Thursday, December 24, 2015

32. about computer genaration.

> initiative by Japan's Ministry of International Trade and Industry, begun in 1982, to create a computer using massively parallel computing/processing. It was to be the result of a massive government/industry research project in Japan during the 1980s.The history of computer development is often in reference to the different generations of computing devices. Each of the five generations of computers is characterized by a major technological development that fundamentally changed the way computers operate.Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between ...The Fifth Generation Computer Systems project (FGCS) was an initiative by Japan's Ministry of International Trade and Industry, begun in 1982, to create a computer using massively parallel computing/processing. It was to be the result of a massive government/industry research project in Japan during the 1980s.
The the late 1960s and early 70s, there was much talk about "generations" of computer technology. This photo illustrates what were commonly known as the three generations:
  1. First generation: Vacuum tubes (left). Mid 1940s. IBM pioneered the arrangment of vacuum tubes in pluggable modules such as the one shown here on the left. The IBM 650 was a first-generation computer.
  2. Second generation: Transistors (right). 1956. The era of miniaturization begins. Transistors are much smaller than vacuum tubes, draw less power, and generate less heat. Discrete transistors are soldered to circuit boards like the one shown, with intereconnections accomplished by stencil-screened conductive patterns on the reverse side. The IBM 7090 was a second-generation computer.
  3. Third generation: Integrated circuits (foreground), silicon chips contain multiple transistors. 1964. A pioneering example is the ACPX module used in the IBM 360/91, which, by stacking layers of silicon over a ceramic substrate, accommodated over 20 transistors per chip; the chips could be packed together onto a circuit board to achieve unheard-of logic densities. The IBM 360/91 was a hybrid second- and third-generation computer.
Omitted from this taxonomy is the "zeroth" generation computer based on metal gears (such as the IBM 407) or mechanical relays (such as the Mark I), and the post-3rd generation computers based on Very Large Scale Integrated (VLSI) circuits.


 Photo

31.what is online bussiness?

> Online business - also referred to as e-business - is any kind of business activity that happens online (over the internet). A business owner who does any, or all, of their business using the internet, is running an online business.The guide will be emailed to you ASAP. a few pages from Fizzle's Top 10 Mistakes in Online Business Guide. All 10 mistakes explained. Resources and links to ...In many ways, starting an online business is similar to starting a brick-and-mortar store. You'll plan your business, organize your funding, produce your product, ...When organizations go online, they have to decide which e-business models best suit their goals. A business model is defined as the organization of product, ...Starting your own business doesn't have to mean spending thousands of dollars on setup costs before you ever open your doors.10 Mistakes in Online Business Guide. All 10 mistakes explained. Resources and links to ...In many ways, starting an online business is similar to starting a brick-and-mortar store. You'll plan your business, organize your funding, produce your product, ...When organizations go online, they have to decide which e-business models best suit their goals. A business model is defined as the organization of product, ...Starting your own business doesn't have to mean spending thousands of dollars on setup
Today's economy isn't doing anyone any favors, and if you're one of the unfortunate folks to have been served a layoff notice, you might be facing a long haul when it comes to searching for another job. Is now the right moment to put your long-lingering business idea into practice? While times may be tight for many larger enterprises, in many cases smaller, more-nimble companies are better able to withstand market uncertainty and weather downturns.
The best way to stick it to The Man? Start working for yourself by founding your own company. Working for yourself has some serious and obvious advantages over job hunting. Not only do you determine your own hours and decide where you set up your office, but you keep all the profits too.
Starting your own business doesn't have to mean spending thousands of dollars on setup costs before you ever open your doors. Don't get suckered into spending loads of money on services that you don't need or that have far cheaper alternatives. Seriously: With $100, you can obtain everything you require to start just about any business online, with only minimal need to get up from your desk. Here's how to do it.


                                               figar of online bussiness


http://images.pcworld.com/howto/graphics/153311-wordpress_original.jpg

Sunday, December 20, 2015

31.

30. what is the c programming languagee ?

> C programming is the same set of calculations, the programmer would like to write his or her own functions . it is also world wide language .C (/ˈsiː/, as in the letter c) is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.
C is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations. The C Programming Language (sometimes referred to as K&R, after its authors' initials) is a well-known computer programming book written by Brian Kernighan and Dennis Ritchie, the latter of whom originally designed and implemented the language, as well as co-designed the Unix operating system with which development of ...that is called c programming.
C Programming Language and over one million other books are available for Amazon Kindle. ... The C Programming Language 2nd Edition. ... This item:The C Programming Language by Brian W. Kernighan Paperback $55.83.

  • The C programming language is a structure oriented programming language, developed at Bell Laboratories in 1972 by Dennis Ritchie
  • C programming language features were derived from an earlier language called “B” (Basic Combined Programming Language – BCPL)
  • C language was invented for implementing UNIX operating system
  • In 1978, Dennis Ritchie and Brian Kernighan published the first edition  “The C Programming Language” and commonly known as K&R C
  • In 1983, the American National Standards Institute (ANSI) established a committee to provide a modern, comprehensive definition of C. The resulting definition, the ANSI standard, or “ANSI C”, was completed late 1988.

C programming language standards:

  • C89/C90 standard – First standardized specification for C language was developed by the American National Standards Institute in 1989. C89 and C90 standards refer to the same programming language.
  • C99 standard – Next revision was published in 1999 that introduced new features like advanced data types and other changes.

               example of c programming 


 

28. what is the fecebook ?

>
Facebook is a popular free social networking website that allows registered users to create profiles, upload photos and video, send messages and keep in touch with friends, family and colleagues. The site, which is available in 37 different languages, includes public features such as:
  • Marketplace - allows members to post, read and respond to classified ads.
  • Groups - allows members who have common interests to find each other and interact.
  • Events  - allows members to publicize an event, invite guests and track who plans to attend.
  • Pages - allows members to create and promote a public page built around a specific topic.
  • Presence technology - allows members to see which contacts are online and chat.
Within each member's personal profile, there are several key networking components. The most popular is arguably the Wall, which is essentially a virtual bulletin board. Messages left on a member's Wall can be text, video or photos. Another popular component is the virtual Photo Album. Photos can be uploaded from the desktop or directly from a smartphone camera. There is no limitation on quantity, but Facebook staff will remove inappropriate or copyrighted images.  An interactive album feature allows the member's contacts (who are called generically called "friends") to comment on each other's photos and identify (tag) people in the photos. Another popular profile component is status updates, a microblogging feature that allows members to broadcast short Twitter-like announcements to their friends. All interactions are published in a news feed, which is distributed in real-time to the member's friends.
Facebook offers a range of privacy options to its members.  A member can make all his communications visible to everyone, he can block specific connections or he can keep all his communications private. Members can choose whether or not to be searchable, decide which parts of their profile are public, decide what not to put in their news feed and determine exactly who can see their posts. For those members who wish to use Facebook to communicate privately, there is a message feature, which closely resembles email.
In May 2007, Facebook opened up its developers' platform to allow third-party developers to build applications and widgets that, once approved, could be distributed through the Facebook community. In May 2008, Facebook engineers announced Facebook Connect, a cross-site initiative that allows users to publish interactions on third-party partner sites in their Facebook news feed.




                               figar of facebook

 

27. what is the Rimg topology?

> A ring topology is a network topology or circuit arrangement in which each network device is attached along the same single path to other divice forming . A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way handling every packet.A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way Ring topology. Alternatively referred to as a ring network, ring topology is a computer network configuration where the devices are connected to each other in a circular shape. Each packet is sent around the ring until it reaches its final destination In Ring Topology, all the nodes are connected to each-other in such a way that they make a closed loop. Each workstation is connected ....The ring topology may prove optimum when system requirements are modest and workstations are at scattered points. If the workstations are reasonably close ... Network cabling scheme in which one cable sequentially connects all nodes and forms a closed loop. A data packet starting from the ...A local-area network (LAN) whose topology is a ring. That is, all of the nodes are connected in a closed loop. Messages travel around the ring, with each node ...two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way Ring topology. Alternatively referred to as a ring network, ring topology is a computer network configuration where the devices are connected to each other in a circular shape. Each packet is sent around the ring until it reaches its final destination In Ring Topology, all the nodes are connected to each-other in such a way that they make a closed loop. Each workstation is connected ....The ring topology may prove optimum when system requirements are modest and workstations are at scattered points. If the workstations are reasonably close ... Network cabling scheme in which one cable sequentially connects all nodes and forms a closed loop. A data packet starting from the ...A local-area network (LAN) whose topology is a ring.that is called ring topology.

                                            Figar of ring topology


http://www.tutorialspoint.com/data_communication_computer_network/images/ring_topology.jpg