect Serial Devices Such as Modem, Passbook Printer, KIOSK Machine, Ticket Machine etc.

LPT Port
Used to Connect Printer or Parallel Interface Devices.

Monday, 8 April 2013

Open Suse 12.2 Installation Step by Step

1)      Minimum Hardware Requirements      
  • CPU: Pentium III 500 MHz or higher processor (Pentium 4 2.4 GHz or higher or any AMD64 or Intel64 processor recommended)
  • RAM: 1 GB physical RAM (2 GB recommended)
  • Disk Space: 5.0 GB for a normal installation (more recommended)
  • Sound and Graphics Card: Most modern cards are supported

2)      DVD Installation
When you’re ready, insert the DVD and (re)start the computer. Live CD/USB installation is described below
The first thing you’ll see is this welcome screen.






How to use ntbackup Utility in Windows to Generate Backup


Here are the steps that are used in Windows XP to generate backup using ntbackup utility

STEP1–>
go to Start–>Run–> and type ntbackup.exe


Sunday, 7 April 2013

How to use ntbackup Utility in Windows to Generate Backup


Here are the steps that are used in Windows XP to generate backup using ntbackup utility

STEP1–>
go to Start–>Run–> and type ntbackup.exe

Thursday, 4 April 2013

How to Test Earthing Using Digital Multimeter


Some time when you touch your monitor or CPU at home it gives you Electrical shock like feeling or even full Electrical shock. The Reason behind this is that most of the houses are not earthed.
Here are some simple steps to test Earthing in your home or at any organization->
Step1-->Set Your Digital Multimeter to AC testing Mode and set Max. Voltage to 750V


Step2-->Identify the Phase Earth and Neutral Pins. Generally Phase is always on right hand side and neutral on left hand side. The Description is shown in below given image.



Difference Between malloc and alloc Functions



Characteristics
malloc( )
calloc( )
Arguments
malloc() takes only single argument which is amount of memory to allocate in bytes.
calloc() needs two arguments  i.e. No. of variables to allocate in memory, and the size of single variable in bytes.
Memory Initialization
malloc() does not initialize the allocated memory .
calloc() initializes the allocated memory to zero

Difference Between Static and Dynamic Memory Allocation



Characteristics
Static Memory Allocation
Dynamic Memory Allocation
Definition
It is Memory Allocation Technique in which Memory is allocated at compile-time before the associated program is executed.
It is the memory allocation Technique in Which memory is allocated as required at run-time.
lifetime of allocated memory
Static-duration variables are allocated in main memory, along with the executable code of the program, and persist for the lifetime of the program whether it is needed or not.
In Dynamic Memory Allocation allocated from the large pool of memory, which is called heap. In C, the library function malloc is used to