Tuesday 30 August 2016

Download Free Online Games and Install into your Device

Download and Install with Low Size Capacity (KB) and Play over 3000 free online games! Including Action games,arcade games, puzzle games, funny games, sports games, shooting games, and more!

Click below to start Select you game Category and Download  
http://www.gametop.com/

Do you Charge your SmartPhone Over Night? Here's why you shouldn't charge your smartphone overnight


Chances are, you plug in your phone before you go to bed at night, thinking it's best to greet the morning with a fully charged device. Is this a good idea? That depends. Here's the thing.

Many people don't expect to keep their phones for much longer than two years. For the most part, experts say, those people are not going to notice much damage to their phone batteries before they start hankering for a new device.

If that sounds like you, feel free to charge every night, and as often as you like in between.

But frequent charging takes a toll on the lithium-ion batteries in our phones. And it's not because they can be overcharged, said Edo Campos, a spokesman for Anker, which produces phone chargers. "Smartphones are, in fact, smart," Campos said. "They know when to stop charging."

Android phones and iPhones are equipped with chips that protect them from absorbing excess electrical current once they are fully charged. So in theory, any damage from charging your phone overnight with an official charger, or a trustworthy off-brand charger, should be negligible. But the act of charging is itself bad for your phone's battery.

How to FIX "WhatsApp is Denied to Read Contacts"


A friend of me personally known telling me that his WhatsApp cant read his contacts, at first i thought that his contacts was hidden from his phonebook but i find out that its OK, i also check “Show hidden contacts” in WhatsApp but that didn’t work out and i just re-install it still nothing change, then i finally apply the below tips and it work perfectly. 


This means WhatsApp is not enabled on your Phone`s contacts privacy. You simply need to enable it to remove that error.

 1. Open your settings.
 2. Tap Privacy.
 3. Select Contacts.
 4. Turn on Whatsapp. 



Monday 29 August 2016

Do you Want to Make your Video Clip as a Profile Picture on Facebook? Very Easy,..

 Watch this Videos For Easy Way.....




Here’s how to set up yours:
  1. Open up your Facebook app on iOS.
  2. Go to your profile page and tap your profile picture.
  3. Select “Take a New Profile Video” or “Upload Video or Photo.” If you don’t see those options, the update hasn’t rolled out to you yet and will say “Coming Soon.”
  4. Select or record your video (the length is limited to seven seconds). 


    Sunday 28 August 2016

    CMD Tutorials........A-Z Index of the Windows CMD command line

    List of DOS commands;

    Command Prompt is a command line interpreter application available in most Windows operating systems.
    Command Prompt is used to execute entered commands. Most of those commands are used to automate tasks via scripts and batch files, perform advanced administrative functions, and troubleshoot and solve certain kinds of Windows issues.
    Command Prompt is officially called Windows Command Processor but is also sometimes called the command shell or by its filename cmd.exe.
    Note: Command Prompt is sometimes incorrectly referred to as "the DOS prompt" or as MS-DOS itself. Command Prompt is a Windows program that emulates many of the command line abilities available in MS-DOS but it is not actually MS-DOS.

    How To Access Command Prompt

    Command Prompt can be accessed via the Command Prompt shortcut located in the Start Menu or on the Apps screen, depending on what version of Windows you have.


     ADDUSERS Add or list users to/from a CSV file
    ADmodcmd Active Directory Bulk Modify
    ARP Address Resolution Protocol
    ASSOC Change file extension associations•
    ASSOCIAT One step file association
    AT Schedule a command to run at a specific time
    ATTRIB Change file attributes
    b
    BCDBOOT Create or repair a system partition
    BCDEDIT Manage Boot Configuration Data
    BITSADMIN Background Intelligent Transfer Service
    BOOTCFG Edit Windows boot settings
    BROWSTAT Get domain, browser and PDC info
    c
    CACLS Change file permissions
    CALL Call one batch program from another•
    CERTREQ Request certificate from a certification authority
    CERTUTIL Utility for certification authority (CA) files and services
    CD Change Directory - move to a specific Folder•
    CHANGE Change Terminal Server Session properties
    CHKDSK Check Disk - check and repair disk problems
    CHKNTFS Check the NTFS file system
    CHOICE Accept keyboard input to a batch file
    CIPHER Encrypt or Decrypt files/folders
    CleanMgr Automated cleanup of Temp files, recycle bin
    CLIP Copy STDIN to the Windows clipboard
    CLS Clear the screen•
    CMD Start a new CMD shell
    CMDKEY Manage stored usernames/passwords
    COLOR Change colors of the CMD window•
    COMP Compare the contents of two files or sets of files
    COMPACT Compress files or folders on an NTFS partition
    COMPRESS Compress one or more files
    CONVERT Convert a FAT drive to NTFS
    COPY Copy one or more files to another location•
    Coreinfo Show the mapping between logical & physical processors
    CSCcmd Client-side caching (Offline Files)
    CSVDE Import or Export Active Directory data
    d
    DATE Display or set the date•
    DEFRAG Defragment hard drive
    DEL Delete one or more files•
    DELPROF Delete user profiles
    DELTREE Delete a folder and all subfolders
    DevCon Device Manager Command Line Utility
    DIR Display a list of files and folders•
    DIRQUOTA File Server Resource Manager Disk quotas
    DIRUSE Display disk usage
    DISKPART Disk Administration
    DISKSHADOW Volume Shadow Copy Service
    DISKUSE Show the space used in folders
    DOSKEY Edit command line, recall commands, and create macros
    DriverQuery Display installed device drivers
    DSACLs Active Directory ACLs
    DSAdd Add items to active directory (user group computer)
    DSGet View items in active directory (user group computer)
    DSQuery Search for items in active directory (user group computer)
    DSMod Modify items in active directory (user group computer)
    DSMove Move an Active directory Object
    DSRM Remove items from Active Directory
    Dsmgmt Directory Service Management
    e
    ECHO Display message on screen•
    ENDLOCAL End localisation of environment changes in a batch file•
    ERASE Delete one or more files•
    EVENTCREATE Add a message to the Windows event log
    EXIT Quit the current script/routine and set an errorlevel•
    EXPAND Uncompress CAB files
    EXPLORER Open Windows Explorer
    EXTRACT Uncompress CAB files
    f
    FC Compare two files
    FIND Search for a text string in a file
    FINDSTR Search for strings in files
    FOR /F Loop command: against a set of files•
    FOR /F Loop command: against the results of another command•
    FOR Loop command: all options Files, Directory, List•
    FORFILES Batch process multiple files
    FORMAT Format a disk
    FREEDISK Check free disk space
    FSUTIL File and Volume utilities
    FTP File Transfer Protocol
    FTYPE File extension file type associations•
    g
    GETMAC Display the Media Access Control (MAC) address
    GOTO Direct a batch program to jump to a labelled line•
    GPRESULT Display Resultant Set of Policy information
    GPUPDATE Update Group Policy settings
    h
    HELP Online Help
    HOSTNAME Display the host name of the computer
    i
    iCACLS Change file and folder permissions
    IEXPRESS Create a self extracting ZIP file archive
    IF Conditionally perform a command•
    IFMEMBER Is the current user a member of a group
    IPCONFIG Configure IP
    INUSE Replace files that are in use by the OS
    l
    LABEL Edit a disk label
    LODCTR Load PerfMon performance counters
    LOGMAN Manage Performance Monitor logs
    LOGOFF Log a user off
    LOGTIME Log the date and time in a file
    m
    MAKECAB Create .CAB files
    MAPISEND Send email from the command line
    MBSAcli Baseline Security Analyzer
    MEM Display memory usage
    MD Create new folders•
    MKLINK Create a symbolic link (linkd) •
    MODE Configure a system device COM/LPT/CON
    MORE Display output, one screen at a time
    MOUNTVOL Manage a volume mount point
    MOVE Move files from one folder to another•
    MOVEUSER Move a user from one domain to another
    MSG Send a message
    MSIEXEC Microsoft Windows Installer
    MSINFO32 System Information
    MSTSC Terminal Server Connection (Remote Desktop Protocol)
    n
    NET Manage network resources
    NETDOM Domain Manager
    NETSH Configure Network Interfaces, Windows Firewall & Remote access
    NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
    NETSTAT Display networking statistics (TCP/IP)
    NLSINFO Display locale information (reskit).
    NLTEST Network Location Test (AD)
    NOW Display the current Date and Time
    NSLOOKUP Name server lookup
    NTBACKUP Backup folders to tape
    NTDSUtil Active Directory Domain Services management
    NTRIGHTS Edit user account rights
    NVSPBIND Modify network bindings
    o
    OPENFILES Query or display open files
    p
    PATH Display or set a search path for executable files•
    PATHPING Trace route plus network latency and packet loss
    PAUSE Suspend processing of a batch file and display a message•
    PERMS Show permissions for a user
    PERFMON Performance Monitor
    PING Test a network connection
    POPD Return to a previous directory saved by PUSHD•
    PORTQRY Display the status of ports and services
    POWERCFG Configure power settings
    PRINT Print a text file
    PRINTBRM Print queue Backup/Recovery
    PRNCNFG Configure or rename a printer
    PRNMNGR Add, delete, list printers and printer connections
    ProcDump Monitor an application for CPU spikes
    PROMPT Change the command prompt•
    PsExec Execute process remotely
    PsFile Show files opened remotely
    PsGetSid Display the SID of a computer or a user
    PsInfo List information about a system
    PsKill Kill processes by name or process ID
    PsList List detailed information about processes
    PsLoggedOn Who's logged on (locally or via resource sharing)
    PsLogList Event log records
    PsPasswd Change account password
    PsPing Measure network performance
    PsService View and control services
    PsShutdown Shutdown or reboot a computer
    PsSuspend Suspend processes
    PUSHD Save and then change the current directory•
    q
    QGREP Search file(s) for lines that match a given pattern
    Query Process / QPROCESS Display processes
    Query Session / QWinsta Display all sessions (TS/Remote Desktop)
    Query TermServer /QAppSrv List all servers (TS/Remote Desktop)
    Query User / QUSER Display user sessions (TS/Remote Desktop)
    r
    RASDIAL Manage RAS connections
    RASPHONE Manage RAS connections
    RECOVER Recover a damaged file from a defective disk
    REG Registry: Read, Set, Export, Delete keys and values
    REGEDIT Import or export registry settings
    REGSVR32 Register or unregister a DLL
    REGINI Change Registry Permissions
    REM Record comments (remarks) in a batch file•
    REN Rename a file or files•
    REPLACE Replace or update one file with another
    Reset Session Delete a Remote Desktop Session
    RD Delete folder(s)•
    RMTSHARE Share a folder or a printer
    ROBOCOPY Robust File and Folder Copy
    ROUTE Manipulate network routing tables
    RUN Start | RUN commands
    RUNAS Execute a program under a different user account
    RUNDLL32 Run a DLL command (add/remove print connections)

    s
    SC Service Control
    SCHTASKS Schedule a command to run at a specific time
    SET Display, set, or remove session environment variables•
    SETLOCAL Control the visibility of environment variables•
    SetSPN Edit Service Principal Names
    SETX Set environment variables
    SFC System File Checker
    SHARE List or edit a file share or print share
    ShellRunAs Run a command under a different user account
    SHIFT Shift the position of batch file parameters•
    SHORTCUT Create a windows shortcut (.LNK file)
    SHUTDOWN Shutdown the computer
    SLEEP Wait for x seconds
    SLMGR Software Licensing Management (Vista/2008)
    SORT Sort input
    START Start a program, command or batch file•
    STRINGS Search for ANSI and UNICODE strings in binary files
    SUBINACL Edit file and folder Permissions, Ownership and Domain
    SUBST Associate a path with a drive letter
    SYSMON Monitor and log system activity to the Windows event log
    SYSTEMINFO List system configuration
    t
    TAKEOWN Take ownership of a file
    TASKLIST List running applications and services
    TASKKILL End a running process
    TELNET Communicate with another host using the TELNET protocol
    TIME Display or set the system time•
    TIMEOUT Delay processing of a batch file
    TITLE Set the window title for a CMD.EXE session•
    TLIST Task list with full path
    TOUCH Change file timestamps
    TRACERT Trace route to a remote host
    TREE Graphical display of folder structure
    TSDISCON Disconnect a Remote Desktop Session
    TSKILL End a running process
    TSSHUTDN Remotely shut down or reboot a terminal server
    TYPE Display the contents of a text file•
    TypePerf Write performance data to a log file
    TZUTIL Time Zone Utility
    v
    VER Display version information•
    VERIFY Verify that files have been saved•
    VOL Display a disk label•
    w
    W32TM Time Service
    WAITFOR Wait for or send a signal
    WEVTUTIL Clear event logs, enable/disable/query logs
    WHERE Locate and display files in a directory tree
    WHOAMI Output the current UserName and domain
    WINDIFF Compare the contents of two files or sets of files
    WINRM Windows Remote Management
    WINRS Windows Remote Shell
    WMIC WMI Commands
    WUAUCLT Windows Update
    x
    XCACLS Change file and folder permissions
    XCOPY Copy files and folders
    :: Comment / Remark•

    How to FIX Laptop Cursor won't move/Stuck

    Press and hold the "Fn" key on the laptop keyboard; on most laptops, it is located between the "Ctrl" and "Alt" keys. Press the "F9" key once, then release the "Fn" key. This keyboard shortcut is used to disable or enable the touchpad software. Test the mouse touchpad to see if the cursor responds.

    Saturday 27 August 2016

    How to Configure Router/ Set Up Router



    A router is hardware device designed to receive, analyze and move incoming packets to another network. It may also be used to convert the packets to another network interface, drop them, and perform other actions relating to a network. The picture shows the Linksys BEFSR11 wireless router and is what many home routers resemble.

    A router has a lot more capabilities than other network devices, such as a hub or a switch that are only able to perform basic network functions. For example, a hub is often used to transfer data between computers or network devices, but does not analyze or do anything with the data it is transferring. By contrast, routers can analyze the data being sent over a network, change how it is packaged, and send it to another network or over a different network. For example, routers are commonly used in home networks to share a single Internet connection between multiple computers.


    What's the Different between Router and Modem?

    Friday 26 August 2016


    EVOLUTION OF COMPUTERS

    What is Computer? A Computer is a Device which can perform Arithmetic and Logic operations according to the given set of instructions. Modern Computers are generally electronic, earlier they were Mechanical and later Electro-mechanical. Let’s take a look at the journey of a computer from a mechanical abacus to present day ultra fast computers.

    The First Computer

    Around 3000 B.C. The Mesopotamians unknowingly laid the foundation of computer era. They invented the earliest form of Bead-&-Wire counting machine known as Abacus. The Chinese improved above the Abacus so that they can calculate fast.
    Evolution of Computers _ 1
    Aztec version of an abacus, circa 900-1000 A.D., is made from maize (corn) threaded through strings mounted in a wooden frame. There are Japanese and Russian versions of the abacus and several modern “improved” versions.

    Napier ‘Logs’ & ‘Bones’

    John Napier (1550-1617) developed the idea of logarithms. He used logs to transform multiplication problem to addition problem. Napier’s logs later became the basis for a well-known invention, The Computation Machine Known as Slide-Rule (Invented in 1662) Napier also devices set of numbering rods known as ‘Napier’s Bones’. He could perform both multiplication and division using these ‘Bones’.
    Evolution of Computers _ 2.5

    Pascal’s adding Machine

    Blaise Pascal, a French Mathematician, invented a Machine in 1662 made up of gears which was used for adding numbers quickly. This machine was known as Adding Machine (also known as Pascaline) and was capable of addition and subtraction. In worked on clockwork mechanism principle. The Adding Machine consisted of numerous toothed wheels having unique position value. The rotation wheels controlled the Addition and Subtraction operation. This Machine was capable carry-transfer automatically.
    Evolution of Computers _ 4

    Leibnitz Calculator

    Gottfried Leibnitz a German Mathematician, improved the adding Machine and constructed a new machine in 1671 that was able to perform multiplication and division as well. This Machine performed multiplication through repeated addition of numbers. Leibnitz’s machine used stepped cylinder each with nine teeth of varying lengths instead of wheels as was used by Pascal.
    Evolution of Computers _ 5

    Jacquard’s Loom

    Joseph Jacquard manufactured punched cards at the end of American Revolution and used them to control looms in 1801. Thus the entire control weaving process was automatic. The entire operation was under a program’s control. With the historic invention of punched cards, the era of Storing and Retrieving information started that greatly influenced the later invention and advancements. (see Hollerith’s Machine below)

    Babbage’s Difference Engine

    Charles Babbage, a professor of mathematics, developed a machine called Difference engine in the year 1882. This machine was expected to calculate logarithmic tables to high degree of precision. The difference engine was made to calculate various mathematical functions. The machine was capable of polynomial evolution by finite difference and its operation was automatic multi stop operation.
     Evolution of Computers _ 6

    Babbage’s Analytical Engine

    In 1833, Charles Babbage started designing an analytical engine which was to become a real ancestor of modern day computer. With the methodical design of his analytical engine, Babbage meticulously established the basic principles on which today’s computer work. The Analytical Engine was capable to perform all four arithmetic operation as well as comparison, it had a number of features starting to those which are in today’s computer. He included the concept of central processor, Memory, Storage Area and Input/output Devices in his design. The Two revolutionary innovation incorporated in analytical Engine where comparisons and modifications of stored information. The first innovation enabled the machine to compare quantities and then decide which of the Instruction sequence to be followed. The second permitted the result of calculation to change numbers and instructions already stored in machine. Owing to the lack of technology of the time, the Analytical engine was never built. Its Design remained conceptual. His great inventions of Difference Engine and Analytical Engine earned Charles Babbage the title “FATHER OF MODERN COMPUTERS”-a fitting Tribute to him.
    Evolution of Computers _ 7

    Hollerith’s Machine

    In 1887, an American named Herman Hollerith (1869-1926) fabricated what was dreamt of by Charles Babbage. He fabricated the first electro-mechanical Punched-card tabulator that used punched-cards for input, output and instructions. This machine was used by American department of census to compile their 1880 census data and were able to complete compilation in 3 years which earlier used to take around 10 years.
    Evolution of Computers _ 8

    MARK-I

    Professor Howard Aiken (1900-1973) in U.S constructed in 1943 an electromechanical computer named “MARK-I” which could multiply two 10 digit numbers in 5 second-a record at that time. MARK-I was the first machine which could perform according to pre-programed instructions automatically without any manual interface. This was the first operational general purpose computer.
     Evolution of Computers _ 9

    MODERN COMPUTERS

    The term “Computer generation” is often used in relation to the hardware of computers. Each phase of computer development is known as a separate generation of computer. Each phase of development is characterized by type of switching circuits it utilizes.
    Most computers today use the idea of “Stored Program Computer” that was proposed by Professor John Von Neumann in 1945. The von Neumann architecture is based on three key concepts:-
    1)      Data and instructions (program) are stored in single read-write memory.
    2)      The memory contents are addressable by locations.
    3)      Execution takes place in sequential fashion i.e.: from one instruction to the next unless modified explicitly.

    THE FIRST GENERATION COMPUTERS

    The first generation computers used the thermionic valves (vacuum tubes) and machine language was used for giving instructions. The first generation computers used the concept of “Stored program” The computers of this generations were very large in size and their programming was a difficult task. Here are some examples:-

    ENIAC

    This was the first electronic computer developed in 1946 by a team lead by Professor Eckert and Mauchly at the University of Pennsylvania in U.S.A. This computer was called Electronic Numerical Integrator And Calculator (ENIAC), which used high speed vacuum tube switching devices. It had a very small memory and it was used for calculating the trajectories of missiles. It took 200 microseconds for addition and about 2800 microseconds for multiplications for multiplication. The giant machine was 30×50 feet long and weighed about 30 tons, contained 18,000 vacuum tubes, 70,000 resistors, 10,000 capacitors, 6000 switches, used 150,000 watts of electricity and costs $400,000. When ENIAC was built, it was 5000 times faster than the closest competitor The Howard MARK-I.
    Evolution of Computers _ 10

    EDVAC

    The Binary Arithmetic was used in the construction of computer called the Electronic Discrete Variable Automatic Computer (EDVAC), completed in 1950. The Von Neumann concept of “stored program” was also applied in EDVAC. With this, the operation become faster since the computer can rapidly access both the program and data.
     Evolution of Computers _ 11

    EDSAC

    The EDSAC, short for Electronic Delay Storage Automatic Computer was built by Professor M.V.Wilkes at Cambridge University in 1949 and used mercury delayed lines for storage. It also used the Von Neumann concept of “Stored Program”. This allowed easy implementation of program loops.
    Evolution of Computers _ 12

    UNIVAC-I

    Commercial production of stored program electronic computer began in early 50’s. One such computer was UNIVAC-I built by UNIVAC division of Remington Rand and delivered in 1951. This computer also used vacuum tubes. UNIVAC stands for (Universal Automatic Computers).
     Evolution of Computers _ 13
    Initial application of computers those days were in science and engineering but with the advent of UNIVAC-I, the prospects of commercial applications were perceived.
    Though the first generation computers were welcomed by the government and Universities as they greatly helped them in these tasks, however, the first generation computers suffered from great limitations like slow speed, restricted computing capacity, high power consumption, short mean time between failures, large size and limited programming capabilities.
    Further Researches are done to remove these limitations and the Second Generation computers developed.

    THE SECOND GENERATION COMPUTERS

    The revolution in electronics too place with the invention of “Transistors” by Bardeen, Brattain and Shockley in 1946. Transistors were highly reliable as compared to Tubes. They occupied very less space and required only 1/10th of the power required by the tubes and they were 10 times cheaper than Tubes.
    Another Major event was the invention of Magnetic cores for storage. These were tiny ferrite rings (0.02 inch diameter) that could be magnetized either clockwise or anticlockwise direction. The two direction represented 0 and 1. Magnetic cores were used to create large Random Access Memories (RAM).
    The second generation computers began with the advent of transistorized circuitry, invention of magnetic cores and development of magnetic disk storage devices. These new development made the computers much more reliable.
    The increased reliability and availability of large memories paved the way for the development of HLLs (High Level Languages) such as FORTRAN, COBOL, ALGOL, SNOBOL etc. With speedy CPUs and advent of magnetic tape and disk storage, Operating systems came into being. Batch operating system rules the Second Generation Computers.
    Commercial applications rapidly developed during this period and more than 80% of these computers were used in Business and industries in the application like Payroll, Inventory control, Marketing, Production, planning etc.
    Here are some Second Generation Computers:-

    IBM 1401

     Evolution of Computers _ 14

    IBM 7094

    Evolution of Computers _ 15
    It is a Small-Medium sized computer

    RCA 501

    Evolution of Computers _ 16
    It is a Medium sized computer, you can see magnetic tapes were used to store data.

    UNIVAC 1108

    Evolution of Computers _ 17
    It is a large sized computer which occupies a large room, it was the fastest at that time, it uses a CRT screen for display and Magnetic tape to store programs.

    THE THIRD GENERATION COMPUTERS

    The third generation computers replaces transistors with integrated circuits popularly known as “Chips”. The Integrated Circuit or IC was invented by Jack Kilby at Texas instruments 1958.
    An IC is a wafer of thin slice of extremely purified silicon crystals. A single IC has many transistors, resistors and capacitors along with the associated circuitry encapsulated in a small capsule with many leads.
    Frim Small Scale Integrated Circuits (SSI) which had about 10 transistors per chip, technology to Medium Scale Integrated circuits (MSI) with about 100 transistors per chip. The size of main memory reached about 4 Mega Bytes. Magnetic disk technology also developed and become feasible to have drive having capacity up to 100 MBs. The CPUs become much more powerful with the capacity of carrying out 1 million instructions per second (MIPS).
    The third generation computers using integrated circuits proved to be highly reliable, relatively inexpensive and faster. Less human labour was required at assembly stage. Examples of some main- frame computers developed during this generation are:-
    IBM 360 series, IBM 370/168,  ICL 1900 series, ICL 2900, Honeywell Model 316, Honeywell 6000 series.

    IBM 360

    Evolution of Computers _ 18

    A Honeywell 6000 Series Computer

    Evolution of Computers _ 19
    Some mini computers during this phase are ICL-2903 manufactured by International Computers Limited. CDC 1700 manufactured by Control Data Corporations. And PDP-11/45 (Personal data processor 11/45)
    Computers these days found place in other areas also like education, survey, small business, estimation, analysis etc along with their previous are interest Engineering and Scientific.

    THE FORTH GENERATION COMPUTERS

    The advent of microprocessor chip marked the beginning of fourth generation computers. Medium scale integrated circuits (MSI) yielded to Large and vary large scale integrated circuits (VLSI) packing about 50000 transistors in a chip. Semiconductor memories replaced magnetic core memories. The emergence of the Microprocessor (CPU on a single chip) led to the emergence of an Extremely powerful Personal Computer. Computer costs came down so rapidly that these found places at most offices and then homes. The faster accessing and processing speeds and increased memory capacity helped in development of much more powerful Operating Systems.
    The second decade (around 1985) of fourth generation observed a great increase in the speed of microprocessor and size of main memory. The speed of microprocessor and speed of main memory and Hard Disk went up by a factor 4 every 3 years. Most of the Main-Frame CPU features became part of Microprocessor architecture in 90s.
    In 1995, the most popular CPU was Pentium, Power PC etc. Also RISC (Reduced Instruction Set Computer) microprocessor are preferred in powerful servers for numeric computing and file services.
    The Hard disks are also available of the sizes up to 80 Giga Bytes. For large Disks Redundant Array of Independent Disks (RAID) Technology gives storage up to hundreds of GBs. The CD-ROM (Compact Disks- read Only Memory) becoming popular day by day.
    The computer network came of age and are one of the most popular ways of interacting with computer chains of million users. The computers are being applied in various areas like simulation, visualization, parallel computing, virtual reality, multimedia etc.
    In this generation Micro Computers of Apple and IBM developed, Portable computers came into existence.

    World’s First Portable Computer by IBM (The IBM 5100)(September 1975)

      Evolution of Computers _ 20

    TOSHIBA T 1100

    Evolution of Computers _ 21

    THE FIFTH GENERATION COMPUTERS

    The fifth generation computing devices are based on artificial intelligence and are still in development, though there are features like voice recognition, face recognition, finger print recognition, gesture recognition etc. are being used today. Applications like 6th sense technology are still in development. The use of parallel processing and superconductor is helping to make artificial intelligence a reality. Quantum computation and nanotechnology will radically changing the face of computers in years. The goal of fifth generation computing is to develop devices hat respond to natural language input and are capable of learning and self-organization. The key developments of fifth generation computers are summed up as :- ULSI (Ultra Large Scale Integrations), scalable parallel computers, workstation clusters, Intranet, Internet, WWW, Micro-kernels, Portable software and hardware platforms etc.
    The most noticeable characteristic of 5th gen computers is the ability to apply previously gained knowledge, draw conclusions and then execute a task, The computer in short simulate the human ability in reason.
    Computers will have to be able to classify information, search large database rapidly. Input devices become highly advanced.
     Evolution of Computers _ 22
    Every gadget you see today is a 5th generation computer ie:- Your Laptops, Mobile phones, Tablets, Videogame consoles, Smart watches, Digital cameras and even some High-Tech pens. The fifth generation computers have Huge memories which ranges in Terabytes and even more. Secondary storage devices are becoming denser, earlier a compact disk (CD) was able to store about 100-200 MBs, now DVDs(Digital Versatile Disks) and Blu-Ray Disks of same size Stores data about 4 GB to 17 GB and some can store even 50 GB to 100 GB. With the developing technology HVDs(Holographic Versatile Disk) can store data up to 6 Terabytes.
     Evolution of Computers _ 23
    DELL XPS Convertible PC
     Evolution of Computers _ 24
    MacBook Air
     Evolution of Computers _ 25
    Video Game Consoles
    Evolution of Computers _ 26

    Some Historical Quotes on Computers:-
    “I think there is a world market for maybe 5 computers”
    -Thomas Watson, IBM, 1943

    “It would appear that we have reached the limits of what it is possible to achieve with computer technology, although one should be careful with such statements as they tend to sound pretty silly in 5 years”
    -John Von Neumann, 1949.

    “Computers in future may not weight more than 1.5 ton”
    -Popular mechanics, 1949

    “There is no reason anyone would want a computer in their home”
    -Ken Olsen, DEC, 1977

    Friday 12 August 2016

    How to share internet from usb modem to Local area connection AND How to Share USB modem internet connection into your router


















    If you're trying to share your internet connection with multiple devices at your house, you may be wondering how to do it without complicated networking. Luckily, your Windows or Mac computer can easily share its internet connection with the rest of the network. You can even turn your computer into a wireless access point so you don't need a router to connect your wireless devices.



    HOW TO: Share internet from usb modem to Local area connection





    HOW TO: Share USB modem internet connection into your router 

     

    Devices used in wireless communication and their functions

    Wireless Communication Technologies Types and Advantages:

    The term wireless refers to the communication or transmission of information over a distance without requiring wires, cables or any other electrical conductors. Wireless communication is one of the important mediums of transmission of data or information to other devices. The Communication is set and the information is transmitted through the air, without requiring any cables, by using electromagnetic waves like radio frequencies, infrared, satellite, etc., in a wireless communication technology network.

    At the end of the 19th century, the first wireless communication systems were introduced and the technology has significantly been developed over the intervening and subsequent years. Today, the term wireless refers to a variety of devices and technologies ranging from smart phones to laptops, tabs, computers, printers, Bluetooth, etc.

    Types of Wireless Communication Technologies

    In recent days, the wireless communication technology has become an integral part of several types of communication devices as it allows users to communicate even from remote areas. The devices used for wireless communication are cordless telephones, mobiles, GPS units, ZigBee technology, wireless computer parts, and satellite television, etc.
    Types of Communication Technologies
    Types of Communication Technologies
    Satellite
    Satellite communication is one of the wireless technologies, which is widely spread all over the world allowing users to stay connected virtually anywhere on the Earth. The Satellites used in this mode of communication, communicate directly with the orbiting satellites via radio signals. Portable satellite phones and modems have more powerful broadcasting abilities than the cellular devices as they have high range, apart from being more expensive in terms of cost, than their counterparts.
    For example, for outfitting a ship through satellite communication, a traditional communication system is linked to a single satellite, which allows multiple users to share the same broadcast equipment.
    Wireless Networking
    Wireless Networking technologies connect multiple computers, systems and devices together without requiring wires or cables: a wireless local area network or WLAN comes under Wi-Fi.
    WiMAX
    There are wireless broadband systems that offer fast Web surfing without being getting connected through cable or DSL (Example of wireless broadband is WiMAX). Although WiMAX can potentially deliver data rates of more than 30 Megabits per second, yet the providers offer average 0 data rates of 6 Mbps and often deliver less, making the service significantly slower than the hard-wired broadband. The actual cost of the data available using WiMAX widely varies with the distance from the transmitter. WiMAX is also one of the versions of 4G wireless available in phones as Sprint’s 4G technology.
    WiMAX
    Wireless Networking
    Wi-Fi
    Wi-Fi is a form of low-power wireless communication used by many electronic devices such as laptops, systems, smart phones, etc. In a Wi-Fi setup, a wireless router serves as the communication hub. These networks are extremely limited in range due to low power of transmissions allowing users to connect only within close proximity to a router or signal repeater. Wi-Fi is common in home networking applications which provides portability without any need of cables. Wi-Fi networks need to be secured with passwords for security purposes in order not to be accessed by others.
    Wi-Fi
    Wi-Fi

    Wireless Networking (Wi-Fi):

    Advantages
    • Ease of Integration and Convenience – The wireless nature of such networks allows users to access network resources from nearly any convenient location.
    • Mobility – With the emergence of public wireless networks, users can access the internet even outside their normal working environment.
    • Expandability – Wireless networks are capable of serving a suddenly-increased number of clients with the existing equipment. In a wired network, additional clients require additional wiring.
    Wireless Networking WiFI
    Wireless Networking WiFI
    Disadvantages
    • Wireless LANs may not be desirable for a number of reasons.
    • Radio Frequency transmission and wireless networking signals are subjected to a wide variety of interference including the complex propagation effects that are beyond the control of the network administrator.
    • Security Problems – Wireless networks may choose to utilize some of the various encryption technologies.
    • Range will be insufficient for a larger structure – and, in order to increase its range, repeaters or additional access points have to be purchased.
    • The speed on most wireless networks will be slower than the slowest common wired networks.
    • Installation of an infrastructure-based wireless network is a complex to set up.

    Bluetooth Technology

    Bluetooth technology allows you to connect a variety of different electronic devices wirelessly to a system for the transfer and sharing of data and this is the main function of Bluetooth. Cell phones are connected to hands-free earpieces, wireless keyboard, mouse and mike to laptops with the help of Bluetooth as it transmits information from one device to other device. Bluetooth technology has many functions, and it is used most commonly in wireless communications’ market.
    Bluetooth Technology
    Bluetooth Technology
    Features
    • Bluetooth technology uses radio waves to communicate between devices. Most of these radio waves have a range of 15-50 feet.
    • According to the official Bluetooth website, Bluetooth uses a low-power signal with a maximum range of 50 feet with sufficient speed to enable transmission of data.
    • The pairing process identifies and connects any two devices to each other. It also prevents interference from other non-paired Bluetooth devices in the area.
    • It uses maximum power only when it is required, thus preserving battery life.

    ZigBee

    ZigBee is a wireless communication standard designed to address the unique needs of low-power, low-cost wireless sensor, and control networks. ZigBee can be used almost anywhere, as it is easy to implement and requires little power to operate. Zigbee has been developed looking into the needs of the communication of data with a simple structure like the data from the sensors.
    Zigbee Technology
    Zigbee Technology
    Features
    • ZigBee devices are designed for low-power consumption.
    • ZigBee is used in Commercial Applications like sensing and monitoring applications.
    • ZigBee uses very low power and extremely long device battery life.
    • ZigBee gives flexibility to do more with the reliable wireless performance and battery operation.

    Types of Wireless Data Transmission

    Wireless technology defines the electronic devices that communicate in air without cables using radio frequency signals. Wireless technology is used in a variety of modern device and provides greater mobility. Wireless devices play an important role in voice and Internet communications.
    Wireless Router
    Wireless routers accepts an incoming Internet connection and sendsthe data as RF signals to other wireless devices that are near to the router. A network set up with a wireless router is called as a Wireless Local Area Network (WLAN).Many routers have built-in security features such as firewalls that help protect devices connected to the router against malicious data such as computer viruses.
    Wireless Router
    Wireless Router
    A wireless router is used in many houses to connect their computers to the Internet.
    Wireless Adapters
    Wireless adapters are hardware devices that are installed inside computers which enables wireless connectivity. If a computer does not have a wireless adapter, it will not be able to connect to a router in order to access the Internet. Some computers have wireless adapters built directly into the motherboard, while it is also possible to install stand-alone wireless adapters to add wireless capability to a computer that doesn’t have a built-in facility.
    Wireless Repeater
    A wireless repeater is a wireless networking device that is used to extend the range of a wireless router. A repeater receives wireless signals and amplifies the strength of the signals, and then re-emits them. The strength of the signal can be increased by placing a repeater between the router and the computer connected to the router.
    Wireless Repeater
    Wireless Repeater
    Microwave
    Microwave is an effective type of wireless data transmission that transfers information using two separate methods. One method which is used to transmit data through the wireless media of a microwave is the satellite method that transmits information via a satellite that orbits 22,300 miles above the Earth. Stations on the ground send and receive data signals to and from the satellite with a frequency ranging from 11 GHz to 14 GHz and with a transmission speed of 1 Mbps to 10 Mbps. Another method is a terrestrial method, in which two microwave towers with a clear line of sight between them are used ensuring no obstacles to disrupt that line of sight. For the purpose of privacy, it is used often. The frequency of data transmission for terrestrial systems is typically 4 GHz to 6 GHz or 21 GHz to 23 GHz, and the speed is usually 1 megabit per second (Mbps) to 10 Mbps.
    Infrared (IR)
    Infrared is a media transmission system that transmits data signals through light emitting diodes (LEDs) or Lasers. Infrared is an electromagnetic energy at a wavelength which is longer than that of the red light. The information cannot be travelled through obstacles in an infrared system, but can be inhibited by light. One type of infrared is the point to point system in which transmission is possible between two points limited to a range and line of sight.
    The signal frequency to transmit in a point to point system is 100 GHz to 1,000 terahertz (THz), and the speed ranges from 100 Kbps to 16 Mbps. Another method of transmission of infrared includes the broadcast system – and, in this method, a reflective material or a transmission unit amplifies and retransmits a data signal to several other units. The normal frequency of an infrared broadcast system is 100 GHz to 1,000 THz with a limited speed of 1 Mbps.
    Infrared
    Infrared

    Types of Wireless Devices

    Radio
    The radio system is one type of wireless data transmission, and it is a wireless media that transfers data by carrying electromagnetic waves with low frequencies to distant locations through an electrical conductor and an antenna. Ham radio enthusiasts share information and serve as emergency communication aids during disasters with their powerful amateur broadcasting equipment and can even communicate digital data over the radio spectrum.
    Citizen’s band and maritime radios provide communication services for truckers and sailors. The transmission frequency for information transmitted through a radio system ranges from 10 kilohertz (kHz) to 1 gigahertz (GHz), and the frequencies are regulated by the Federal Communications Commission (FCC).
    Radio
    Radio
    Wireless Phones
    The evolution of cellular networks is enumerated by generations. Many different users communicate across a single frequency band through Cellular and cordless phones. Cellular and cordless phones are two more examples of devices that make use of wireless signals.
    Cordless phones have a limited range but cell phones typically have a much larger range than the local wireless networks since cell phone use large telecommunication towers to provide cell phone coverage. Some phones make use of signals from satellites to communicate, similar to Global Positioning System (GSP) devices.
    Wireless Phones
    Wireless Phones
    Other Devices
    Anything that uses radio signals to communicate can be considered as a wireless device. Common devices such as garage door openers, baby monitors, certain video game consoles and walkie-talkies make use of wireless technology.

    Advantages and Disadvantages of Wireless Communications

    Advantages
    • Any information can be conveyed or transmitted quickly and with a high speed.
    • The Internet can be accessed from anywhere and at anytime without the need to carry cables or wires and it improves easy access and productivity.
    • Helpful for Doctors, workers and other professionals working in remote areas as they can be in touch with the medical centers through wireless communication.
    • Emergency situations can be alerted through wireless communication. The affected regions can be provided support with the help of these alerts through wireless communication.
    • Wireless networks cost less for installation and maintenance.
    Disadvantages
    • A Hacker can easily capture the wireless signals that spread through the air.
    • It is very important to secure the wireless network so that the information cannot be exploited by unauthorized users, and this also increases the risk of losing data or information.
    Thus, Wireless networks are one of the fastest growing technologies in telecommunications market. WiMax, Bluetooth, Wi-Fi, Femtocell and 4G are some of the most significant standards of Wireless technology for the next generations. Radio, Mobiles, Internet, etc., all use technological advancements in wireless data transmission systems that carry invisible electromagnetic waves to transmit data over long distances within a short amount of time. The information provided in this article will be helpful to the viewers.