Skip to main content

Posts

Showing posts with the label technology

Introduction to Programming | What is Programming

What is Programming ? Programming (Computer Programming) is the process of building and designing  an executable computer program to accomplish a specific computing result or to perform a specific task. A computer is a general purpose machines which can perform many computational task and the modern day computers that we have they can perform billions or trillions of calculations within a fraction of second.  These computer's they can't really do anything on their own. so for a computer to do something one has to give the instructions to it and these instructions will contain step by step information to perform a specific task and these are called as program . Who is Programmer ? The person who is going to write these instructions or the program is called as the programmer and here the programmer will write the program and the computer will execute that or computer will work on that instructions. What is Programming Language? The language in which the instruction...

How to know if my computer is hacked? And some Security Tips.

©Copyright 2020 | Tech and Education   * While working on the computer, you notice that the system is working very slowly, file are corrupted, default home page on the web browsers has changed, lot of memory is consumed, and unnecessary pop-ups are coming. what can be the probable reason ? *  Reason ~>  The computer gets infected from Spyware . It monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers . It also sends information back to the Spyware's home base via the user's Internet connection, thus it eats user's Internet Connection, thus it eats user's Internet Connection, thus it eats user's internet bandwidth. *  You have very important data on your computer, How will you ensure that this data remains safe ? * Security Tips for safe your important data ~>  We can make our important data safe on ...

5G Technology | What is 5G ?

  5G is the fifth generation of mobile networks . Think of 5G in such a way that 4G is 100 times the speed of the network.  Like 4G, 5G is based on the same mobile programming principle. Fifth generation voice technology is capable of delivering ultra low latency (signal speed between your phone and tower) and multi-Gbps data speeds. It is a software-based network, developed to increase the speed and functionality of wireless networks . This technique also increases data quantity, which can be transmitted to wireless networks . 5G technology forms the basis of five technologies 1. millimeter wave 2. Small Sales 3. Maximum MIMO 4. Beamforming 5. Full duplex 5 bases of 5G technology The 5G technology is capable of operating in the "sub-6 band", with frequencies typically between 3Ghz-6Ghz. Most current devices like mobiles,  tablets and laptops also operate in the same frequency, which has a very high reach. Millimeter-wave 5G The millimeter-wave 5G acquires a lot of data...

Types of Network

Network in computer system Based upon geographical area, networks can be divided into three broad categories: LAN MAN WAN LAN (Local Area Network) : LAN is a type of network in which computers (nodes) are connected in a local unit or small geographical area, such as offices, department of a manufacturing unit, etc. The common connecting media used in LAN are cables, wi-fi etc. LANs are restricted in size and are convenient to handle. Characteristics of LAN: In LAN, data communication takes place at a rate of 100-1000 mbps. It is owned by an individual or an organization. It provides the user with an access to share several common hardware resources viz. computers, terminals, printers, server etc. There is no specific tariff for its usages. MAN (Metropolitan Area Network) : Man is a type of network in which the computers are connected over large geographical area such as a city. It may be a single network or may be a network that connects several LANs. MAN may be operated by a single or...

Application of Computers

Application of Computers /Communication/  In the past, people used to communicate through letters, telephones etc. The advent of computers has made it possible to share or exchange information in real time i.e.  instant exchange of information, be it textual, Graphical or visual form any corner of the world in different ways:  Email : It enables to send the soft copy of letters, images or videos instantly to any user of a computer on the internet. Online Chatting : It helps to establish real time communication by exchanging the typed  instantly (Instant Messenger) on the computer. Such a facility has enabled communication groups between two or more people at the same time from far off locations thus forming newsgroups. Video Conferencing : It enables a live streaming of visual between two or more people through computers and the Internet . FTP : It enables to transfer files between computers which are connected in a network. Telnet: It is a facility which enables to ...

Protocol In Internet

  Protocol A protocol is a conversation or standard that regulates the operation of devices. It can be defined as the set of rules governing the syntax, semantics and synchronization of communications between hardware, software or both. The primary protocol of internet is TCP/IP protocol which stands for Transmission Control Protocol/Internet Protocol. TCP is meant for connection oriented transmission and IP is meant for connectionless transmission that represent logical address of the host machine, example http:// for accessing HTML documents, https:// for accessing ' Secure ' HTML document. Hyper Text Transfer Protocol (HTTP) It is a protocol that is used to display information on the World Wide Web . Its main purpose is to provide a way to display and retrieve HTML pages. It is a request/response protocol between clients and server . File Transfer Protocol (FTP) IT is a client/server protocol that helps in transferring or exchanging files between client and server. It may be...

What is Bluetooth ? | Tech and Education

Bluetooth is a wireless network connectivity that enables to connect or transfer data between devices over a short range like between mobile phones, laptops, personal computers , printers etc. The connectivity is based on radio waves technology & takes place through bluetooth dongle or inbuilt bluetooth service present in the devices like mobile.  The connectivity through Bluetooth consumes less power & the physical range of communication is upto 100 metres. Bluetooth communication is applied at many places like for bar code scanning, hands free headset, wireless connectivity of a PC with input and output devices. DO YOU KNOW ? 🤔🤔🤔 The Bluetooth specifications are developed and licensed by the Bluetooth special Interest Group (SIG). IEEE standard for Bluetooth is IEEE 802.15.1 .

What is Trojan Horse ? | Tech and Education

What is Trojan Horse ? Definition Trojans are infectious program which is silently infect the computer and corrupt the files of a host computer. Such a games, but unlike worms they don't replicate themselves. They are active inside the computer when the user is busy interacting with the entertaining programs or with interface like computer games. Some examples of Trojans are Linux Wifatch , Infostealer.kronbank , etc. Trojan horses are often used by Hackers as they can enter into the database of a computer system under the guise of some entertaining package. The term " backdoor " is often used for Trojan Horse . The users interacts with the programs and simultaneously the infection takes place behind the interactive interface. Once a trojan horse has infected a computer system, it becomes easier for a hacker to operations and steal important information from the infected computer. To prevent a 'Trojan Horse' Virus from entering and infecting a computer it is advis...

What is a Digital Signature ?

Digital Signature Digital Signature can be used to authenticate the generic use to verify the integrity. Digital Signature is also known as 'public key crytography' , which employs an algorithm that uses two different keys, one for creating a digital signature or that transforms data into an unintelligible form while data is transferred (private key) and the other for returning the message to its original form when data is at the genuine recipient end (public key).  __________________________________________________________________________ In Tech and Education today, I told you about Digital signature.  These are a kind of practices for online transaction.  If you want more information, then you follow our website.  And share it so that others can get information.   _____________________________________________________________________________________________

What is Software Piracy ? Fully Explained

Tech and Education What is Software Piracy ? Introduction It is an unauthorized copying, reproduction or  usage of software products. Installation of any copy of the software by making its duplicate without paying the cost to the original developer is known as Software Piracy.     Software piracy also harms the local and national economies as scarce sales of legitimate software results in the loss of tax revenue. There are many types of software piracies that are damaging the software developing companies & the end users too. Some of them are: Soft Loading: It means purchasing a single licence version of the software & then installing the software into several computers resulting in the violation of licence terms. Software Counterfeiting: It occurs when fake copies of a software are produced in such a way that they appear to be authentic. Counterfeit software is commonly produced by using a CD burner to copy the software and by making photocopies of the manual. So...

What is Wi-Fi ?

Wi-Fi(Wireless Fidelity) is a network of wireless connection. It is a mode of communication that established. Wi-Fi networks is established by radio frequency like Bluetooth, but has more power, resulting into a strong connection. Wi-Fi is sometimes called 'Wireless Ethernet'. Wi-Fi connections are commonly established in electronic gazettes including video games consoles, home network, PDAs, tablets, mobile phones, I-Pad, I-Pod etc. A wi-fi enabled device such as a PC or PDA can connect to Internet within a range of (wi-fi) wireless network that is connected to the internet . To form a wireless  computer  network a Wi-Fi adaptor (802.11 b/g) is required with each computer or terminal device. For establishing connection in a local area, access points are installed that increases and coordinates the frequency for transmission and for regularizing the bandwidth of data transfer. Many companies or institutions make their campus as Wi-Fi zone i.e. in which people in the campus c...

What is Data ?

What is data? if you use a computer then you must have heard the word "Data". Data is an important part of the computer on which all work is done. Data is input and output into the computer. The CPU's job is to process the data. This post is an attempt to know what is computer data, data processing and type of data in this post. The career record of any player, number of children in school, population of India, name of someone, all these are called Terms Data. Data is managed, controlled and processed in a computer. What is computer data or information? Data is also called Information or simply say that Information is "Data". Input Processed Data is called Information. Information is important for the user. For example, a news anchor reads "news". This news is information for us. Whereas it is Processed Data for News Anchor. The information is ready by collecting raw data and processing it. You can also understand data or information in this way - as ...

Digital Footprint

Digital footprint refers to a unique set of digital activities, actions, contributions and communications of an individual that are manifested on the Internet or on platform digital devices. It is also known as Digital Shadow. There are two main classifications for digital footprints i.e. passive and active. A passive digital footprint is created when an individual's digital activities are being traced without permission whereas the active digital footprints are created when a personal data is deliberately shared by a user on a social media, blog etc. Also Read what is hacker what is internet disadvantage of internet If you want to know about anything then you follow our website