Monday, 29 April 2013
How to Enable Netmeeting in Windows XP?
Net meeting is used for the remote sharing of desktop.The main advantage of using this technique is that you can also transfer files, Using Headphones and mic you can also communicate.Another advantage is that there is no need to install any third party software and the control remains to both the users simultaneously.here are some simple steps to activate net meeting in Windows XP based PC:
and enter conf Command as shown below an hit enter
and enter conf Command as shown below an hit enter
Sunday, 28 April 2013
DBMS Languages
DBMS Support a variety of users and provides appropriate languages and interface or each category of users.Here are some languages that are provided by DBMS:
1) Data Definition Language (DDL): This Language is used define data structures and specially database schemas. these statements are used to create, alter, or drop data structures. ALTER ,CREATE ,DROP are some examples of DDL.
2) Storage Definition Language (SDL): This language is used to define internal schema. It defines that what will be the Physical structure of database, How many bites per field will be used, what will be the order of fields, and how records will be accesses etc.
3) View Definition Language (VDL): This language is used to specify user views and their mapping to conceptual schema. It defines the subset of records available to classes of users. It creates virtual tables and the view appears to users like conceptual level.It specifies user interfaces.
1) Data Definition Language (DDL): This Language is used define data structures and specially database schemas. these statements are used to create, alter, or drop data structures. ALTER ,CREATE ,DROP are some examples of DDL.
2) Storage Definition Language (SDL): This language is used to define internal schema. It defines that what will be the Physical structure of database, How many bites per field will be used, what will be the order of fields, and how records will be accesses etc.
3) View Definition Language (VDL): This language is used to specify user views and their mapping to conceptual schema. It defines the subset of records available to classes of users. It creates virtual tables and the view appears to users like conceptual level.It specifies user interfaces.
Database Independence
"The ability to change the Schema at one level of database system without having to change the Schema at the next higher level is called data independence". Data Independence is divided into two categories:
1) Logical Data Independence: It is the ability to change conceptual schema without making any changes to application programs or external schema. In Logical data Independence new rows and columns are added without changing user views and programs.it is more difficult to achieve rather than Physical Data Independence.
1) Logical Data Independence: It is the ability to change conceptual schema without making any changes to application programs or external schema. In Logical data Independence new rows and columns are added without changing user views and programs.it is more difficult to achieve rather than Physical Data Independence.
DBMS Users
It is very difficult to design and maintain large databases for a single user.To perform such activities no. of users are involved .These users are called DBMS users and can be categorized as:-
1) Database Administrator: DBA is a person that performs installation, configuration, up gradation monitoring and maintenance of databases in an organization.He is also responsible for the database recovery and security.
2) Database Designers: Database designers are responsible for data identification that is to be stored and choosing database structure that represents and stores this data.They communicate with the user and designs database as per their requirements. They creates Tables, Indexes, Views, Constraints, Triggers, Storage Parameters etc.
1) Database Administrator: DBA is a person that performs installation, configuration, up gradation monitoring and maintenance of databases in an organization.He is also responsible for the database recovery and security.
2) Database Designers: Database designers are responsible for data identification that is to be stored and choosing database structure that represents and stores this data.They communicate with the user and designs database as per their requirements. They creates Tables, Indexes, Views, Constraints, Triggers, Storage Parameters etc.
Thursday, 25 April 2013
Semaphores
These are like integers but has the following three difference from them:
1) Its value can be initialized as integer but only increment or decrement operations are allowed and its current value can't be read.
2) If any thread decrements its value and result is negative then thread itself can't continue until any other thread increments the Semaphore.
3) If any thread increments Semaphore and their are another threads waiting ,one of the thread gets blocked which was in waiting list.
Explanation : Consider the example of a Cyber Cafe which has 20 cabins and is used by one person at a time for the prevention of dispute user requests a cabin from front counter to use PC.When user work is over he returns to counter makes payment and indicates that now one cabin is free.If no cabin is free than user has to wait until any cabin is free.
1) Its value can be initialized as integer but only increment or decrement operations are allowed and its current value can't be read.
2) If any thread decrements its value and result is negative then thread itself can't continue until any other thread increments the Semaphore.
3) If any thread increments Semaphore and their are another threads waiting ,one of the thread gets blocked which was in waiting list.
Explanation : Consider the example of a Cyber Cafe which has 20 cabins and is used by one person at a time for the prevention of dispute user requests a cabin from front counter to use PC.When user work is over he returns to counter makes payment and indicates that now one cabin is free.If no cabin is free than user has to wait until any cabin is free.
What is Process?
Any Program that is under execution is called a Process e.g. scanning an image is a process.
For the completion of a process resources are required. These resources are allocated to process either when process is created or is under execution. For Example you have typed a page in Microsoft Word and you want to print it, as you give print command the print process is created and it requires Printer as resource. If any other process is using the printer then your page will be queued and will be printed when first process of printing is complete. A process may have sub processes which are called child processes.A Process can demand only those resources which are available e.g. if 8 resources are available than process can demand all 8 resources but 9th resource can't be demanded.
For the completion of a process resources are required. These resources are allocated to process either when process is created or is under execution. For Example you have typed a page in Microsoft Word and you want to print it, as you give print command the print process is created and it requires Printer as resource. If any other process is using the printer then your page will be queued and will be printed when first process of printing is complete. A process may have sub processes which are called child processes.A Process can demand only those resources which are available e.g. if 8 resources are available than process can demand all 8 resources but 9th resource can't be demanded.
Wednesday, 24 April 2013
Round-Robin Scheduling
It is the CPU Scheduling Technique specially designed for the time shared systems. This Technique is similar to FCFS Technique but the difference is that processes are switched at a regular interval of time and the regular internal is called time quantum.The can be from 0 to 100 milliseconds.
The ready queue is used in a circular fashion. The CPU is allocated to each process for a regular interval of time of 1 time quantum each new process is added to the tail ready queue. CPU scheduling picks first process from ready queue, set a timer to interrupt after 1 time quantum and then process is dispatched.If the burst time of process is less than a time quantum then it will automatically release the CPU.The average waiting time a round Robin policy is often high.
Consider the following ready queue of processes.
Process Burst time
P1 10
P2 20
P3 5
Let the time Quantum be 5 miliseconds. The Gantt chart will be as given below
The ready queue is used in a circular fashion. The CPU is allocated to each process for a regular interval of time of 1 time quantum each new process is added to the tail ready queue. CPU scheduling picks first process from ready queue, set a timer to interrupt after 1 time quantum and then process is dispatched.If the burst time of process is less than a time quantum then it will automatically release the CPU.The average waiting time a round Robin policy is often high.
Consider the following ready queue of processes.
Process Burst time
P1 10
P2 20
P3 5
Let the time Quantum be 5 miliseconds. The Gantt chart will be as given below
Priority Scheduling
It is a CPU Scheduling Technique in which CPU is allocated to the process with highest priority. Equal priority processes are served in FCFS order.Priority is indicated by fixed range of numbers, it can be 0 to 10 or 0 to 1000. However there is no protocol that whether 0 will be highest priority or lowest. Some systems used lower numbers as lower priority and some systems uses lower numbers as highest priority.
Consider the following set of processes assumed to arrive at 0 in the order P1, P2 and P3 with the CPU Burst time in milliseconds.
Process Burst time Priority
P1 10 3
P2 5 1
P3 6 2
Gantt Chart using priority scheduling will be.
Consider the following set of processes assumed to arrive at 0 in the order P1, P2 and P3 with the CPU Burst time in milliseconds.
Process Burst time Priority
P1 10 3
P2 5 1
P3 6 2
Gantt Chart using priority scheduling will be.
Shortest Job First (SJF) CPU Scheduling
It is a CPU Scheduling Technique in which CPU is allocated to the process whose burst time is minimal.
Consider the following set of processes with the length of the CPU burst given in millisecond.
Process Burst time
P1 10
P2 5
P3 1
P4 4
Using SJF Scheduling we Schedule these process according to Gantt chart as:
Consider the following set of processes with the length of the CPU burst given in millisecond.
Process Burst time
P1 10
P2 5
P3 1
P4 4
Using SJF Scheduling we Schedule these process according to Gantt chart as:
First Come First Serve (FCFS) CPU Scheduling
It is the simplest CPU scheduling algorithm in which CPU is allocated first to the process that request it first. This policy is managed by FCFS queue. When CPU is free it is allocated to the first process of the ready Queue and the running process is removed from the ready queue. The code generation for FCFS algorithm is simple. The main draw back of this technique is that average waiting time of a process is quite long.Consider the Following queue of process.
Process Burst Time
P1 10
P2 40
P3 1
Let the process arrive in the order P1,P2 and P3 in ready queue and are to be served in FCFS order. The Gantt chart we will get is:
Process Burst Time
P1 10
P2 40
P3 1
Let the process arrive in the order P1,P2 and P3 in ready queue and are to be served in FCFS order. The Gantt chart we will get is:
Hard Disk Drive (HDD)
It is a data storage device and is made up of a thin circular discs, called "Platters", which are coated on both the sides by Magnetic Material. A Disk pack may consist of number of Platters and are mounted on a central shaft that rotates them in same direction with same speed.The Data is written or accessed in a random manner and individual blocks of data can be stored or retrieved in any order rather than just sequentially.It is connected to computer using different interfaces such as IDE, SATA or SCSI.
Information Storage: In HDD information is stored on all surfaces of platters except upper and lower surface of top and bottom platters respectively. thus,a disk with 5 disk platters will have 8 recording surfaces. Each plotter is consist of no. of invisible concentric circles which are called tracks. A set of such corresponding tracks in all the surfaces is called cylinder. Tracks are further divided into sectors. * bit EBCDIC code is used for the information storage.The Information is stored in form of invisible magnetic spots. The Presence of magnetic spot represents binary 1 and absence represents binary 0.
Information Storage: In HDD information is stored on all surfaces of platters except upper and lower surface of top and bottom platters respectively. thus,a disk with 5 disk platters will have 8 recording surfaces. Each plotter is consist of no. of invisible concentric circles which are called tracks. A set of such corresponding tracks in all the surfaces is called cylinder. Tracks are further divided into sectors. * bit EBCDIC code is used for the information storage.The Information is stored in form of invisible magnetic spots. The Presence of magnetic spot represents binary 1 and absence represents binary 0.
Tuesday, 23 April 2013
OCR (Optical Character Reader)
This Device is used to detect alphabetic and numeric characters that are printed on the paper. These Characters can be handwritten or typed. These words must follow a standard size and no style should be used. If characters are typed than they must be typed using special OCR fonts. The standard OCR fonts are: OCR-A (American Standard) and OCR-B (European Standard).
Floppy Disk
It is a Magnetic type secondary storage media.It is Composed of a thin magnetic disk encapsulated in a rectangular plastic cover lined with fabric that is used to remove dust particles.They came in different sizes i.e. 8-Inch, 5.25-Inch and 3.5 Inch.The 8-Inch and 5.25-Inch floppy disks are obsolete now and only 3.5 Inch floppy is used rarely for the emergency start up of system or to update firmwares.Fig(1) given below shows a 3.5 Inch Floppy disk and various Parts of it.It mainly consist of Following Parts:
i)A hub that engages with drive motor
ii) A hole that identifies its capacity.
iii)A Shutter for protection,when removed from computer.
iv)A Plastic Housing
v)two polyester sheet to sandwich the magnetic disk in the middle to reduce friction.
vi)Magnetic coated plastic disk.
vii)A write Protection notch.
i)A hub that engages with drive motor
ii) A hole that identifies its capacity.
iii)A Shutter for protection,when removed from computer.
iv)A Plastic Housing
v)two polyester sheet to sandwich the magnetic disk in the middle to reduce friction.
vi)Magnetic coated plastic disk.
vii)A write Protection notch.
OMR (Optical Mark Reader)
It is a device that is used to read marked data from document forms such as tests or surveys.Some OMR devices uses dedicated scanner.It consist of a light source and light detector.When light falls on the paper it reflects it.Intensity of reflected light is more where paper is blank whereas darken areas of paper reflects less light.
In some OMR trans optic papers are used.when light is passed through paper,the intensity of light received at another end is low from darken areas and intensity is high from blank areas of paper.This combination of high low intensity is converted into binary values.OMR has the advantage that unlike OCR no complicated pattern recognition engine is required.Marks are constructed in such a way that their is no chance of error.
In some OMR trans optic papers are used.when light is passed through paper,the intensity of light received at another end is low from darken areas and intensity is high from blank areas of paper.This combination of high low intensity is converted into binary values.OMR has the advantage that unlike OCR no complicated pattern recognition engine is required.Marks are constructed in such a way that their is no chance of error.
Monday, 22 April 2013
Computer Generations
First Generation(1942-1955)
This Generation is considered to be form 1942-1955. These Machines were designed with the help of vacuum tubes. The main features of this Generation Computer were:
1. Were designed with vacuum tube’s which was only electronic component available during those days.
2. These computers were fastest of their time and could perform calculations in milliseconds.
3. They were bulk in size due to the use of thousands of vacuum tubs.
4. These devices were non-potable and were more frequent to failure.
This Generation is considered to be form 1942-1955. These Machines were designed with the help of vacuum tubes. The main features of this Generation Computer were:
1. Were designed with vacuum tube’s which was only electronic component available during those days.
2. These computers were fastest of their time and could perform calculations in milliseconds.
3. They were bulk in size due to the use of thousands of vacuum tubs.
4. These devices were non-potable and were more frequent to failure.
Characteristics of Computers
1) Speed: Computer is a very fast device it is capable of performing calculations in a few seconds that a human can do in entire month.
2) Accuracy: This is another Characteristic of computer that it performs all calculations with high accuracy. But this accuracy is dependent on its design and programming. If programming error occurs then result will also be affected by that.
3) No IQ: It is not a magical device and can perform only those tasks for which it is programmed or designed. But if it is designed with high class design then it can perform task with unthinkable speed and accuracy
2) Accuracy: This is another Characteristic of computer that it performs all calculations with high accuracy. But this accuracy is dependent on its design and programming. If programming error occurs then result will also be affected by that.
3) No IQ: It is not a magical device and can perform only those tasks for which it is programmed or designed. But if it is designed with high class design then it can perform task with unthinkable speed and accuracy
Bus (Computing)
CPU is connected to I/O and devices and memory by a group of lines these lines are called as Buses. There are three types of buses that are used in computer system.
1) Address Bus: This Bus carries the Address of I/O device or Memory that CPU wants to access. Address bus can be 8 bit, 16 bit or more. A system with n address lines can reference 2n address locations. This bus is a unidirectional bus and is also called A-Bus.
2) Data Bus: This bus is used to transfer data between Memory, processor and I/O devices. This bus is a bidirectional bus and is also called as D-Bus.
How to Use Change Text Case in Office 2010 ?
Friday, 19 April 2013
Direct Memory Access (DMA)
Data transfer between I/O devices and memory is slow due to the speed mismatch in their speeds. This is avoided by removing the CPU from the path and letting the peripheral device manage the memory buses directly. This “data transfer between I/O device and memory without the involvement of CPU is called Direct Memory Access or DMA”.
In this type of data transfer CPU remains free for another processes and has no control of the memory buses. In DMA CPU make use of two control signals i.e. Bus Request (BR) and Bus Grant (BG). BR signal is used by the DMA controller to request the CPU for the control of buses. When this signal is active, CPU terminate the current execution of instruction and places data bus, address bus, and read and write lines into high impedance state. This high impedance state works like open circuit and output is disconnected.BG Signal is used by the CPU to inform that all buses are now in high impedance state and the DMA controller can take the control of buses.
Thursday, 18 April 2013
Cache Memory
It is the smallest and the fastest memory which stores copies of data from most frequently used main memory locations. It is very near to Processor or even in the Processor. The main idea behind the use of Cache memory is to reduce average time to access memory. Its speed approaches to the speed of CPU components.
Operation: -Whenever CPU wants to access the main memory, it first looks the Cache Memory. If the word is found in the Cache then it is read from there. But if the word is not found in Cache it is read from the main memory. Block of word that is read from main memory is transferred to cache memory .Only those words are kept in Cache that are most frequently used.
Pipelining
It is the Process in which sequential task is decomposed into sub operations. Each sub operation is executed in a special dedicated segment which is concurrently operates with all other segments. In Pipelining result obtained from one segment is transferred to next segment of the Pipeline. To get the final result the data is passed through all segments. This Process looks like the flow of data in pipes hence named Pipelining. In Pipelining several segments performs several computations at the same time. The overlapping of computation is made possible by associating a register with each segment. Isolation between each segment is provided by the registers so that each can operate on distinct data simultaneously.
Let we want to calculate A*B +C * D. To Perform Arithmetic Operation of A*B +C * D
A and B are kept in Different Registers and then Multiplied with the help of Multiplier. Similarly C and D are kept in Two Other registers and are multiplied with the help of Multiplier. The Result of A * B and C * D is then transferred to the Adder to obtain the Final result.
A and B are kept in Different Registers and then Multiplied with the help of Multiplier. Similarly C and D are kept in Two Other registers and are multiplied with the help of Multiplier. The Result of A * B and C * D is then transferred to the Adder to obtain the Final result.
Difference Between Testing and Debugging
S. No.
|
Testing
|
Debugging
|
1
|
It is a Process in which a Program is validated.
|
It is the Process in which program errors are removed.
|
2
|
It is a Positive activity that demonstrates that Program is correct and meets its design specifications.
|
It is a negative activity in which known errors or bugs are removed.
|
3
|
Testing finishes when all verifications against desired specifications have been done.
|
Debugging Finishes when all known errors are removed. |
Wednesday, 17 April 2013
Functions of Operating System
1) Process Management: - Operating System allocates resources to Processes, enable processes to share and exchange information, protect the resources of each process from other processes and enable synchronization among processes. Deadlock avoidance and recovery is also function of Operating System.
2) Input / Output Management:-Assignment of various input and output devices to one or more programs is done by the operating system.
3) Memory Management: - Allocation of main memory and secondary memory to the system programs as well as user data is done by the Operating System.
4) File Management:-How files will be transferred from one device to another and how they will be saved or accessed is managed by the Operating System
5) Determine and maintain order of Jobs: - It is the Responsibility of the Operating System to decide that jobs will be completed in which order. It decides that first preference should be given to which request and which can be delayed.
2) Input / Output Management:-Assignment of various input and output devices to one or more programs is done by the operating system.
3) Memory Management: - Allocation of main memory and secondary memory to the system programs as well as user data is done by the Operating System.
4) File Management:-How files will be transferred from one device to another and how they will be saved or accessed is managed by the Operating System
5) Determine and maintain order of Jobs: - It is the Responsibility of the Operating System to decide that jobs will be completed in which order. It decides that first preference should be given to which request and which can be delayed.
Tuesday, 16 April 2013
FSK (Frequency Shift Keying)
It is the Modulation Technique in which Amplitude and Phase of Signal are kept Constant while frequency is varies to represent binary 1 or 0.One level of frequency represents binary 1 and other represents binary 0.The main advantage of using this technique is that it is less prone to noise and sender is only concerned about the frequency and not about the amplitude.
How to Clone Disks?
Its not possible to install every machine if you want to install them in bulk in lesser time.and if you install them one by one than it is a time consuming process.Another alternate is to clone the disks.This technique is only useful when you want to install machines with same software's , same configurations.To do so one of the most popular software is Acronics True Image Home.
before performing clone install a fresh machine with all configurations and application software's or you may copy an existing machine.The main Advantage of using this software is that it is very fast.
Here are Some simple steps that are used in Acronics True Image.
STEP1-->Download and Install Acronics True Image Home from Official website of Acronics.
STEP2-->Open Acronics True Image ,click on Tools and utilities and select clone disks
before performing clone install a fresh machine with all configurations and application software's or you may copy an existing machine.The main Advantage of using this software is that it is very fast.
Here are Some simple steps that are used in Acronics True Image.
STEP1-->Download and Install Acronics True Image Home from Official website of Acronics.
STEP2-->Open Acronics True Image ,click on Tools and utilities and select clone disks
Monday, 15 April 2013
Drive not opening on double click
Many time it happens that when you open any drive of your Computer,it Does not Open Directly and gives out a choice to open with program.This Problem can be resolved by the use of a Software Called Combo fix without formatting the Hard Disk Drive.It is a free utility .(Click Here To Download).Figure given below illustrates the screen that appears to you when you double click any partition of your HDD.
Here are some simple steps to use this Software
Here are some simple steps to use this Software
Thursday, 11 April 2013
Difference Between Structure and Union
Amplitude Shift Keying (ASK)
Amplitude Shift Keying (ASK) is a Modulation technique that is used in Digital to analog Conversions. This technique uses strength of signal to represent binary 0 or 1 value.in this only amplitude changes while frequency and phase both are kept constant.it uses finite number of amplitudes, each assigned a unique pattern of binary digits that represents binary 1 or 0.
The main Disadvantage of this technique is that unwanted energy or noise from other sources may vary signal amplitude and can change original sent value. Another problem is that Transmission speed is dependent on the physical characteristics of the transmission media.
Wednesday, 10 April 2013
Network Protocols and Their Functions
Protocols
Whenever a person want to talk with another person then their communicating language should be same so that they can easily communicate with each other .If they will use different languages then they can not understand what the other is saying. Similarly in Computer Networks certain rules are defined so that computers can communicate with one another.These Pre defined rules are called Protocols and can be defined as "Protocols are the predefined rules between the communicating devices that govern the communication between them."Functions Of Protocols
i) Sequencing of Data:- Protocols split large size messages to equal size pieces called Packets which can be transmitted easily.each packet contains unique identification number and can be easily arranged at receiver end to create original message.
ii) Flow Control of Data:-This is another important function of protocols.if sender is sending continuously data and receiver is not in a condition to receive that data or having less receiving speed then their are the chances of data loss.This data loss is avoided by the use of Protocols.
Problems Associated with Wired Media
Attenuation
With The increase in the distance the energy of signal decreases.This energy loss is called Attenuation.This Energy loss is due to the Resistance of the Transmission wire which gets warm when signals are passed through them.This energy loss is Frequency Dependent.To re-boost these weak signals amplifiers are used and signal can travel long distance.Tuesday, 9 April 2013
Monday, 8 April 2013
Open Suse 12.2 Installation Step by Step
1) Minimum Hardware Requirements
When you’re ready, insert the DVD and (re)start the computer. Live CD/USB installation is described below
The first thing you’ll see is this welcome screen.
- CPU: Pentium III 500 MHz or higher processor (Pentium 4 2.4 GHz or higher or any AMD64 or Intel64 processor recommended)
- RAM: 1 GB physical RAM (2 GB recommended)
- Disk Space: 5.0 GB for a normal installation (more recommended)
- Sound and Graphics Card: Most modern cards are supported
When you’re ready, insert the DVD and (re)start the computer. Live CD/USB installation is described below
The first thing you’ll see is this welcome screen.
How to use ntbackup Utility in Windows to Generate Backup
Sunday, 7 April 2013
How to use ntbackup Utility in Windows to Generate Backup
Thursday, 4 April 2013
How to Test Earthing Using Digital Multimeter
Some time when you touch your monitor or CPU at home it gives you Electrical shock like feeling or even full Electrical shock. The Reason behind this is that most of the houses are not earthed.
Here are some simple steps to test Earthing in your home or at any organization->
Step1-->Set Your Digital Multimeter to AC testing Mode and set Max. Voltage to 750V
Step2-->Identify the Phase Earth and Neutral Pins. Generally Phase is always on right hand side and neutral on left hand side. The Description is shown in below given image.
Step2-->Identify the Phase Earth and Neutral Pins. Generally Phase is always on right hand side and neutral on left hand side. The Description is shown in below given image.
Difference Between malloc and alloc Functions
Characteristics
|
malloc( )
|
calloc( )
|
Arguments
| malloc() takes only single argument which is amount of memory to allocate in bytes. | calloc() needs two arguments i.e. No. of variables to allocate in memory, and the size of single variable in bytes. |
Memory Initialization
| malloc() does not initialize the allocated memory .
| calloc() initializes the allocated memory to zero
|
Difference Between Static and Dynamic Memory Allocation
Characteristics
|
Static Memory Allocation
|
Dynamic Memory Allocation
|
Definition
|
It is Memory Allocation Technique in which Memory is allocated at compile-time before the associated program is executed.
|
It is the memory allocation Technique in Which memory is allocated as required at run-time.
|
lifetime of allocated memory
|
Static-duration variables are allocated in main memory, along with the executable code of the program, and persist for the lifetime of the program whether it is needed or not.
|
In Dynamic Memory Allocation allocated from the large pool of memory, which is called heap. In C, the library function malloc is used to |
Subscribe to:
Posts (Atom)