Thursday, December 24, 2015

32. about computer genaration.

> initiative by Japan's Ministry of International Trade and Industry, begun in 1982, to create a computer using massively parallel computing/processing. It was to be the result of a massive government/industry research project in Japan during the 1980s.The history of computer development is often in reference to the different generations of computing devices. Each of the five generations of computers is characterized by a major technological development that fundamentally changed the way computers operate.Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between ...The Fifth Generation Computer Systems project (FGCS) was an initiative by Japan's Ministry of International Trade and Industry, begun in 1982, to create a computer using massively parallel computing/processing. It was to be the result of a massive government/industry research project in Japan during the 1980s.
The the late 1960s and early 70s, there was much talk about "generations" of computer technology. This photo illustrates what were commonly known as the three generations:
  1. First generation: Vacuum tubes (left). Mid 1940s. IBM pioneered the arrangment of vacuum tubes in pluggable modules such as the one shown here on the left. The IBM 650 was a first-generation computer.
  2. Second generation: Transistors (right). 1956. The era of miniaturization begins. Transistors are much smaller than vacuum tubes, draw less power, and generate less heat. Discrete transistors are soldered to circuit boards like the one shown, with intereconnections accomplished by stencil-screened conductive patterns on the reverse side. The IBM 7090 was a second-generation computer.
  3. Third generation: Integrated circuits (foreground), silicon chips contain multiple transistors. 1964. A pioneering example is the ACPX module used in the IBM 360/91, which, by stacking layers of silicon over a ceramic substrate, accommodated over 20 transistors per chip; the chips could be packed together onto a circuit board to achieve unheard-of logic densities. The IBM 360/91 was a hybrid second- and third-generation computer.
Omitted from this taxonomy is the "zeroth" generation computer based on metal gears (such as the IBM 407) or mechanical relays (such as the Mark I), and the post-3rd generation computers based on Very Large Scale Integrated (VLSI) circuits.


 Photo

31.what is online bussiness?

> Online business - also referred to as e-business - is any kind of business activity that happens online (over the internet). A business owner who does any, or all, of their business using the internet, is running an online business.The guide will be emailed to you ASAP. a few pages from Fizzle's Top 10 Mistakes in Online Business Guide. All 10 mistakes explained. Resources and links to ...In many ways, starting an online business is similar to starting a brick-and-mortar store. You'll plan your business, organize your funding, produce your product, ...When organizations go online, they have to decide which e-business models best suit their goals. A business model is defined as the organization of product, ...Starting your own business doesn't have to mean spending thousands of dollars on setup costs before you ever open your doors.10 Mistakes in Online Business Guide. All 10 mistakes explained. Resources and links to ...In many ways, starting an online business is similar to starting a brick-and-mortar store. You'll plan your business, organize your funding, produce your product, ...When organizations go online, they have to decide which e-business models best suit their goals. A business model is defined as the organization of product, ...Starting your own business doesn't have to mean spending thousands of dollars on setup
Today's economy isn't doing anyone any favors, and if you're one of the unfortunate folks to have been served a layoff notice, you might be facing a long haul when it comes to searching for another job. Is now the right moment to put your long-lingering business idea into practice? While times may be tight for many larger enterprises, in many cases smaller, more-nimble companies are better able to withstand market uncertainty and weather downturns.
The best way to stick it to The Man? Start working for yourself by founding your own company. Working for yourself has some serious and obvious advantages over job hunting. Not only do you determine your own hours and decide where you set up your office, but you keep all the profits too.
Starting your own business doesn't have to mean spending thousands of dollars on setup costs before you ever open your doors. Don't get suckered into spending loads of money on services that you don't need or that have far cheaper alternatives. Seriously: With $100, you can obtain everything you require to start just about any business online, with only minimal need to get up from your desk. Here's how to do it.


                                               figar of online bussiness


http://images.pcworld.com/howto/graphics/153311-wordpress_original.jpg

Sunday, December 20, 2015

31.

30. what is the c programming languagee ?

> C programming is the same set of calculations, the programmer would like to write his or her own functions . it is also world wide language .C (/ˈsiː/, as in the letter c) is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.
C is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations. The C Programming Language (sometimes referred to as K&R, after its authors' initials) is a well-known computer programming book written by Brian Kernighan and Dennis Ritchie, the latter of whom originally designed and implemented the language, as well as co-designed the Unix operating system with which development of ...that is called c programming.
C Programming Language and over one million other books are available for Amazon Kindle. ... The C Programming Language 2nd Edition. ... This item:The C Programming Language by Brian W. Kernighan Paperback $55.83.

  • The C programming language is a structure oriented programming language, developed at Bell Laboratories in 1972 by Dennis Ritchie
  • C programming language features were derived from an earlier language called “B” (Basic Combined Programming Language – BCPL)
  • C language was invented for implementing UNIX operating system
  • In 1978, Dennis Ritchie and Brian Kernighan published the first edition  “The C Programming Language” and commonly known as K&R C
  • In 1983, the American National Standards Institute (ANSI) established a committee to provide a modern, comprehensive definition of C. The resulting definition, the ANSI standard, or “ANSI C”, was completed late 1988.

C programming language standards:

  • C89/C90 standard – First standardized specification for C language was developed by the American National Standards Institute in 1989. C89 and C90 standards refer to the same programming language.
  • C99 standard – Next revision was published in 1999 that introduced new features like advanced data types and other changes.

               example of c programming 


 

28. what is the fecebook ?

>
Facebook is a popular free social networking website that allows registered users to create profiles, upload photos and video, send messages and keep in touch with friends, family and colleagues. The site, which is available in 37 different languages, includes public features such as:
  • Marketplace - allows members to post, read and respond to classified ads.
  • Groups - allows members who have common interests to find each other and interact.
  • Events  - allows members to publicize an event, invite guests and track who plans to attend.
  • Pages - allows members to create and promote a public page built around a specific topic.
  • Presence technology - allows members to see which contacts are online and chat.
Within each member's personal profile, there are several key networking components. The most popular is arguably the Wall, which is essentially a virtual bulletin board. Messages left on a member's Wall can be text, video or photos. Another popular component is the virtual Photo Album. Photos can be uploaded from the desktop or directly from a smartphone camera. There is no limitation on quantity, but Facebook staff will remove inappropriate or copyrighted images.  An interactive album feature allows the member's contacts (who are called generically called "friends") to comment on each other's photos and identify (tag) people in the photos. Another popular profile component is status updates, a microblogging feature that allows members to broadcast short Twitter-like announcements to their friends. All interactions are published in a news feed, which is distributed in real-time to the member's friends.
Facebook offers a range of privacy options to its members.  A member can make all his communications visible to everyone, he can block specific connections or he can keep all his communications private. Members can choose whether or not to be searchable, decide which parts of their profile are public, decide what not to put in their news feed and determine exactly who can see their posts. For those members who wish to use Facebook to communicate privately, there is a message feature, which closely resembles email.
In May 2007, Facebook opened up its developers' platform to allow third-party developers to build applications and widgets that, once approved, could be distributed through the Facebook community. In May 2008, Facebook engineers announced Facebook Connect, a cross-site initiative that allows users to publish interactions on third-party partner sites in their Facebook news feed.




                               figar of facebook

 

27. what is the Rimg topology?

> A ring topology is a network topology or circuit arrangement in which each network device is attached along the same single path to other divice forming . A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way handling every packet.A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way Ring topology. Alternatively referred to as a ring network, ring topology is a computer network configuration where the devices are connected to each other in a circular shape. Each packet is sent around the ring until it reaches its final destination In Ring Topology, all the nodes are connected to each-other in such a way that they make a closed loop. Each workstation is connected ....The ring topology may prove optimum when system requirements are modest and workstations are at scattered points. If the workstations are reasonably close ... Network cabling scheme in which one cable sequentially connects all nodes and forms a closed loop. A data packet starting from the ...A local-area network (LAN) whose topology is a ring. That is, all of the nodes are connected in a closed loop. Messages travel around the ring, with each node ...two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way Ring topology. Alternatively referred to as a ring network, ring topology is a computer network configuration where the devices are connected to each other in a circular shape. Each packet is sent around the ring until it reaches its final destination In Ring Topology, all the nodes are connected to each-other in such a way that they make a closed loop. Each workstation is connected ....The ring topology may prove optimum when system requirements are modest and workstations are at scattered points. If the workstations are reasonably close ... Network cabling scheme in which one cable sequentially connects all nodes and forms a closed loop. A data packet starting from the ...A local-area network (LAN) whose topology is a ring.that is called ring topology.

                                            Figar of ring topology


http://www.tutorialspoint.com/data_communication_computer_network/images/ring_topology.jpg

26. what is the ROM.

> Stands for "Read-Only Memory." Please do not confuse this term with RAM or a hard drive, as many people already do. ROM is memory containing hardwired instructions that the computer uses when it boots up, before the system software loads. In PCs, the instructions are read from a small program in the ROM, called the BIOS (Basic Input/Output System).RAM (pronounced ramm) is an acronym for random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.RAM (pronounced ramm) is an acronym for random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as prin
Once data has been written onto a ROM chip, it cannot be removed and can only be read. Unlike main memory (RAM), ROM retains its contents even when the computer is turned off. ROM is referred to as being nonvolatile, whereas RAM is volatile.
 
 searchstorage.techtarget.com/definition/RAM-random-access-memoryRAM (random access memory) is the place in a computer where the operating tem, application programs, and data in current use are kept so that they can be ...Random-access memory (RAM /ræm/) is a form of computer data storage. A random-access memory device allows data items to be accessed (read or written) in almost the same amount of time irrespective of the physical location of data inside the mem The main memory in a computer, smartphone or tablet. RAM is the temporary workspace where instructions are executed and data ...(RAM) is a type of storage for computer systems that makes it possible to access data very quickly in random order.RAM is the best known form of computer memory and easy to upgrade. Learn how RAM works, what kind of RAM to buy, and how to install it.
 
 
 
                                                                   figar of ROM 


http://i.afterdawn.com/storage/pictures/disassemble_x360_26_lg.jpg

Friday, December 18, 2015

25. what is the E-Mail .

> Electronic mail is a fast easy and cheep way to communicate with others using internet system . It is the basic service of the internet . Email has a mail box address to which messages are sent and these are accessed from any part of the world at any time . there are two types of emails . these are web that is called E-Mail .Short for electronic mail, email (or e-mail) is defined as the transmission of messages over communications networks. Typically the messages are notes entered from the keyboard or electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an email ...E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more .More plainly, e-mail is a message that may contain text, files, images, or other attachments sent through a network to a specified individual or group of individuals. The first e-mail was sent by Ray Tomlinson in 1971. By 1996, more electronic mail was being sent than postal mail.A system for sending and receiving messages electronically over a computer network. 2. A message or messages sent or received by such a system. Email is electronic mail, a protocol for receiving and sending, and storing electronic messages. The influence of email cannot be... Email is electronic mail, a protocol for receiving and sending, and storing electronic messages. The influence of email cannot be...that is called E-Mail .
 these are accessed from any part of the world at any time . there are two types of emails . these are web that is called E-Mail .Short for electronic mail, email (or e-mail) is defined as the transmission of messages over communications networks. Typically the messages are notes entered from the keyboard or electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an email ...E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more .More plainly, e-mail is a message that may contain text, files, images, or other attachments sent through a network to a specified individual or group of individuals. The first e-mail was sent by Ray Tomlinson in 1971. By 1996, more electronic mail was being sent than postal mail.A system for sending and receiving messages electronically over a computer network. 2. A message or messages sent or received by such a system. Email is electronic mail, a protocol for receiving and sending, and storing electronic that is called Electronic Mail.

                                 figar of E-Mail




24. what is the computer system security .

> Security has always been a prime concern of humankind . For any organization , information plays a fundamental role in running the busseness .Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications. that is called computer system security.also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that ... Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some ...include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications. that is called computer system security.also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that ... Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well that is called computer security so it is most important in computer system . 

                                      figar of computer system security

 https://www.cs.uic.edu/~jbell/CourseNotes/OperatingSystems/images/Chapter15/15_01_StandardSecurityAttacks.jpg

Thursday, December 17, 2015

22. what is the multimedia .

>  multimedia is usually smaller and less expensive) and by the possibility of audience interactivity or involvement (in which case, it is usually calledinteractive multimedia). Interactive elements can include: voice command, mouse manipulation, text entry, touch screen, video capture of the user, or live participation (in live presentations).
Multimedia tends to imply sophistication (and relatively more expense) in both production and presentation than simple text-and-images. Multimedia presentations are possible in many contexts, including the Web, CD-ROMs, and live theater. A rule-of-thumb for the minimum development cost of a packaged multimedia production with video for commercial presentation (as at trade shows) is: $1,000 a minute of presentation time. Since any Web site can be viewed as a multimedia presentation, however, any tool that helps develop a site in multimedia form can be classed as multimedia software and the cost can be less than for standard . it is most important in computer system so it is most important . 
                                                 FGAR OF MULTIMEDIA

20. what is the data bus.

In computer architecture, a bus (related to the Latin "omnibus", meaning "for all") is a communication system that transfers databetween components inside a computer, or between computers.that is called data bus .In computer architecture, a bus (related to the Latin "omnibus", meaning "for all") is a communication system in data bus there are many data and information This page describes the term internal data bus and lists other pages on the Web where you can find additional information.  An internal pathway across which data are transferred to and from the processor or to and from memory. See local bus .A data bus is a computer subsystem that allows for the transferring of data from one component to another on a motherboard or system board, or between two computers. This can include transferring data to and from the memory, or from thecentral processing unit (CPU) to other components. Each one is designed to handle so many bits of data at a time. The amount of data a data bus can handle is calledbandwidth.
A typical data bus is 32-bits wide. This means that up to 32 bits of data can travel through a data bus every second. Newer computers are making data buses that can handle 64-bit and even 96-bit data paths. At the same time they are making data buses to handle more bits, they are also making devices that can handle those higher bitrates.

Bus Controllers

In the early days of the personal computer, manufacturers created motherboards with data buses that were directly connected to the computer's memory and peripherals. These electrical buses were designed to run parallel to each other and had multiple connections. This direct connection was problematic for a number of reasons, but especially because all devices were forced to run at the same speed. that is called data bu so it is most important in computer system . 

                                                           figar of data bus.






















20. what is the data bus.

>
                      

19. About the cyber law in nepal.

> Nepal is the developing country. It is at developing stage like other sectors information and communication Technology (ICT). So the business sector , government sector and public sector are using IT as a major tool to support all types of business process .
So it is very essentials to legalize the digital activities like online work to make it useful and standardCyber law is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. Cyber law covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy. Cyberlaw or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation..

Nepal has formulated some cyber law to support and legalize the online trading activities , government activities , tax payment and electronic payment using some electronic cards . It has a strong punishment against the illegal work on such activities . According the levels of cyber crime , criminals will be punished . It prevents from the hacking , faking , digital signature , privacy issues. that is called cyber law.communication Technology (ICT). So the business sector , government sector and public sector are using IT as a major tool to support all types of business process .So it is very essentials to legalize the digital activities like online work to make it useful and standard strong punishment against the illegal work on such activities . According the levels of cyber crime , criminals will be punished . It prevents from the hacking , faking , digital signature , privacy issues. that is called cyber law.communication Technology (ICT). So the business sector , government sector and public sector are using IT as a major tool to support all types of business process .So it is very important than .

It address the following aspects to control the cyber crime and others indiscipline on cyber field in Nepal . These are listed as below.

> It explains provisions to punish to hackers who download , copy and manipulate data without getting permission of the owner and who introduce virus in to the system that is called cyber law.strong punishment against the illegal work on such activities . According the levels of cyber crime , criminals will be punished . It prevents from the hacking , faking , digital signature , privacy issues. that is called cyber law.communication Technology (ICT). So the business sector , government sector and public sector are using IT as a major tool to support all types of business process .So it is very essentials to legalize the digital activities like online work to make it useful and standard strong punishment against the illegal work on such activities . According the levels of cyber crime , criminals will be punished . It prevents from the hacking , faking , digital signature , privacy issues. that is called cyber law.communication Technology (ICT). So the business sector , government sector and public sector are using IT as a major tool to support all types of business process .So it is very important than .


                                

                                           






















Wednesday, December 16, 2015

16. whate is the WAN (Wide Area Network)

> A communication network that connects geographically separated areas . in the other world the term WAN (Wide Area Network ) is used to describe a computer network spanning a regional national and global area . it provides long distance transmission of data voice image and video information over a large . geographical area that may comprise a country a contiment or evan the world wide .A wide area network (WAN) is a telecommunications network or computer network that extends over a large geographical distance. Wide area networks often are established with leased telecommunication circuits.

Wide area network - Wikipedia, the free encyclopedia

https://en.wikipedia.org/wiki/Wide_area_network
 
A wide area network WAN) is a geographically dispersed telecommunications network. The term
 is know. A wide area network (WAN) is a telecommunications network or computer network that extends
 over a largA computer network that spans a relatively large geographical area. Typically, a WAN consists 
of two or more 
local-area networks (LANs). Computers connected to a wide-area network are often connected through
 public networks, such as the telephone system. They can also be connected through leased 
lines or satellites.
 www.inc.com/encyclopedia/wide-area-networks-wans.htmlA wide area network (WAN) is a
 data network, usually
 used for connecting computers, that spans a wide geographical area. WANs can be used to 
connect cities, ...WANs are used to connect LANs and other types of networks together, 
so that users and computers in one location can communicate with users 
and computers in other locations. Many WANs are built for one particular organization
 and are private. Others, built by Internet service providers, provide connections from
 an organization's LAN to the Internet. WANs are often built using leased lines. At each end
 of the leased line, a router connects the LAN on one side with a second router within the LAN
 on the other. Leased lines can be very expensive. Instead of using leased lines, WANs can also
 
 
 be built using less costly circuit switching or packet switching methods. Network protocols
  including TCP/IP deliver transport and addressing functions. Protocols including Packet over
 SONET/SDH, MPLS, ATM and Frame Relay are often used by service providers to deliver the links
 that are used in WANs. X.25 was an important early WAN protocol, and is often considered
 to be the "grandfather" of Frame Relay as many of the underlying protocols and functions of
 
                  figar of wide Area Network
   
                      LAN WAN scheme.svg
 
 
 

15. what is the computer virus?

> computer viruses are small programs that are designed to replicate , attach to other program and perform unsolicited and malicious actions to the software system . these virus programs are software use programs so that program will be run the attached virus program as it boots open executes therefore it is said that the virus infectes the executable file or program . these are entered form external sources and easily hide in healthy in healthy software .

A virus is an inactive until you external an infected program or application or start your computer memory and may save itself hard drive or copies itself to application or system files on you use.
an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
"the hepatitis B virus" piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".
Republican presidential candidates focus on national security issues in the first debate since attacks in California and Paris.

                                   figar of computer virus

Tuesday, December 15, 2015

The Internet is an integral part of our everyday lives. But if you are new to the online experience, it may be a bit overwhelming. You may be wondering, "What exactly is the Internet, and how does it work?"
In this lesson, we will give a brief overview of the Internet, and we will talk about
  1. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Origin
1970s (denoting a computer network connecting two or more smaller networks): from inter- ‘reciprocal, mutual’ + network.
Translate internet to
The Internet is an integral part of our everyday lives. But if you are new to the online experience, it may be a bit. Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. It is a that is called internet so it is most important that is called internet .
A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers ...

13. About the internet .

> the internet is a world wide communication which is the connection in all over the world and internet is the use in every place in now days and it is most important in any work in our life that is called internet so it most important. by internet there are many work we can do in our computer it is most use in such as .

1.use in office.
> inter is a most use in any types of office in the any office we can easily calection data and information and  by internet now days world is small by the internet so internet is the most important in office sector.

2.use

Monday, December 14, 2015

11.tyeps of computer .

>A computer network is a interconnection of the various computer systems at diffrerent places. In computer network two or more computer are links. together with a medium and data communication devices for the purpose of communicating data and sharing resource. The computer data provide resource to othere computer on a network is known as server In the network the indivisiol computer which access that is called computer network.
1. On the basis of architecture.
> peer to peer network.
> client server network.
> hybrid network .

2. on the basis of geographical location
> LAN ( Local Area Network)
> WAN (Wide Area Network)
> MAN(Metropolitan Area Network)
   
On the basis of Architecture 

the networking structure is the combined form of networking topology and mode of data transmission from sender to receiver or vice versa.it is essential to carefully choose or select which type of network . Acording to the arthitecture we can classify the network in to two types peer to peer and client server network .

Sunday, December 13, 2015

6. what is the Bluetooth?

> A proposed radio frequency specification that many portable device will use for short range wireless communication is called Bluetooth. witch Bluetooth device such as laptop, computers handheld computers , cellular telephones , pagers , fax machines and printers can wirelessly communicate with each other desktop computers a network or the internet. to use Bluetooth technology each device must include a transceiver chip and be within a specifield range to 100 meters with addition equipment that is called Bluetooth. bluetooth is a running in small area . it is one wireless communication in this communication there are many computers device are can worked. there are serval types of communication media text each it is shoirt range device in thisd

Saturday, December 12, 2015

6.

6. what is the Bluetooth?

> A proposed radio frequency (rf) specification that many portable devices will use for short range wireless communications is called bluetooth. with bluetooth device such as laptop computers handheld computers cellular telephones pagers fax, machines and printers can wirelessly communicate with each other, desktop computers a network, or the internet. to use bluetooth technology, each device must include a transceiver chip and be within a specified range (about 10 meters but can be extended to 100 meters with additional equipment).


there are several types of communication media exit including both physical coaxial cable and wireless cellular radio . some some of media that transmit only one single at a time are called baseband transmiision . other that transmit only one single at a time are called which are called Bluetooth.

Thursday, December 10, 2015

5.

5. what is the HTML?

> HTML is the heart of internet and is know as Hyper Text Markup Language . HTML a defined using the standart Generalized Markup language way of incroporrting . the HTML is such as text , graphigs . e t c . it is use in also crete a web pages . it is incorporating text,graphics,sounds,and vedio all in one dacument knows as HTML.HTML is the simple but powerfull language. the cimplicity of HTML allows to out of web pages creted can be linked together using links usally refrent to a HTML . the user has to just click on get access to related infomation in related HTML that is called HTML. and it based in on two conceps . this HTML chapter will explain how to creat html . it is in easy learning process . HTML code samples will be given at different. it is directly in to the test HTML.

4. what is the computer program?

> A computer program is set of instruction or statement ( also called code) that is out by the computer CPU . A program is typically composed of a main mode. the group of the computer program can form software. computer program is the most important in computer processing. the diffrent work are easly salve by the program that is called computer program. but it is would take they use programming language in interworking of a pc. and an absurd amount. there are two types of programming such as low lavel language and high lavel language.

4. what is the computer program?

> a computer program is set of instruction or statement ( also called code ) that is out by the computer CPU . A program is typically composed of

Wednesday, December 9, 2015

2. what is the RAM ?

> RAM is an acronym for random acess memory . a type of computer memory that can be accecsed randomly , that is any byte of memory can be acced , withhout touching the precending the most comon type of memory found, in computers that is RAM. RAM is the rendom access memory which is memory master of computer. this memory can also read and write but ROM is only read memory. all the data of computer is stord in that memory , RAM is so important memory for computer system . RAM is main storing device for data and information. that is called rendom access memory.

what is the CPU ?

> CPU is the center processing unit, which is mother bold of computer . CPU can processing in data and information in computer system. center processing unit is also worked in in put secter and out put secter so CPU is a recenly important in computer system. all the data and instruction are processing by center processing unit . which is main part of computer system that is the commonly brains of computer system. the CPU is also as known as the processor. the CPU is the responsible for executing a sequince of stord instructions. that is called CPU . it is also electronic crecutute withhin CPU computer can not processing. so computer is mother bold of computer . 

Tuesday, December 8, 2015

1. what is computer?


>  an electronic device for storing and processing data, typically in binary form according to instruction given to in a variable program. that accepts information in computer from out site.
now days computer is a important because the world is small by computer so computer is important.
now days there are many hard worked we can do in computer system. computer is use in many area
such as , in technology, in buesness , in hospital , in internet , in school , so in other. and computer is
a one program in this program data and information store . computer can perform complex and repetitive procedures quickly . and raliably and quickly process. there are many types of computer
computer can input and out put data of information in data processing time. now days all the world cant running without computer. input and out put device in computer are keybord, mouse , e tc and out put device is speker so and types of computer such as .

1. suppercomputer
> supper computer is a most power full computer in terms of data processing . are the supper computer.it computer is use by large data organization .

2. mainframe computer
>  mainframe computer is also some power full computer it is also terms of data processing then after supper computer.
3. minicomputer
4.microcomputer