Download and Install with Low Size Capacity (KB) and Play over 3000 free online games! Including Action games,arcade games, puzzle games, funny games, sports games, shooting games, and more!
Click below to start Select you game Category and Download
Tuesday, 30 August 2016
Do you Charge your SmartPhone Over Night? Here's why you shouldn't charge your smartphone overnight
Chances are, you plug in your phone before you go to bed at night, thinking it's best to greet the morning with a fully charged device. Is this a good idea? That depends. Here's the thing.
Many people don't expect to keep their phones for much longer than two years. For the most part, experts say, those people are not going to notice much damage to their phone batteries before they start hankering for a new device.
If that sounds like you, feel free to charge every night, and as often as you like in between.
But frequent charging takes a toll on the lithium-ion batteries in our phones. And it's not because they can be overcharged, said Edo Campos, a spokesman for Anker, which produces phone chargers. "Smartphones are, in fact, smart," Campos said. "They know when to stop charging."
Android phones and iPhones are equipped with chips that protect them from absorbing excess electrical current once they are fully charged. So in theory, any damage from charging your phone overnight with an official charger, or a trustworthy off-brand charger, should be negligible. But the act of charging is itself bad for your phone's battery.
Labels:
Technology
How to FIX "WhatsApp is Denied to Read Contacts"
A friend of me personally known telling me that his WhatsApp cant read his contacts, at first i thought that his contacts was hidden from his phonebook but i find out that its OK, i also check “Show hidden contacts” in WhatsApp but that didn’t work out and i just re-install it still nothing change, then i finally apply the below tips and it work perfectly.
This means WhatsApp is not enabled on your Phone`s contacts privacy. You simply need to enable it to remove that error.
This means WhatsApp is not enabled on your Phone`s contacts privacy. You simply need to enable it to remove that error.
1. Open your settings.
2. Tap Privacy.
3. Select Contacts.
4. Turn on Whatsapp.
Labels:
Tutorial
Monday, 29 August 2016
Do you Want to Make your Video Clip as a Profile Picture on Facebook? Very Easy,..
Watch this Videos For Easy Way.....
Here’s how to set up yours:
Here’s how to set up yours:
- Open up your Facebook app on iOS.
- Go to your profile page and tap your profile picture.
- Select “Take a New Profile Video” or “Upload Video or Photo.” If you don’t see those options, the update hasn’t rolled out to you yet and will say “Coming Soon.”
- Select or record your video (the length is limited to seven seconds).
Labels:
Tutorial
Sunday, 28 August 2016
CMD Tutorials........A-Z Index of the Windows CMD command line
List of DOS commands;
Command Prompt is a command line interpreter application available in most Windows operating systems.Command Prompt is used to execute entered commands. Most of those commands are used to automate tasks via scripts and batch files, perform advanced administrative functions, and troubleshoot and solve certain kinds of Windows issues.
Command Prompt is officially called Windows Command Processor but is also sometimes called the command shell or by its filename cmd.exe.
Note: Command Prompt is sometimes incorrectly referred to as "the DOS prompt" or as MS-DOS itself. Command Prompt is a Windows program that emulates many of the command line abilities available in MS-DOS but it is not actually MS-DOS.
How To Access Command Prompt
Command Prompt can be accessed via the Command Prompt shortcut located in the Start Menu or on the Apps screen, depending on what version of Windows you have.ADDUSERS Add or list users to/from a CSV file
ADmodcmd Active Directory Bulk Modify
ARP Address Resolution Protocol
ASSOC Change file extension associations•
ASSOCIAT One step file association
AT Schedule a command to run at a specific time
ATTRIB Change file attributes
b
BCDBOOT Create or repair a system partition
BCDEDIT Manage Boot Configuration Data
BITSADMIN Background Intelligent Transfer Service
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
c
CACLS Change file permissions
CALL Call one batch program from another•
CERTREQ Request certificate from a certification authority
CERTUTIL Utility for certification authority (CA) files and services
CD Change Directory - move to a specific Folder•
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLIP Copy STDIN to the Windows clipboard
CLS Clear the screen•
CMD Start a new CMD shell
CMDKEY Manage stored usernames/passwords
COLOR Change colors of the CMD window•
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress one or more files
CONVERT Convert a FAT drive to NTFS
COPY Copy one or more files to another location•
Coreinfo Show the mapping between logical & physical processors
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data
d
DATE Display or set the date•
DEFRAG Defragment hard drive
DEL Delete one or more files•
DELPROF Delete user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders•
DIRQUOTA File Server Resource Manager Disk quotas
DIRUSE Display disk usage
DISKPART Disk Administration
DISKSHADOW Volume Shadow Copy Service
DISKUSE Show the space used in folders
DOSKEY Edit command line, recall commands, and create macros
DriverQuery Display installed device drivers
DSACLs Active Directory ACLs
DSAdd Add items to active directory (user group computer)
DSGet View items in active directory (user group computer)
DSQuery Search for items in active directory (user group computer)
DSMod Modify items in active directory (user group computer)
DSMove Move an Active directory Object
DSRM Remove items from Active Directory
Dsmgmt Directory Service Management
e
ECHO Display message on screen•
ENDLOCAL End localisation of environment changes in a batch file•
ERASE Delete one or more files•
EVENTCREATE Add a message to the Windows event log
EXIT Quit the current script/routine and set an errorlevel•
EXPAND Uncompress CAB files
EXPLORER Open Windows Explorer
EXTRACT Uncompress CAB files
f
FC Compare two files
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files•
FOR /F Loop command: against the results of another command•
FOR Loop command: all options Files, Directory, List•
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE File extension file type associations•
g
GETMAC Display the Media Access Control (MAC) address
GOTO Direct a batch program to jump to a labelled line•
GPRESULT Display Resultant Set of Policy information
GPUPDATE Update Group Policy settings
h
HELP Online Help
HOSTNAME Display the host name of the computer
i
iCACLS Change file and folder permissions
IEXPRESS Create a self extracting ZIP file archive
IF Conditionally perform a command•
IFMEMBER Is the current user a member of a group
IPCONFIG Configure IP
INUSE Replace files that are in use by the OS
l
LABEL Edit a disk label
LODCTR Load PerfMon performance counters
LOGMAN Manage Performance Monitor logs
LOGOFF Log a user off
LOGTIME Log the date and time in a file
m
MAKECAB Create .CAB files
MAPISEND Send email from the command line
MBSAcli Baseline Security Analyzer
MEM Display memory usage
MD Create new folders•
MKLINK Create a symbolic link (linkd) •
MODE Configure a system device COM/LPT/CON
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another•
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO32 System Information
MSTSC Terminal Server Connection (Remote Desktop Protocol)
n
NET Manage network resources
NETDOM Domain Manager
NETSH Configure Network Interfaces, Windows Firewall & Remote access
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NLSINFO Display locale information (reskit).
NLTEST Network Location Test (AD)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTDSUtil Active Directory Domain Services management
NTRIGHTS Edit user account rights
NVSPBIND Modify network bindings
o
OPENFILES Query or display open files
p
PATH Display or set a search path for executable files•
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message•
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Return to a previous directory saved by PUSHD•
PORTQRY Display the status of ports and services
POWERCFG Configure power settings
PRINT Print a text file
PRINTBRM Print queue Backup/Recovery
PRNCNFG Configure or rename a printer
PRNMNGR Add, delete, list printers and printer connections
ProcDump Monitor an application for CPU spikes
PROMPT Change the command prompt•
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsPing Measure network performance
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory•
q
QGREP Search file(s) for lines that match a given pattern
Query Process / QPROCESS Display processes
Query Session / QWinsta Display all sessions (TS/Remote Desktop)
Query TermServer /QAppSrv List all servers (TS/Remote Desktop)
Query User / QUSER Display user sessions (TS/Remote Desktop)
r
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file•
REN Rename a file or files•
REPLACE Replace or update one file with another
Reset Session Delete a Remote Desktop Session
RD Delete folder(s)•
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUN Start | RUN commands
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
s
SC Service Control
SCHTASKS Schedule a command to run at a specific time
SET Display, set, or remove session environment variables•
SETLOCAL Control the visibility of environment variables•
SetSPN Edit Service Principal Names
SETX Set environment variables
SFC System File Checker
SHARE List or edit a file share or print share
ShellRunAs Run a command under a different user account
SHIFT Shift the position of batch file parameters•
SHORTCUT Create a windows shortcut (.LNK file)
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SLMGR Software Licensing Management (Vista/2008)
SORT Sort input
START Start a program, command or batch file•
STRINGS Search for ANSI and UNICODE strings in binary files
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSMON Monitor and log system activity to the Windows event log
SYSTEMINFO List system configuration
t
TAKEOWN Take ownership of a file
TASKLIST List running applications and services
TASKKILL End a running process
TELNET Communicate with another host using the TELNET protocol
TIME Display or set the system time•
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session•
TLIST Task list with full path
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TSDISCON Disconnect a Remote Desktop Session
TSKILL End a running process
TSSHUTDN Remotely shut down or reboot a terminal server
TYPE Display the contents of a text file•
TypePerf Write performance data to a log file
TZUTIL Time Zone Utility
v
VER Display version information•
VERIFY Verify that files have been saved•
VOL Display a disk label•
w
W32TM Time Service
WAITFOR Wait for or send a signal
WEVTUTIL Clear event logs, enable/disable/query logs
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINRM Windows Remote Management
WINRS Windows Remote Shell
WMIC WMI Commands
WUAUCLT Windows Update
x
XCACLS Change file and folder permissions
XCOPY Copy files and folders
:: Comment / Remark•
Labels:
Tutorial
How to FIX Laptop Cursor won't move/Stuck
Press and hold the "Fn" key on the laptop keyboard; on most laptops, it is located between the "Ctrl" and "Alt" keys. Press the "F9" key once, then release the "Fn" key. This keyboard shortcut is used to disable or enable the touchpad software. Test the mouse touchpad to see if the cursor responds.
Labels:
Tutorial
Saturday, 27 August 2016
How to Configure Router/ Set Up Router
A router is hardware device designed to receive, analyze and move incoming packets to another network. It may also be used to convert the packets to another network interface, drop them, and perform other actions relating to a network. The picture shows the Linksys BEFSR11 wireless router and is what many home routers resemble.
A router has a lot more capabilities than other network devices, such as a hub or a switch that are only able to perform basic network functions. For example, a hub is often used to transfer data between computers or network devices, but does not analyze or do anything with the data it is transferring. By contrast, routers can analyze the data being sent over a network, change how it is packaged, and send it to another network or over a different network. For example, routers are commonly used in home networks to share a single Internet connection between multiple computers.
What's the Different between Router and Modem?
Labels:
Tutorial
Friday, 26 August 2016
EVOLUTION OF COMPUTERS
The First Computer
Around 3000 B.C. The Mesopotamians unknowingly laid the foundation of computer era. They invented the earliest form of Bead-&-Wire counting machine known as Abacus. The Chinese improved above the Abacus so that they can calculate fast.Aztec version of an abacus, circa 900-1000 A.D., is made from maize (corn) threaded through strings mounted in a wooden frame. There are Japanese and Russian versions of the abacus and several modern “improved” versions.
Napier ‘Logs’ & ‘Bones’
John Napier (1550-1617) developed the idea of logarithms. He used logs to transform multiplication problem to addition problem. Napier’s logs later became the basis for a well-known invention, The Computation Machine Known as Slide-Rule (Invented in 1662) Napier also devices set of numbering rods known as ‘Napier’s Bones’. He could perform both multiplication and division using these ‘Bones’.Pascal’s adding Machine
Blaise Pascal, a French Mathematician, invented a Machine in 1662 made up of gears which was used for adding numbers quickly. This machine was known as Adding Machine (also known as Pascaline) and was capable of addition and subtraction. In worked on clockwork mechanism principle. The Adding Machine consisted of numerous toothed wheels having unique position value. The rotation wheels controlled the Addition and Subtraction operation. This Machine was capable carry-transfer automatically.Leibnitz Calculator
Gottfried Leibnitz a German Mathematician, improved the adding Machine and constructed a new machine in 1671 that was able to perform multiplication and division as well. This Machine performed multiplication through repeated addition of numbers. Leibnitz’s machine used stepped cylinder each with nine teeth of varying lengths instead of wheels as was used by Pascal.Jacquard’s Loom
Joseph Jacquard manufactured punched cards at the end of American Revolution and used them to control looms in 1801. Thus the entire control weaving process was automatic. The entire operation was under a program’s control. With the historic invention of punched cards, the era of Storing and Retrieving information started that greatly influenced the later invention and advancements. (see Hollerith’s Machine below)Babbage’s Difference Engine
Charles Babbage, a professor of mathematics, developed a machine called Difference engine in the year 1882. This machine was expected to calculate logarithmic tables to high degree of precision. The difference engine was made to calculate various mathematical functions. The machine was capable of polynomial evolution by finite difference and its operation was automatic multi stop operation.Babbage’s Analytical Engine
In 1833, Charles Babbage started designing an analytical engine which was to become a real ancestor of modern day computer. With the methodical design of his analytical engine, Babbage meticulously established the basic principles on which today’s computer work. The Analytical Engine was capable to perform all four arithmetic operation as well as comparison, it had a number of features starting to those which are in today’s computer. He included the concept of central processor, Memory, Storage Area and Input/output Devices in his design. The Two revolutionary innovation incorporated in analytical Engine where comparisons and modifications of stored information. The first innovation enabled the machine to compare quantities and then decide which of the Instruction sequence to be followed. The second permitted the result of calculation to change numbers and instructions already stored in machine. Owing to the lack of technology of the time, the Analytical engine was never built. Its Design remained conceptual. His great inventions of Difference Engine and Analytical Engine earned Charles Babbage the title “FATHER OF MODERN COMPUTERS”-a fitting Tribute to him.Hollerith’s Machine
In 1887, an American named Herman Hollerith (1869-1926) fabricated what was dreamt of by Charles Babbage. He fabricated the first electro-mechanical Punched-card tabulator that used punched-cards for input, output and instructions. This machine was used by American department of census to compile their 1880 census data and were able to complete compilation in 3 years which earlier used to take around 10 years.MARK-I
Professor Howard Aiken (1900-1973) in U.S constructed in 1943 an electromechanical computer named “MARK-I” which could multiply two 10 digit numbers in 5 second-a record at that time. MARK-I was the first machine which could perform according to pre-programed instructions automatically without any manual interface. This was the first operational general purpose computer.MODERN COMPUTERS
The term “Computer generation” is often used in relation to the hardware of computers. Each phase of computer development is known as a separate generation of computer. Each phase of development is characterized by type of switching circuits it utilizes.Most computers today use the idea of “Stored Program Computer” that was proposed by Professor John Von Neumann in 1945. The von Neumann architecture is based on three key concepts:-
1) Data and instructions (program) are stored in single read-write memory.
2) The memory contents are addressable by locations.
3) Execution takes place in sequential fashion i.e.: from one instruction to the next unless modified explicitly.
THE FIRST GENERATION COMPUTERS
The first generation computers used the thermionic valves (vacuum tubes) and machine language was used for giving instructions. The first generation computers used the concept of “Stored program” The computers of this generations were very large in size and their programming was a difficult task. Here are some examples:-ENIAC
This was the first electronic computer developed in 1946 by a team lead by Professor Eckert and Mauchly at the University of Pennsylvania in U.S.A. This computer was called Electronic Numerical Integrator And Calculator (ENIAC), which used high speed vacuum tube switching devices. It had a very small memory and it was used for calculating the trajectories of missiles. It took 200 microseconds for addition and about 2800 microseconds for multiplications for multiplication. The giant machine was 30×50 feet long and weighed about 30 tons, contained 18,000 vacuum tubes, 70,000 resistors, 10,000 capacitors, 6000 switches, used 150,000 watts of electricity and costs $400,000. When ENIAC was built, it was 5000 times faster than the closest competitor The Howard MARK-I.EDVAC
The Binary Arithmetic was used in the construction of computer called the Electronic Discrete Variable Automatic Computer (EDVAC), completed in 1950. The Von Neumann concept of “stored program” was also applied in EDVAC. With this, the operation become faster since the computer can rapidly access both the program and data.EDSAC
The EDSAC, short for Electronic Delay Storage Automatic Computer was built by Professor M.V.Wilkes at Cambridge University in 1949 and used mercury delayed lines for storage. It also used the Von Neumann concept of “Stored Program”. This allowed easy implementation of program loops.UNIVAC-I
Commercial production of stored program electronic computer began in early 50’s. One such computer was UNIVAC-I built by UNIVAC division of Remington Rand and delivered in 1951. This computer also used vacuum tubes. UNIVAC stands for (Universal Automatic Computers).Though the first generation computers were welcomed by the government and Universities as they greatly helped them in these tasks, however, the first generation computers suffered from great limitations like slow speed, restricted computing capacity, high power consumption, short mean time between failures, large size and limited programming capabilities.
Further Researches are done to remove these limitations and the Second Generation computers developed.
THE SECOND GENERATION COMPUTERS
The revolution in electronics too place with the invention of “Transistors” by Bardeen, Brattain and Shockley in 1946. Transistors were highly reliable as compared to Tubes. They occupied very less space and required only 1/10th of the power required by the tubes and they were 10 times cheaper than Tubes.Another Major event was the invention of Magnetic cores for storage. These were tiny ferrite rings (0.02 inch diameter) that could be magnetized either clockwise or anticlockwise direction. The two direction represented 0 and 1. Magnetic cores were used to create large Random Access Memories (RAM).
The second generation computers began with the advent of transistorized circuitry, invention of magnetic cores and development of magnetic disk storage devices. These new development made the computers much more reliable.
The increased reliability and availability of large memories paved the way for the development of HLLs (High Level Languages) such as FORTRAN, COBOL, ALGOL, SNOBOL etc. With speedy CPUs and advent of magnetic tape and disk storage, Operating systems came into being. Batch operating system rules the Second Generation Computers.
Commercial applications rapidly developed during this period and more than 80% of these computers were used in Business and industries in the application like Payroll, Inventory control, Marketing, Production, planning etc.
Here are some Second Generation Computers:-
IBM 1401
IBM 7094
It is a Small-Medium sized computer
Read more at http://en.wikipedia.org/wiki/IBM_7090
RCA 501
It is a Medium sized computer, you can see magnetic tapes were used to store data.UNIVAC 1108
It is a large sized computer which occupies a large room, it was the fastest at that time, it uses a CRT screen for display and Magnetic tape to store programs.
Read more at http://en.wikipedia.org/wiki/UNIVAC_1100/2200_series
THE THIRD GENERATION COMPUTERS
The third generation computers replaces transistors with integrated circuits popularly known as “Chips”. The Integrated Circuit or IC was invented by Jack Kilby at Texas instruments 1958.An IC is a wafer of thin slice of extremely purified silicon crystals. A single IC has many transistors, resistors and capacitors along with the associated circuitry encapsulated in a small capsule with many leads.
Frim Small Scale Integrated Circuits (SSI) which had about 10 transistors per chip, technology to Medium Scale Integrated circuits (MSI) with about 100 transistors per chip. The size of main memory reached about 4 Mega Bytes. Magnetic disk technology also developed and become feasible to have drive having capacity up to 100 MBs. The CPUs become much more powerful with the capacity of carrying out 1 million instructions per second (MIPS).
The third generation computers using integrated circuits proved to be highly reliable, relatively inexpensive and faster. Less human labour was required at assembly stage. Examples of some main- frame computers developed during this generation are:-
IBM 360 series, IBM 370/168, ICL 1900 series, ICL 2900, Honeywell Model 316, Honeywell 6000 series.
IBM 360
A Honeywell 6000 Series Computer
Some mini computers during this phase are ICL-2903 manufactured by International Computers Limited. CDC 1700 manufactured by Control Data Corporations. And PDP-11/45 (Personal data processor 11/45)Computers these days found place in other areas also like education, survey, small business, estimation, analysis etc along with their previous are interest Engineering and Scientific.
THE FORTH GENERATION COMPUTERS
The advent of microprocessor chip marked the beginning of fourth generation computers. Medium scale integrated circuits (MSI) yielded to Large and vary large scale integrated circuits (VLSI) packing about 50000 transistors in a chip. Semiconductor memories replaced magnetic core memories. The emergence of the Microprocessor (CPU on a single chip) led to the emergence of an Extremely powerful Personal Computer. Computer costs came down so rapidly that these found places at most offices and then homes. The faster accessing and processing speeds and increased memory capacity helped in development of much more powerful Operating Systems.The second decade (around 1985) of fourth generation observed a great increase in the speed of microprocessor and size of main memory. The speed of microprocessor and speed of main memory and Hard Disk went up by a factor 4 every 3 years. Most of the Main-Frame CPU features became part of Microprocessor architecture in 90s.
In 1995, the most popular CPU was Pentium, Power PC etc. Also RISC (Reduced Instruction Set Computer) microprocessor are preferred in powerful servers for numeric computing and file services.
The Hard disks are also available of the sizes up to 80 Giga Bytes. For large Disks Redundant Array of Independent Disks (RAID) Technology gives storage up to hundreds of GBs. The CD-ROM (Compact Disks- read Only Memory) becoming popular day by day.
The computer network came of age and are one of the most popular ways of interacting with computer chains of million users. The computers are being applied in various areas like simulation, visualization, parallel computing, virtual reality, multimedia etc.
In this generation Micro Computers of Apple and IBM developed, Portable computers came into existence.
World’s First Portable Computer by IBM (The IBM 5100)(September 1975)
TOSHIBA T 1100
THE FIFTH GENERATION COMPUTERS
The fifth generation computing devices are based on artificial intelligence and are still in development, though there are features like voice recognition, face recognition, finger print recognition, gesture recognition etc. are being used today. Applications like 6th sense technology are still in development. The use of parallel processing and superconductor is helping to make artificial intelligence a reality. Quantum computation and nanotechnology will radically changing the face of computers in years. The goal of fifth generation computing is to develop devices hat respond to natural language input and are capable of learning and self-organization. The key developments of fifth generation computers are summed up as :- ULSI (Ultra Large Scale Integrations), scalable parallel computers, workstation clusters, Intranet, Internet, WWW, Micro-kernels, Portable software and hardware platforms etc.The most noticeable characteristic of 5th gen computers is the ability to apply previously gained knowledge, draw conclusions and then execute a task, The computer in short simulate the human ability in reason.
Computers will have to be able to classify information, search large database rapidly. Input devices become highly advanced.
DELL XPS Convertible PC
MacBook Air
Video Game Consoles
Some Historical Quotes on Computers:-
“I think there is a world market for maybe 5 computers”
-Thomas Watson, IBM, 1943
“It would appear that we have reached the limits of what it is possible to achieve with computer technology, although one should be careful with such statements as they tend to sound pretty silly in 5 years”
-John Von Neumann, 1949.
“Computers in future may not weight more than 1.5 ton”
-Popular mechanics, 1949
“There is no reason anyone would want a computer in their home”-Ken Olsen, DEC, 1977
Labels:
Technology
Friday, 12 August 2016
How to share internet from usb modem to Local area connection AND How to Share USB modem internet connection into your router
If you're trying to share your internet connection with multiple devices at your house, you may be wondering how to do it without complicated networking. Luckily, your Windows or Mac computer can easily share its internet connection with the rest of the network. You can even turn your computer into a wireless access point so you don't need a router to connect your wireless devices.
HOW TO: Share internet from usb modem to Local area connection
HOW TO: Share USB modem internet connection into your router
Labels:
Tutorial
Devices used in wireless communication and their functions
Wireless Communication Technologies Types and Advantages:
The term wireless refers to the communication or transmission of information over a distance without requiring wires, cables or any other electrical conductors. Wireless communication is one of the important mediums of transmission of data or information to other devices. The Communication is set and the information is transmitted through the air, without requiring any cables, by using electromagnetic waves like radio frequencies, infrared, satellite, etc., in a wireless communication technology network.
At the end of the 19th century, the first wireless communication systems were introduced and the technology has significantly been developed over the intervening and subsequent years. Today, the term wireless refers to a variety of devices and technologies ranging from smart phones to laptops, tabs, computers, printers, Bluetooth, etc.
Types of Wireless Communication Technologies
In recent days, the wireless communication technology has become an integral part of several types of communication devices as it allows users to communicate even from remote areas. The devices used for wireless communication are cordless telephones, mobiles, GPS units, ZigBee technology, wireless computer parts, and satellite television, etc.
Satellite
Satellite communication is one of the wireless technologies, which is widely spread all over the world allowing users to stay connected virtually anywhere on the Earth. The Satellites used in this mode of communication, communicate directly with the orbiting satellites via radio signals. Portable satellite phones and modems have more powerful broadcasting abilities than the cellular devices as they have high range, apart from being more expensive in terms of cost, than their counterparts.
For example, for outfitting a ship through satellite communication, a traditional communication system is linked to a single satellite, which allows multiple users to share the same broadcast equipment.
Wireless Networking
Wireless Networking technologies connect multiple computers, systems and devices together without requiring wires or cables: a wireless local area network or WLAN comes under Wi-Fi.
WiMAX
There are wireless broadband systems that offer fast Web surfing without being getting connected through cable or DSL (Example of wireless broadband is WiMAX). Although WiMAX can potentially deliver data rates of more than 30 Megabits per second, yet the providers offer average 0 data rates of 6 Mbps and often deliver less, making the service significantly slower than the hard-wired broadband. The actual cost of the data available using WiMAX widely varies with the distance from the transmitter. WiMAX is also one of the versions of 4G wireless available in phones as Sprint’s 4G technology.
Wi-Fi
Wi-Fi is a form of low-power wireless communication used by many electronic devices such as laptops, systems, smart phones, etc. In a Wi-Fi setup, a wireless router serves as the communication hub. These networks are extremely limited in range due to low power of transmissions allowing users to connect only within close proximity to a router or signal repeater. Wi-Fi is common in home networking applications which provides portability without any need of cables. Wi-Fi networks need to be secured with passwords for security purposes in order not to be accessed by others.
Wireless Networking (Wi-Fi):
Advantages
- Ease of Integration and Convenience – The wireless nature of such networks allows users to access network resources from nearly any convenient location.
- Mobility – With the emergence of public wireless networks, users can access the internet even outside their normal working environment.
- Expandability – Wireless networks are capable of serving a suddenly-increased number of clients with the existing equipment. In a wired network, additional clients require additional wiring.
Disadvantages
- Wireless LANs may not be desirable for a number of reasons.
- Radio Frequency transmission and wireless networking signals are subjected to a wide variety of interference including the complex propagation effects that are beyond the control of the network administrator.
- Security Problems – Wireless networks may choose to utilize some of the various encryption technologies.
- Range will be insufficient for a larger structure – and, in order to increase its range, repeaters or additional access points have to be purchased.
- The speed on most wireless networks will be slower than the slowest common wired networks.
- Installation of an infrastructure-based wireless network is a complex to set up.
Bluetooth Technology
Bluetooth technology allows you to connect a variety of different electronic devices wirelessly to a system for the transfer and sharing of data and this is the main function of Bluetooth. Cell phones are connected to hands-free earpieces, wireless keyboard, mouse and mike to laptops with the help of Bluetooth as it transmits information from one device to other device. Bluetooth technology has many functions, and it is used most commonly in wireless communications’ market.
Features
- Bluetooth technology uses radio waves to communicate between devices. Most of these radio waves have a range of 15-50 feet.
- According to the official Bluetooth website, Bluetooth uses a low-power signal with a maximum range of 50 feet with sufficient speed to enable transmission of data.
- The pairing process identifies and connects any two devices to each other. It also prevents interference from other non-paired Bluetooth devices in the area.
- It uses maximum power only when it is required, thus preserving battery life.
ZigBee
ZigBee is a wireless communication standard designed to address the unique needs of low-power, low-cost wireless sensor, and control networks. ZigBee can be used almost anywhere, as it is easy to implement and requires little power to operate. Zigbee has been developed looking into the needs of the communication of data with a simple structure like the data from the sensors.
Features
- ZigBee devices are designed for low-power consumption.
- ZigBee is used in Commercial Applications like sensing and monitoring applications.
- ZigBee uses very low power and extremely long device battery life.
- ZigBee gives flexibility to do more with the reliable wireless performance and battery operation.
Types of Wireless Data Transmission
Wireless technology defines the electronic devices that communicate in air without cables using radio frequency signals. Wireless technology is used in a variety of modern device and provides greater mobility. Wireless devices play an important role in voice and Internet communications.
Wireless RouterWireless routers accepts an incoming Internet connection and sendsthe data as RF signals to other wireless devices that are near to the router. A network set up with a wireless router is called as a Wireless Local Area Network (WLAN).Many routers have built-in security features such as firewalls that help protect devices connected to the router against malicious data such as computer viruses.
A wireless router is used in many houses to connect their computers to the Internet.
Wireless Adapters
Wireless adapters are hardware devices that are installed inside computers which enables wireless connectivity. If a computer does not have a wireless adapter, it will not be able to connect to a router in order to access the Internet. Some computers have wireless adapters built directly into the motherboard, while it is also possible to install stand-alone wireless adapters to add wireless capability to a computer that doesn’t have a built-in facility.
Wireless Repeater
A wireless repeater is a wireless networking device that is used to extend the range of a wireless router. A repeater receives wireless signals and amplifies the strength of the signals, and then re-emits them. The strength of the signal can be increased by placing a repeater between the router and the computer connected to the router.
Microwave
Microwave is an effective type of wireless data transmission that transfers information using two separate methods. One method which is used to transmit data through the wireless media of a microwave is the satellite method that transmits information via a satellite that orbits 22,300 miles above the Earth. Stations on the ground send and receive data signals to and from the satellite with a frequency ranging from 11 GHz to 14 GHz and with a transmission speed of 1 Mbps to 10 Mbps. Another method is a terrestrial method, in which two microwave towers with a clear line of sight between them are used ensuring no obstacles to disrupt that line of sight. For the purpose of privacy, it is used often. The frequency of data transmission for terrestrial systems is typically 4 GHz to 6 GHz or 21 GHz to 23 GHz, and the speed is usually 1 megabit per second (Mbps) to 10 Mbps.
Infrared (IR)
Infrared is a media transmission system that transmits data signals through light emitting diodes (LEDs) or Lasers. Infrared is an electromagnetic energy at a wavelength which is longer than that of the red light. The information cannot be travelled through obstacles in an infrared system, but can be inhibited by light. One type of infrared is the point to point system in which transmission is possible between two points limited to a range and line of sight.
The signal frequency to transmit in a point to point system is 100 GHz to 1,000 terahertz (THz), and the speed ranges from 100 Kbps to 16 Mbps. Another method of transmission of infrared includes the broadcast system – and, in this method, a reflective material or a transmission unit amplifies and retransmits a data signal to several other units. The normal frequency of an infrared broadcast system is 100 GHz to 1,000 THz with a limited speed of 1 Mbps.
Types of Wireless Devices
Radio
The radio system is one type of wireless data transmission, and it is a wireless media that transfers data by carrying electromagnetic waves with low frequencies to distant locations through an electrical conductor and an antenna. Ham radio enthusiasts share information and serve as emergency communication aids during disasters with their powerful amateur broadcasting equipment and can even communicate digital data over the radio spectrum.
Citizen’s band and maritime radios provide communication services for truckers and sailors. The transmission frequency for information transmitted through a radio system ranges from 10 kilohertz (kHz) to 1 gigahertz (GHz), and the frequencies are regulated by the Federal Communications Commission (FCC).
Wireless Phones
The evolution of cellular networks is enumerated by generations. Many different users communicate across a single frequency band through Cellular and cordless phones. Cellular and cordless phones are two more examples of devices that make use of wireless signals.
Cordless phones have a limited range but cell phones typically have a much larger range than the local wireless networks since cell phone use large telecommunication towers to provide cell phone coverage. Some phones make use of signals from satellites to communicate, similar to Global Positioning System (GSP) devices.
Other Devices
Anything that uses radio signals to communicate can be considered as a wireless device. Common devices such as garage door openers, baby monitors, certain video game consoles and walkie-talkies make use of wireless technology.
Advantages and Disadvantages of Wireless Communications
Advantages
- Any information can be conveyed or transmitted quickly and with a high speed.
- The Internet can be accessed from anywhere and at anytime without the need to carry cables or wires and it improves easy access and productivity.
- Helpful for Doctors, workers and other professionals working in remote areas as they can be in touch with the medical centers through wireless communication.
- Emergency situations can be alerted through wireless communication. The affected regions can be provided support with the help of these alerts through wireless communication.
- Wireless networks cost less for installation and maintenance.
Disadvantages
- A Hacker can easily capture the wireless signals that spread through the air.
- It is very important to secure the wireless network so that the information cannot be exploited by unauthorized users, and this also increases the risk of losing data or information.
Thus, Wireless networks are one of the fastest growing technologies in telecommunications market. WiMax, Bluetooth, Wi-Fi, Femtocell and 4G are some of the most significant standards of Wireless technology for the next generations. Radio, Mobiles, Internet, etc., all use technological advancements in wireless data transmission systems that carry invisible electromagnetic waves to transmit data over long distances within a short amount of time. The information provided in this article will be helpful to the viewers.
Labels:
Technology
Subscribe to:
Posts (Atom)