Skip to main content

Posts

Showing posts with the label tech

Introduction to Programming | What is Programming

What is Programming ? Programming (Computer Programming) is the process of building and designing  an executable computer program to accomplish a specific computing result or to perform a specific task. A computer is a general purpose machines which can perform many computational task and the modern day computers that we have they can perform billions or trillions of calculations within a fraction of second.  These computer's they can't really do anything on their own. so for a computer to do something one has to give the instructions to it and these instructions will contain step by step information to perform a specific task and these are called as program . Who is Programmer ? The person who is going to write these instructions or the program is called as the programmer and here the programmer will write the program and the computer will execute that or computer will work on that instructions. What is Programming Language? The language in which the instruction...

How to know if my computer is hacked? And some Security Tips.

©Copyright 2020 | Tech and Education   * While working on the computer, you notice that the system is working very slowly, file are corrupted, default home page on the web browsers has changed, lot of memory is consumed, and unnecessary pop-ups are coming. what can be the probable reason ? *  Reason ~>  The computer gets infected from Spyware . It monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers . It also sends information back to the Spyware's home base via the user's Internet connection, thus it eats user's Internet Connection, thus it eats user's Internet Connection, thus it eats user's internet bandwidth. *  You have very important data on your computer, How will you ensure that this data remains safe ? * Security Tips for safe your important data ~>  We can make our important data safe on ...

5G Technology | What is 5G ?

  5G is the fifth generation of mobile networks . Think of 5G in such a way that 4G is 100 times the speed of the network.  Like 4G, 5G is based on the same mobile programming principle. Fifth generation voice technology is capable of delivering ultra low latency (signal speed between your phone and tower) and multi-Gbps data speeds. It is a software-based network, developed to increase the speed and functionality of wireless networks . This technique also increases data quantity, which can be transmitted to wireless networks . 5G technology forms the basis of five technologies 1. millimeter wave 2. Small Sales 3. Maximum MIMO 4. Beamforming 5. Full duplex 5 bases of 5G technology The 5G technology is capable of operating in the "sub-6 band", with frequencies typically between 3Ghz-6Ghz. Most current devices like mobiles,  tablets and laptops also operate in the same frequency, which has a very high reach. Millimeter-wave 5G The millimeter-wave 5G acquires a lot of data...

Types of Network

Network in computer system Based upon geographical area, networks can be divided into three broad categories: LAN MAN WAN LAN (Local Area Network) : LAN is a type of network in which computers (nodes) are connected in a local unit or small geographical area, such as offices, department of a manufacturing unit, etc. The common connecting media used in LAN are cables, wi-fi etc. LANs are restricted in size and are convenient to handle. Characteristics of LAN: In LAN, data communication takes place at a rate of 100-1000 mbps. It is owned by an individual or an organization. It provides the user with an access to share several common hardware resources viz. computers, terminals, printers, server etc. There is no specific tariff for its usages. MAN (Metropolitan Area Network) : Man is a type of network in which the computers are connected over large geographical area such as a city. It may be a single network or may be a network that connects several LANs. MAN may be operated by a single or...

Application of Computers

Application of Computers /Communication/  In the past, people used to communicate through letters, telephones etc. The advent of computers has made it possible to share or exchange information in real time i.e.  instant exchange of information, be it textual, Graphical or visual form any corner of the world in different ways:  Email : It enables to send the soft copy of letters, images or videos instantly to any user of a computer on the internet. Online Chatting : It helps to establish real time communication by exchanging the typed  instantly (Instant Messenger) on the computer. Such a facility has enabled communication groups between two or more people at the same time from far off locations thus forming newsgroups. Video Conferencing : It enables a live streaming of visual between two or more people through computers and the Internet . FTP : It enables to transfer files between computers which are connected in a network. Telnet: It is a facility which enables to ...

Protocol In Internet

  Protocol A protocol is a conversation or standard that regulates the operation of devices. It can be defined as the set of rules governing the syntax, semantics and synchronization of communications between hardware, software or both. The primary protocol of internet is TCP/IP protocol which stands for Transmission Control Protocol/Internet Protocol. TCP is meant for connection oriented transmission and IP is meant for connectionless transmission that represent logical address of the host machine, example http:// for accessing HTML documents, https:// for accessing ' Secure ' HTML document. Hyper Text Transfer Protocol (HTTP) It is a protocol that is used to display information on the World Wide Web . Its main purpose is to provide a way to display and retrieve HTML pages. It is a request/response protocol between clients and server . File Transfer Protocol (FTP) IT is a client/server protocol that helps in transferring or exchanging files between client and server. It may be...

best antivirus software for windows 10

Before you know best antivirus software for windows 10 you must know about what is antivirus ? As there are medicines to keep healthy to fight against virus that infect our body, In the same way, in computers there are antivirus software which are used to clean unwanted programs from a computer system and prevent the attack of virus, helping in proper and smooth functioning of a computer system. Antivirus are remedial software that scan, detect, clean and remove virus from a computer system, some antivirus softwares also help to recover data. Once antivirus software is located in a computer, it prevents the attack of virus which is knows in its directory, it also keeps on informing about the attack of virus and its type. But if some new viruses get developed after the production/manufacturing of the loaded antivirus, then it may not be recognized by existing antivirus and therefore it would be unable to prevent or clean that virus. In that case the existing antivirus has to be upgraded...

What is Software Piracy ? Fully Explained

Tech and Education What is Software Piracy ? Introduction It is an unauthorized copying, reproduction or  usage of software products. Installation of any copy of the software by making its duplicate without paying the cost to the original developer is known as Software Piracy.     Software piracy also harms the local and national economies as scarce sales of legitimate software results in the loss of tax revenue. There are many types of software piracies that are damaging the software developing companies & the end users too. Some of them are: Soft Loading: It means purchasing a single licence version of the software & then installing the software into several computers resulting in the violation of licence terms. Software Counterfeiting: It occurs when fake copies of a software are produced in such a way that they appear to be authentic. Counterfeit software is commonly produced by using a CD burner to copy the software and by making photocopies of the manual. So...

What is Wi-Fi ?

Wi-Fi(Wireless Fidelity) is a network of wireless connection. It is a mode of communication that established. Wi-Fi networks is established by radio frequency like Bluetooth, but has more power, resulting into a strong connection. Wi-Fi is sometimes called 'Wireless Ethernet'. Wi-Fi connections are commonly established in electronic gazettes including video games consoles, home network, PDAs, tablets, mobile phones, I-Pad, I-Pod etc. A wi-fi enabled device such as a PC or PDA can connect to Internet within a range of (wi-fi) wireless network that is connected to the internet . To form a wireless  computer  network a Wi-Fi adaptor (802.11 b/g) is required with each computer or terminal device. For establishing connection in a local area, access points are installed that increases and coordinates the frequency for transmission and for regularizing the bandwidth of data transfer. Many companies or institutions make their campus as Wi-Fi zone i.e. in which people in the campus c...

Disadvantage of Internet

Cyber Crime:- The Internet provides a huge & diversified platform to work. Some people misuse it and perform illegal and inappropriate actions such as piracy, hacking, plagiarism etc. through the use of the technology. Such antisocial or immoral internet activities are known as cyber-crimes. Almost every country has its own specific cyber-crime control department to deal with cyber-crimes. Spread of Wrong Information:- Internet is an open facility through which sometimes rumors can also be spread. Deterioration of Emotional attachment:- Because of the overuse of the internet and mobile phones for contacting people, there is a sense of disconnection with others in converying the real feelings and due to the lesser face meetings or interactions and the emotional connection between people is fading away. As the people are getting addicted to the Internet, it has led to personal loss too. We find very less quality time to spend and share with family and friends. The youngster are not a...

Artificial Intelligence

Artificial Intelligence When we prepare a computer in such a way that it can act like a human's intelligence, it is called artificial intelligence says that when we set a program in a machine that it can work like human so where does he go to artificial intelligence . To understand AI it is necessary to understand these 6 words Visual Perception Speech Recognition Decision Making Language Translation Knowledge Reasoning Ability According to John Macatha's father of Artificial Intelligence, It is the science and engineering of making intelligent machines especially intelligent computer programs.  Artificial Intelligence is a way to build a computer, a computer-controlled robot, or a software intelligence. Things, just as intelligent people think. A.I is studied by the fact that humans how the brain thinks, and how humans learn, decide, and try to solve a problem work, and then the results of this study based on developing intelligent software and system use. The goal of Artific...

What is Firewall ?

Firewall A firewall is a network security system designed to prevent an unauthorized access to or form a private network. It acts as a barrier between a trusted network and be implemented in both hardware and software or a combination of both. In a easy way, You can say, In a computer, a firewall is a network security that monitors and controls incoming and outgoing network traffic. Firewall (like moat) must be installed in the server or workstations. It protects the system from unauthorized access and ensures that requests for transaction can be made to a system from an authorized workstation only. What Firewalls Do ?  Basically, firewalls need to be able to perform the following tasks: Act as an intermediary  Defend resources Record and report on events Validate access Manage and control network traffic Types of Firewalls Proxies firewalls/Server A proxies server may acts as a firewall by responding to input packets in the manner of an application, while blocking other packe...