Computer Technology & New Google: 2016

Friday, December 30, 2016

याे सरासर गलत समचार हाे, त्यसैले विश्वास नगराै "राताे नम्बर बाट अाएकाे फाेन" यस्ताे छ बास्तविक।

News:-कवि भूपी शेरचनले भनेका थिए, ‘नेपाल हल्लैहल्लाको देश हो ।’ सायद ठीकै भनेका थिए उनले । नेपाल हल्लैहल्लाको भरमा बेलाबखत तरङ्गित हुने गरेको छ । यस्तै एउटा हल्लाको पछिल्लो संस्करणले केही दिनयता देशभर त्रास फैलिरहेको छ ।
सायद तपाईंले पनि सुन्नु भएको होला, ‘रातो नम्बरबाट आएको फोन उठाउँदा मान्छे मर्यो रे !’ अहिले यो हल्ला ‘दिन दोगुना, रात चौगुना’ भनेझैँ फैलिरहेको छ । मानिसहरुले एसएमएस गरेर, फोन गरेर तथा सामाजिक सञ्जालमार्फत आफ्ना आफन्त र साथीभाइलाई सचेत रहन भनिरहेका छन् । हल्लामा मान्छे मरेको भनिएका क्षेत्रहरुचाहिँ कसैले नुवाकोट, कसैले धादिङ त कसैले मकवानपुर भनेका छन् ।
त्यसैगरी फोन आएका भनिएका मोबाइलहरु एनसेल छन् ।यो हल्ला अहिले यति भाइरल बनिसक्यो कि कन्ट्रोल गर्नै नसकिने अवस्था छ । आम मानिसहरु त्रसित बन्न थालेपछि यसको वास्तविकताबारे बुझ्ने प्रयास यसरी गरीएकाे छ ।
एनसेल भन्छ, ‘हल्लाको पछि नलाग्नुस्’
हामीले यसबारे एनसेलसँग बुझ्ने प्रयास गर्यौँ । सुरुमा ग्राहक सेवा प्रतिनिधिसँग कुरा गर्दा उनी यो हल्लाले वाक्कदिक्क भइसकेका रहेछन् । दिनमै सयौँ कल यस्तै चासो राख्नेहरुको आउँदो रहेछ । उनले यसबारे अफिसमा पनि कुरा भइसकेको, यो हल्लामात्र रहेको निष्कर्ष निकालिएको जवाफ दिए ।
सामाजिक सञ्चालका एक प्रयोगकर्ताले एनसेलको आधिकारिक पेजमा नै जिज्ञासा राखेका रहेछन् । त्यहाँ पनि एनसेलले यो हल्लामात्र भएको जवाफ फर्काएको छ ।‘रातो नम्बरबाट आएको फोन उठाए मरिने हल्ला छ के हो यो ?’ केदार पौडेल नाम गरेका फेसबुक प्रयोगकर्ताले सोधेको प्रश्नमा एनसेलले आफ्नो आधिकारिक फेसबुक पेजबाट जवाफ फर्काएको छ, ‘कृपया यस्तो हल्लाको पछाडि लाग्न नहुन ग्राहक बर्गहरुमा अनुरोध छ ।’
धादिङ प्रहरीलाई जानकारी छैन
गाउँ-गाउँमासमेत सानातिना घटना घट्दा पनि प्रहरीलाई जानकारी हुन्छ । त्यसैले हामीले हल्लामा नाम जोडिएको जिल्ला धादिङका डिएसपी दिपेन्द्र पञ्जियारलाई सम्पर्क गर्यौँ । उनले त हल्लासमेत सुनेका रहेनछन् । ‘मैले त हल्ला पनि सुनेको छैन । केही भएको भए त आउँथ्यो । सायद हल्लामात्र हो यो,’ साझापोस्टसँग उनले भने ।
धादिङ प्रहरीकै सञ्चार शाखामा भने यस्तो हल्ला पुगेको रहेछ । सञ्चार विभागमा कार्यरत प्रहरी अधिकृत भन्दै थिए, ‘हल्ला त मैले पनि सुनेको हो । मकवानपुर तिर रे भनेर फेसबुकमा लेखेको देखेको थिएँ । तर, हामीकहाँ त्यस्तो कुनै जानकारी आएको छैन । भए त आइहाल्थ्यो नि !’
नुवाकोट प्रहरीमा केही व्यक्ति मोबाइल फाल्यौँ भन्दै आएका थिए
त्यसपछि हामीले नुवाकोट प्रहरीका डिएसपी ऋषिराम कंडेललाई सम्पर्क गर्यौँ । उनले हल्ला मज्जैसँग सुनेका रहेछन् । ‘हल्ला त मैले पनि सुनेको हो । अस्ति दुईतीन जना युवा ‘रातो नम्बरबाट फोन आयो त्यसपछि मोबाइल फाल्यौँ’ भन्दै हामीकहाँ आएका थिए ।
तर फोन आएको हामीले देखेनौँ । उनीहरुले नै भनेका थिए, ‘कताकता मान्छे पनि मरे रे !’ तर यो हल्लामात्र हो । यस्तो फोन रिसिभ गर्दा मरेको भनिएको कुनै पनि व्यक्तिबारे जानकारी छैन ।’यो कुरा हल्लामात्र हो भन्ने निष्कर्षमा उनी पनि पुगिसकेका रहेछन् ।
मकवानपुर प्रहरीलाई जानकारी छैन
मकवानपुरका प्रहरी इन्सपेक्टर सुरक्षा केसीले भने यस्तो हल्लासमेत आफूले नसुनेको बताइन् । ‘मैले त हल्ला पनि सुनेका छैनौँ, त्यस्तो कुनै उजुरी पनि आएको छैन,’ उनले भनिन् ।
आजभोलि ठेस लागेर लड्दा मान्छे मरेको जानकारीसमेत प्रहरीकोमा आउँछ । सानासाना घटनाबारे पनि प्रहरीलाई जानकारी गराउने प्रचलन छ । प्राकृतिक ढंगको स्वभाविक मृत्युबाहेक अन्य जुनसुकै कारणले मानिस मरे पनि पोस्टमार्टम बिना शवको दाहसंस्कारसमेत हुँदैन ।
पोस्टमार्टम अघि प्रहरीले घटनास्थलमा पुगेर मुचुल्का उठाउनुपर्छ । अब तपाईं आफैँ भन्नुस्, सम्बन्धित जिल्लास्थित प्रहरीलाई समेत जानकारी नभएको कुरा वास्तविक कसरी हुन सक्ला त ? आफ्नो परिवारका सदस्यको फोन उठाउँदा मृत्यु भयो भने चुपचाप दाहसंस्कार कसैले गर्ला ? पक्कै पनि गर्दैन ।
बरु हामीकहाँ त लास सडकमा राखेर पैसाका लागि बार्गेनिङचाहिँ हुनसक्छ । माथिका तमाम जानकारीहरुबाट पनि निष्कर्ष निकाल्न सकिन्छ, यो हल्ला मात्र हो । हल्लाको पछि नलागौँ । बाँकी रहे सामाजिक सञ्जालमा रेड नम्बरबाट फोन आएको देखाइएका स्क्रिनशर्टहरु, ती फोटोशप्ड हुन सक्छन् ।

Saturday, May 14, 2016

How to turn your Num lock Forever?

How to turn your Num lock Forever?



You can set your Num.  lock to stay on by default when you logon your system. There are two different techniques to set Num. lock stay on default.



1.  If you can use Registry Editor correctly then Click on start button and type regedt32.exe in Run     command. Here Navigate to HKEY_USERS\.Default\Control panel\Keyboard and change the       value for InitialkeyboardIndicators from 0 to 2.
2. You can do same by configuring the script to change the NUM LOCK state. Click start button and then open Notepad. Copy the giving code and paste in Notepad.
Set Wshshell=CreateObject("WScript.Shell")
WshShell.SendKeys"{NUMLOCK}"
Now save this file with name "num.vbs" must including the quotes. At the end copy this file to user     startup folder. The path for this folder is Documents and settings\AllUsers\startMenu\Programs\Startup.

 Now restart the computer.Num lock should come on and stay on.

Wednesday, May 11, 2016

PRINTER

PRINTER

Printer is a hard output device. A printer produces output usually in the form of text, on paper. There are lots of different printers available in the market. The most commonly used types of printers are:-


1.Dot-Matrix Printers
2.Ink Jet Printers
3.Laser Printers




1. DOT-MATRIX PRINTER
               A type of Printer that Produces characters and illustrations by striking pins against an  link ribbon to print closely spaced dots in the appropriate shape. Dot-Matrix printers are relatively expensive and do not produce high-quality output. However, they can print to multi page form( that is, carbon copy) Something laser and inkjet printer cannot do.
It forms characters on a page according to a pattern set for each character. It is mostly, use in commercial environment for invoice and report printing, where quality and  speed are not important. They are cheap to run and to  maintain but do not produce high quality output. it gives an output by striking its head on to the paper through the ribbon cartridge.
Dot-Matrix printer very in two important characteristics:-

  • Speed:- Given in character per second the speed can vary from about 50 to over 500 cps. Most dot-matrix printers offer different speeds depending on the quality of print desired.
  • Print quality:- Determined by the number of pins (the  mechanisms  that print the dots), it can vary from 9 to 24. The best dot-matrix printers (24 pins) can produce near letter-quality type,although you can still see difference if  you look closely.In addition to these characteristics, you should also consider the noise factor. Compared to laser and ink-jet printers, dot-matrix printers are notorious for  making a racket.

    2. INK-JET PRINTER

Tuesday, May 10, 2016

DISPLAY ADAPTOR/CARD(VIDEO/GRAPHIC CARD)

DISPLAY ADAPTOR


         A computer and a Monitor without any video display card attached to it is of no use for us. A display adapter is a video card is a most for transferring data that is to be displayed on the screen, from the processor to the monitor.
              Video add-on cards are available in the three basic group, the 8-bit, 16-bit, and the 32-bit. These terms referred to the amount of data that can be transferred at one single pass. A 16-bit card can send data to the monitor in the half time required by an 8-bit card.




1. Monochrome Display Adapter (MDA)
                                                        
                                                     The original and simplest display combination in IBM monochrome display adapter and IBM monochrome display monitor introduce in 1981 by IBM. This adapter  could display only text( No Graphics in One Color) at a resolution of 640 pixel with width by 350 pixel height. Because of it's clarity and high resolution, 640 x 350 pixel, it is the best  suited for word processing work. Monochrome Monitor display clear and attractive characters. 


2. Color Graphics Adapter (CGA)
                     
                                               The video adapter was also introduced by IBM, which provided low-resolution text and graphics. CGA Provided several different text and several including 40 or 80 columns by 25 line, 16 color text mode, and graphics modes of 640 horizontal  pixels by 200 vertical pixels with 2 color, or 320 horizontal pixels with 4 colors.



3. Video Graphics Array (VGA) 
                     
                                         VGA stands for Video Graphics array and it uses a special video  chip to generate display. IBM, the producer of first such chip, uses a VLSI ( Very Large Scale Integration) chip comprising of a huge number of logic gate array to make video circuitary. VGA offers more graphics, more colors and highest resolution of any graphics adapter before it.


4. Super VGA

                   Super VGA refers to any enhancements to existing IBM VGA standard. The original standard set by VESA (Video Electronis Standards Association) was that of 800 x 600 resolution and 16 colors. However today cards are produced with 256 colors and even 1024 x 720 resolution. The number of colors on higher resolution increase in the newer graphics display standard like the Super VGA, the Extended Graphics Standard (XVG).


HARD DRIVE RELATED FAULTS

HARD DRIVE RELATED FAULTS

          
                            The hard drive does not spin when i start my computer. Is the power lead connected properly? If yes, try to different connector. Do other device, such as the CD ROM work with the power connector? If yes, the hard drive itself might be faulty. 
                           The hard drive spin but the BIOS will not defect it. Has a proper 40pin IDE ribbon cable been used and is it connected the right way around the (red wire to pin 1)? If yes, try a different ribbon. Are the jumpers of the hard drive set correctly? Is there another device that has been set wrongly to the same setting? Remember : one primary master, on primary slave, one secondary master, and one secondary slaves.

                The hard drive has been detected by BIOS but I cannot boot from it. The system boots OK from a boot-up floppy. Check whether your hard drive is the highest in the IDE hierarchy or whether another IDE device is using  a higher setting. If everything is set up OK, boot from a floppy and try to access the hard drive, most likely you have not set an active partition, without which you cannot boot. If you cannot access the drive at all : have you partitioned, and formatted it yet?
The drive workers as a slave, but not as master, or vice versa. check the master/slave jumper on the back  of the drive for the correct setting. Have a look if BIOS is setup correctly. If everything seems OK, your drive might be faulty. 

                   
    The computer does not manage to format my hard drive. There is definitely something wrong with  the hard drive itself. If it's a new one, Bring it Back and ask for replacement. If it's an old one, try the low level format utility in the BIOS. If that does not work, your hard drive is probably down for good. Sometimes i cannot boot from the hard drive or the BIOS cannot detect it. IF your BIOS is not set to auto detect the hard drive or if you cannot detect the drive from within the BIOS, It is likely or drive failure. If it is detectable, than the driver is probably fine. Have you Prepared the Drive? a hard drive mostly formatted and partition before it can be use. If you get a specific error message, base your troubleshooting on the information. I cannot partition over 2 GB insize. If you are running DOS or The First edition of the Windows 95, You are Using the FAT 16 file system. FAT 16 one only access upto 16 GB. Upgrade later version of windows.

The Motherboard - Main Components

The Motherboard - Main Components 



The Most Important Component of any computer is the Motherboard. The Motherboard is the Largest board of the computer system. it is also called system Board. The Motherboard is located on the left side of PC's case on the bottom. It is usually green sheet of fiberglass with many chips, resistors, the heart of the computer i.e  power supply and contains many other organs of the  computer system. It  also contain the memory i.e RAM and ROM and many other supporting logic circuits to make complete computer work as a proper  system. Instead of "Motherboard" IBM refers to it as "System Board" or "Planner Board" but sometime other manufacture refers to it as "Logic  Board". It accept the CPU, Memory, Various plug-in peripherals, connectors and supporting circuitry. Motherboard Defines the types of system by defining the types of processor it accepts, by the cheapest features and by its architecture.

                            IBM decides that there should be use two different types of technologies, which were being use to make personal computer. There are:-
A. BUS Based Computers
B. Single Board Based Computers



A.  BUS BASED COMPUTER

                                   These  bus based computers have use the main board as the backbone of the computer system. This Bus board contains Number of buses through which the data can be sent from one place to another and it also contain the number of slots onto which we can connect various different devices. Mainly the expansion cards are connected onto the expansions slots. In this types of bus based computer there are three Buses. These are:-
1. Address Bus
2. Data Bus
3. Control Bus


ADDRESS BUS

                          Group of lines carrying the addressing information use to describe the memory location to where the data is being transferred.

DATA BUS

                     A set of lines use to carrying the data.

CONTROL BUS
 
                          It is used for carrying a set of control signals that control the flow of data.


            These buses are provided on these boards . The main advantage of this types of the board is that, whenever any part fails, the board on which that part is located can be removed and replaced with working board, very easily and so it makes the maintenance of the system very easy. In these types of computers, different parts of a  system such as Main Processor, Memory, Display Card etc. are put on separate cards and connected to the  main system bus through the expansion  slots.



B. SINGLE BOARD BASED COMPUTERS

                                           The other approach in the computer design is a single board base system. These types of board contains all the chips and circuits to make proper system. These types of boards are easy to manufacture and design and it is  less expensive than bus based types of computers. The video games computers and home computers are generally this types of system. In this system we cannot connect any other additional device; all the devices are available on the Motherboard itself.
                     There is no option or having no scope of upgrading or adding any new device introduce in the market to the system. In this types of system if any of the components fails, the user will have to discard the complete circuit board means that we cannot repair or maintenance any of the components.
When the IBM first introduce the system in the market, they have decided that they will use the single board based computer. This Board contains all most all important parts of a computer such as main processor, memory, supporter chips etc. but at the same time it has provide an expansion slots( i.e Bus Base system) on the main board to connect new additional device to the system. Also, some common I/O devices such as display, serial-parallel interface, storage device etc are connect to the basic system through these expansion slots. so, this design gives the popularity to the whole world and it makes the system more reliable and at the same times the slots on the motherboard provides the facilities for future upgrade and maintenance of the system and it makes so easy as compared to single board based system.
      As already mentioned on the case page, the main major architecture these days is ATX. Make sure that you buy the motherboard architecture that your case and power supply supports, or that you buy the right case for your motherboard. AT and ATX motherboard, For example have different power connectors, different sizes, different  mount holes,etc but importantly, a different back panel.

The Chipset

The Chipset



   The features of a motherboard can easily be determined by looking its chipset. Selecting a chipset eliminates many decisions you have to make in selecting a motherboard. There are many different chipsets on the market, Intel and AMD Chipets being among the best and most popular.
   All chipsets have certain features in common, for example:



  •  AGP and PCI support 
  •  USB Support
  •  Power Management
  •  I/O Management
  •  IDE Support
  •  Real Time Clock
      But there are differences, such as what CPU they accept, how many memory slots they have and how much memory they can take. So you see it all depends what you want to do with your computer and how much money you want to spend. Some motherboards available offer all input output as 'onboard' features you may desire though, always think of the possibility an expansion card based device offers you in case of a device failure and remember that you cannot replace or upgrade any components that com as 'onboard' features you may desire though, always think of the possibility an cannot replace or upgrade any components that comes as 'onboard' features. However,if you need to, it is possible to set the jumpers or the BIOS in order to disable the defect device and replace it with a plug-in card. Depending on your purse it certainly seems a good idea to go for a cheaper type motherboard with many onboard features, but at the end of the day you will probably pay heavily for your decision once it's time to upgrade. The Motherboard is generally thought to be the most important part of a computer. And yes,it is. However, the chipset on the motherbaord is the most important part of the board itself as it defines almost everything about the system.

                       The chipset controls the system and its capabilities. It is the hub of all data transfer. It is a series of chips on the motherboard, easily identified as the largest chips on the board with the exception of the CPU. Chip sets are integrated, meaning they are soldered onto the board and are not upgradeable without buying a whole new motherboard. All of data must go through the chipset. All components talk to the CPU through the chipset. To make order out of all this data, the chipset makes use of th DMA controller and the bus controller. 
                       Since chipsets are so important use of the DMA controller and the Bus Controller. The chipset maker needs to keep up with Bios and memory makers, since all of these parts work together and the chipset is the HUB of it all. Chipsets replace the large number of chips that used to crowd a motherboard. Chipsets now take longer for to manufacture than old ones used to.

THE PROCESSOR - CPU( Central Processing Unit)

CPU(CENTRAL PROCESSING UNIT)


   The main unit inside the computer is the CPU. This Unit is responsible for all events inside the computer. It controls all internal and external devices, performs arithmetic and logic operation. The CPU is the device that interprets and executes instructions.





  The operations, a microprocessor performs are called the instruction set of this processor. Processors differs from one to another by the instruction set. If the same program can run on two different computer brands they are said to be compatible. Programs written for IBM compatible computers will not run on apple computers because these two architectures are not compatible.

                        Mainframes and early minicomputers contained circuit boards full of integrated circuits cards that implemented the central processing unit. Today's single-chip central processing units, called microprocessors, make personal computers and workstations possible. The CPU has the ability to fetch, decode, and execute instructions and transfer information to and from other resources over the computer's main data-transfer path, the bus. By definition, the CPU is the chip that functions as the "brain" of a computer. In some instances, however the term encompasses both the processor and the computer's memory or, even more broadly, the main computer console.
         
The CPU is  composed of several units:-



THE CONTROL UNIT (CU)   directs and controls the activities of the internal and external devices. It interprets the instructions obtained into the computer, determines what data are needed where it is stored, where t store the results of the operation, and sends the control signals to the devices involved in the execution of the instructions.




THE ARITHMETIC AND LOGIC UNIT(ALU) is the part where actual computations take place. It  consists of circuits which perform arithmetic operations (e.g. addition, subtraction, multiplication, division) over data received from memory and capable to compare numbers.
                                  While performing these operations the ALU takes data from the temporary storage are inside the CPU needed REGISTERS. Registers are a group of cells used for memory  addressing, data manipulation and processing.  Some of the registers are general purpose and some are reserved for certain functions. It is a high speed memory, which holds only data for the next instruction, they are sent back to the main memory and registers are occupied be the new data used in the next instruction.

All the activities in the computer system are composed of thousands of individual steps. This steps should follow in some order in fixed intervals of time. These interval are generated by the CLOCK UNIT. Every operation within the CPU takes place at the clock pulse. No operation, regardless of how simple  can performed in less time than transpires between ticks of this clock. But some operations require more than one clock pulse. The faster clock runs, the faster the computer performs. The clock  rate is measured in megahertz(MHz) or million ticks per second. In most modern microprocessors the clock is usually incorporated within the CPU.

                       

                                                                       

                             

POWER SUPPLY TROUBLESHOOTING

POWER SUPPLY TROUBLESHOOTING

                

                                   
power supply problems fall  into two categories. The first are those that occur during the computer's startup . The second are those that occur during normal operation. 
STARTUP  PROBLEMS:-
                   When you turn  on your computer and nothings happen, there are a few simple checks you can make before you alarm. 
        FIRST .....check to see if the computer is plugged in and that it is receiving power .  you can check the wall outlet by plugging  in a lamp, or something into it. 
          SECOND....if the power from the wall outlet is good, then checking the computer is next. Turn the computer on and notice the monitor, the keyboard, and the system unit to see if the indicator lights are on. check for any computer beeping as it boots. if it beeps more then normal, that indicate a problems and checks the manual for the beep codes. 
         THIRD......if you don't see any lights or the fan in the power supply working, the power supply, is faulty. If you turn on the computer and its works but you don't here the power supply fan working, turn the computer off at once since the fan cannot cool the system, this could lead to over heated chips and other components. 







POWER SUPPLY CONNECTORS:

         Different computers have different power supply connectors. The PC/XT and the AT as well as the LPX PC systems have two six -pin connectors attached to the main board. They are normally marked P8 and P9. The ATX, the NLX, and the SFX PC systems have the 20-pin connectors that attached to the motherboard. The power connector that connects to the hard drive, CD-ROM drive and other components are marked P10 to P13.
The Power Supply Provides electrical power to the components the use power such as the Hard-Drive. Power supply also prevent the computer from operating at the wrong power level. The computer is plugged into the wall outlet, which contain 110-120 volts of alternating current.
But the components inside the computer cannot use the high voltage or ac. This parts work at low voltage, which is why the power supply must convert the high household current into the low current, needed to the run the computer. Most PC component work well at 3.3-5 volts DC, or direct current. The many component in the computer required different voltage such as the CPU and RAM. The Fan in the power supply get the current before any other components get their power and sometime the fan in the power supply will run in just perfect while the power supply may be deflective. Power Supply have a watt or Volt- Amp rating that describe the power it can produce.






     
 

TROUBLESHOOTING OF COMPUTER PROBLEMS

In this 21st century we are in the computer world. our computer engineer has made computer more advance then past. now a days computer pays vital role in the field of development. during this development period computer  also get the problems. computer problems create main obstacle during the working period. we can find many computer problems with their solution. some of the computer problems with their solution are mention below:-




PROBLEMS AND CAUSES:


A. No display in computer screen

causes:-


  • lose connection of monitors cable with VGA card.
  • display card not fixed properly on expansion slots.
  • RAM chips not fixed on memory slots.
  • CPU not fixed on CPU socked.
  • resolution of monitor is set up in very high resolution, which is not supported by monitor such as 1024*1200 in windows'95'98 platform. 
  • display card may be damage.
  • SMPS does not supply  accurate power.
  • may be problems on monitor.
  • reverse connection of data cable on HDD.
  • monitor adjustment.
SOLUTION:-
  • Connect the monitor cable on display card with properly.
  • fix properly your display card on expansion slots.
  • fix properly RAM on RAM slot.
  • fix CPU on CPU socket and check display.
  • start your computer on safe mode pressing F8 on starting phase and reduce the window resolution (recommended 800*600)
  • change display card and check display. 
  •  change SMPS and check for display.
  • check display by changing other fine monitor.
  • change other fine motherboard and check display 
  • check HDD cable and change cable connection.
  • adjust brightness and contrast button on monitor.

B.  Computer restart itself frequently
CAUSES:
  • SMPS does not regulate voltage properly.
  • may be the problem of voltage fluctuation of our electricity system.
  • hard disk is full by data or no free space on HDD.
  • CPU is not working properly 
  • processor may be damage 
  • memory problems 
  • OS problems
  • virus problems
  • motherboard problems
  • power supply problems
 
SOLUTION:
  • check SMPS power by multi  meter 
  • use volt card and UPS 
  • delete unnecessary data from hard disk to get free space 
  • change CPU cooler fan 
  • change other CPU
  • check and replace memory
  • repair OS, or clean pre-install OS
  • scan PC and clean or, remove virus and spyware
  • check and replace motherboard 
  • check and replace power supply

Monday, May 9, 2016

Database management system (DBMS)

Database Management System (DBMS)



Introduction:
A "Database" is a collection of related information stored related data. The database managed by a software package known as Database Management System. A set of computer program used to control the reading and writing of data from database called DBMS. Some commonly used DBMS are Database III +, Ms-Access, Ms-SQL and Oracle etc.
        So, in short we may say that a DBMS is a combined set of hardware and software that can be used to setup and monitor database.


RDBMS (Relational Database Management System)
       A type of database management System that stores data in the form of related tables is known as RDBMS. In the RDBMS, In the RDBMS data are stored in different tables having similar attributes and suitable relation is established between various tables of identical field.

Types of database:
There are two types of database on the basis of their functionality and location, which are following.
1.) Centralized Database
2.) Distributed Database

Centralized Database
      In centralized method there is one central computer facility, which provides computer services to all the users. All the program run on a main host computer, including the DBMS, the computer, including the DBMS, the application that access the database and the communication facilities that send and receive data from the User's terminals. So, such type of database works on client-server networking. The controlling mechanism is also centralized and data are deposited in a central location.

Advantage:
1. It reduces duplication of record.
2. The computer specialist work as a                group.
3. Data processing produce become more professional and it has better supervision control.

Disadvantage:
1. It is difficult to access each user.
2. The computer staff is required to service the entire department.

Distributed Database
In the distributed method there are independent computer facilities for each department but there is also central facility to control and co-ordinate the activity of each. So, distributed database is a database where several computers on a network each store part of data, which can be accessed by any of the computer.

Advantage:
1. Each department need can be met on an individual basis
2. It is relatively easy to access.

Disadvantage:
1. For the implementation of distributed database, it is required sophisticated hardware and software control.
Each personnel of the department should have knowledge about computer system.

Question: Who is DBA? Explain the major role of DBA in the database environment.
Answer: The Person who is responsible for database handling in the organization is known as DBA (Database Administrator). DBA has authority and responsibility for database maintaining like editing, deleting, entering etc. He must have sound knowledge of the structure of the database and DBMS. The DBA has many different responsibilities, but the overall goal of the DBA is to keep the server up at all times and to provide user with access to the required information when they need.
The DBA should have following attributes:
1. A DBA should know the type of data coding mechanism method or removing – non relevant data, platform required for processing, inter-relationship among database (RDBMS), Type of information to be processed.
2. Knowledge of SQL.
Knowledge of operation system in which database server is running.
3. Knowledge about database server
4. Sound database design
5. Knowledge about networking



Role of DBA
1. DBA is responsible for data security so he must follow the data security law & methods.
2. DBA has to collect and maintain data in the meaningful way so that data can be changed into information.
3. DBA has to provide data information to the decision maker.
4. DBA should design database according to the needs of the organization.
5. DBA is responsible to supervise the adding of new data.
6. DBA is responsible for the data dictionary
7. DBA is responsible for the documentation
8. DBA is responsible for ensuring that the data in the database meets the information needs of the organization
9. Installing and upgrading the database server
Managing database users & security.



What do you understand by data security? Explain the method of data security normally adopted by the organization?
Answer: Security refers to safely against attack or failure. Data security means to protect and preserve data program against intentional damage, modification by unauthorized person. In the wide concept, security covers overall physical security such as file protection, smoke, dust, heat, power supply on well as software and hardware security. One important aspect of control is the control data to prevent its loss, misuse or disclosure. This type of control is called "data security". So, data security refers to the protection of data, preventing the misuse of data or unauthorized access to data for internal modification, access control to the unauthorized person to the database.
Necessary security method should be applied for the protection of data in the computer system. Following are the common methods through which we can secure data.
1. The use of backup copies of tapes, disk and CD-ROM i.e. using regular Backup system of data we can secure from accidental loss.
2. Making physical prevention.
a.) Using UPS to supply regular           power supply
b.) Keeping data under lock & key
c.) Using backup system to save accidental loss of data. Such as hardware failure, software crashes
d.) Using password login system to prevent unauthorized use of computer terminal
e.) Virus can damage data and program so data program should be protected from virus. We can protect our data from virus through
f.) Using PDC (Primary domain control) & BDC (Backup domain Control) in networking system
g.) Constant checks of security
h.) Don't use pirated software
i.) Maintaining central data control system
j.) Filling and updating hard-copy printing regularly of the most important & valuable data from the database.
k.) Maintain properly the access control over data and so that only authorized user are allowed to access i.e. user logic process as password system to be maintained.




                                                                                         =0=

Transmission Media

Transmission Media




           Various physical media can be used to transport a stream of bits from one device to another. Each has its own characteristics in terms of bandwidth, propagation delay, cost, and ease of installation and
maintenance. Media can be generally classified as guided (e.g. copper and fiber cable) and unguided (wireless) media. The main categories of transmission media used in data communications networks.
Some Bound Media are:-
A. Coaxial Cable
B. Twisted Pair cable
C. Optical Fiber Cable


Coaxial cable:

      A coaxial cable has a central copper wire core, surrounded by an insulating (dielectric) material. Braided metal shielding surrounds the dielectric and helps to absorb unwanted external signals (noise), preventing it from interfering with the data signal travelling along the core. A plastic sheath protects the cable from damage. A terminating resistor is used at each end of the cable to prevent transmitted signals from being reflected back down the cable. The following diagram illustrates the basic construction of a coaxial cable.  

Construction of coaxial cable  
          Coaxial cable has a fairly high degree of immunity to noise, and can be used over longer distances (up to 500 meters) than twisted pair cable. Coaxial cable has, in the past, been used to provide network
backbone cable segments. Coaxial cable has largely been replaced in computer networks by optical fiber
and twisted pair cable, with fiber used in the network backbone, and twisted pair used to connect
workstations to network hubs and switches.   Thick net cable (also known as 10Base5) is a fairly thick cable (0.5 inches in diameter). The 10Base5 designation refers to the 10 Mbps maximum data rate, base band signaling and 500 meter maximum segment length . Thick net was the original transmission medium used in Ethernet networks, and supported up to 100 nodes per network segment. An Ethernet transceiver was connected to the cable using a vampire tap , so called because it clamps onto the cable, forcing a spike through the outer
shielding to make contact with the inner conductor, while two smaller sets of teeth bite into the outer
conductor. Transceivers could be connected to the network cable while the network was live. A separate drop cable with an attachment unit interface (AUI) connector at each end connected the transceiver to the network interface card in the workstation (or other network device). The drop cable was typically a shielded twisted pair cable, and could be up to 50 meters in length. The minimum cable length between
connections ( taps ) on a cable segment was 2.5 meters. 
Thick net (10Base5) coaxial cable 
Thin net cable (also known as 10Base2) is thinner than Thick net (approximately 0.25 inches in diameter)and as a consequence is cheaper and far more flexible. The 10Base2 designation refers to the 10 Mbps maximum data rate, base band signaling and 185 (nearly 200) meter maximum segment length . A T‐connector is used with two BNC connectors to connect the network segment directly to the network adapter card. The length of cable between stations must be at least 50 centimeters, and Thin net can
support up to 30 nodes per network segment. 
Thin net (10Base2) coaxial cable  

Coaxial cable has the following advantages and disadvantages:

Advantages
• Highly resistant to EMI (electromagnetic interference)
• Highly resistant to physical damage

Disadvantages
• Expensive
• Inflexible construction (difficult to
install)
• Unsupported by newer networking standards

Twisted pair cable:

Twisted pair copper cable is still widely used, due to its low cost and ease of installation. A twisted pair consists of two insulated copper cables, twisted together to reduce electrical interference between
adjacent pairs of wires. This type of cable is still used in the subscriber loop of the public telephone
system (the connection between a customer and the local telephone exchange), which can extend for
several kilometers without amplification. The subscriber loop is essentially an analogue transmission line, although twisted pair cables are also be used in computer networks to carry digital signals over short distances. The bandwidth of twisted pair cable depends on the diameter of wire used, and the length of the transmission line. The type of cable currently used in local area networks has four pairs of wires. Until recently, category 5 or category 5E cable has been used, but category 6 is now used for most new installations. The main difference between the various categories is in the data rate supported ‐ category 6 cable will support gigabit Ethernet. The main disadvantage of UTP cables in networks is that, due to the relatively high degree of attenuation and a susceptibility to electromagnetic interference, high speed digital signals can only be reliably transmitted over cable runs of 100 meters or less.


Twisted pair cable:
  
   
Shielded Twisted Pair (STP) cable was introduced in the 1980s by IBM as the recommended cable for
their Token Ring network technology. It is similar to unshielded twisted pair cable except that each pairs individually foil shielded, and the cable has a braided drain wire that is earthed at one end during installation. The popularity of STP has declined for the following reasons:  
1) High cost of cable and connectors More difficult to install than UTP  Ground loops can occur if incorrectly installed  
2) There is still a cable length limitation of 100 meters 
Shielded twisted pair cable  

Advantages
• It is a thin, flexible cable that is  easy to string between walls.
• More lines can be run through the same wiring ducts.
• UTP costs less per meter/foot than any other type of LAN cable.
• Electrical noise going into or coming from the cable can be prevented.
• Cross‐talk is minimized.

Disadvantages
• Twisted pair’s susceptibility to electromagnetic interference greatly depends on the pair twisting
schemes (usually patented by the manufacturers) staying intact during the installation. As a
result, twisted pair cables usually have stringent requirements for maximum pulling tension as
well as minimum bend radius. This relative fragility of twisted pair cables makes the installation
practices an important part of ensuring the cable’s performance.
• In video applications that send information across multiple parallel signal wires, twisted pair
cabling can introduce signaling delays known as skew which results in subtle color defects and
ghosting due to the image components not aligning correctly when recombined in the display
device. The skew occurs because twisted pairs within the same cable often use a different
number of twists per meter so as to prevent common‐mode crosswalk between pairs with
identical numbers of twists. The skew can be compensated by varying the length of pairs in the
termination box, so as to introduce delay lines that take up the slack between shorter and
longer pairs, though the precise lengths required are difficult to calculate and vary depending on
the overall cable length.


Optical fiber:


Optical fibers are thin, solid strands of glass that transmit information as pulses of light. The fibers has a core of high‐purity glass, between 6μm and 50μm in diameter, down which the light pulses travel. The core is encased in a covering layer made of a different type of glass, usually about 125 μm in diameter, known as the cladding. An outer plastic covering, the primary buffer, provides some protection, and takes the overall diameter to about 250 μm. The structure of an optical fiber is shown below.  
             The basic construction of an optical fiber. The cladding has a slightly lower refractive index than the core (typical values are 1.47 and 1.5 respectively), so that as the pulses of light travel along the fiber they are reflected back into the core each time they meet the boundary between the core and the cladding. Optical fibers lose far less of its signal energy than copper cables, and can be used to transmit signals of a much higher frequency. More information can be carried over longer distances with fewer repeaters. The bandwidth achievable using  optical fiber is almost unlimited, but current signaling technology limits the data rate to 1 Gbps due to time required to convert electronic digital signals to light pulses and vice versa. Digital data is converted to light pulses by either a light emitting diode (LED) or a laser diode. Although some light is lost at each end of the fiber, most is passed along the fiber to the receiver, where the light pulses are converted back into electronic signals by a photo‐detector.  As the ray passes along the fiber it meets the boundary between the core and the cladding at some point. Because the refractive index of the cladding is lower than that of the core, the ray is reflected back into the core material, as long as the angle of incidence ( θ i ) is greater than the critical angle ( θ c). The critical angle depends on the refractive indices of the two materials. In the case of an optical fiber,the values are chosen so that almost all of the light is reflected back into the fiber, and there is virtually no loss through the walls of the fiber. This is called total internal reflection . The critical angle for a particular fiber can be calculated using Snell's Law. This states that: 
n 1 sin θ 1 = n 2 sin θ 2
where θ 1 is the angle of incidence, θ 2 is the angle of refraction, and n 1 and n 2 are the refractive indices of the core and cladding respectively. The effect on a ray of light passing along the fiber is shown below. 
Light transmission in an optical fiber In step‐index fibers,
the refractive Len of both the core and the carding has a constant value, so that the refractive index of the fiber steps from one value to the next.  

A step‐index fiber  
If the core diameter of the fiber is such that it allows light to enter at different angles and follow
multiple paths, it is said to be a multi‐mode fiber. The number of times the light is internally reflected
will vary according to the angle at which the light initially enters the fiber, which will in turn determine the path length of the light as it travels along the fiber. Over long distances, there will be a significant difference in path length between light rays that enter the fiber at different angles. They will, as a consequence, arrive at slightly different times, causing distortion of the transmitted signal ‐ an effect known as modal dispersion . For this reason, multi‐mode fibers are only used for short‐haul applications such as LAN backbone connections, where the distances involved are likely to be considerably less than
one kilometer.  

A multi‐mode step‐index fiber 
If the core diameter of the fiber is made small enough, the angle at which light can enter the fiber can
be limited such that most of the light travels down a single path, effectively eliminating modal
dispersion. This type of fiber is called a mono‐mode fiber, and is commonly used for long‐haul
applications such as long distance telecommunications. Distances of many kilometers are possible with mono‐mode fiber before a repeater is needed. 

Multi‐mode and mono‐mode fibers  
One way to improve the performance of multi‐mode fiber is to use a graded index fiber instead of a step index fiber. The refractive index of this type of fiber varies across the diameter of the core in such a way that light is made to follow a curved path along the fiber (see below). Light near the edges of the core travels faster than light at the center of the core, so although some rays follow a longer path than
others, they all tend to arrive at the same time, resulting in far less modal dispersion than would occur
in a step‐index multi‐mode fiber.  


A graded index fiber  
Light paths in a graded index fiber 
[Return to top of page]  


Advantages 
• Better security ‐ very hard to tap a fiber without being noticed.  
• Longer cable runs  
• Greater bandwidth.  
• Not affected by electromagnetic interference.  
• Can connect between buildings with different earth potentials. These would could cause problems with a copper wired system.  
• Not effected by near‐miss lightning strikes  
• Lower cost for 2 to 3 km fiber runs. CAT5 twisted‐pair is limited to 100 meters.  
• Carrier signals on different frequencies (colors) can be used to increase the capacity (frequency
division multiplexing).  
• Single mode or mono mode fiber has a very thin inner glass layer.  
• This is so thin that it behaves like a wave guide and the light can't follow different paths.  
• This reduces the dispersion and makes longer fibers possible 30 km. 

Disadvantages  
• Attenuation is still a problem and this limits the maximum cable length  
• Dispersion is still a problem and this also limits the maximum cable length  
• Scattering occurs when there are imperfections in the fiber. This causes attenuation or energy
loss.  
• Higher installation cost for small networks. For major backbones fiber works out cheaper per
megabit of bandwidth.
 
• Optical fibers can be fragile although they are reinforced with Kevlar fibers and an outer
protective plastic layer

• Optical fibers are difficult to connect to the transmitting light source and the receiving light
detector. A complex cutting and polishing operation is needed to make the fibre ends flat and
free from dirt or imperfections. 






Unbound Media/Unguided Media

Unbound Media
        orUnguided Media:



Unguided Media: It is one that does not guide the data signals instead it uses the multiple paths for
transmitting data signals. In this type the data cable are not bounds to a cable media. So it is called
“Unbound media” basically there are 2 types.
a) Microwave 
b) Satellite Technology.  


a) Microwave:  


Microwaves are radio waves that are used to provide high‐speed transmission. Both voice and data can be transmitted through microwave. Data is transmitted through the air form one microwave station to other similar to radio signals. Microwave uses line‐of‐sight transmission. It means that the signals travel in straight path and cannot bend. Microwave stations or antennas are usually installed on high towers or buildings. Microwave stations are placed within 20 to 30 miles to each other. Each station receives signal from previous station and transfer to next station. In this way, data transferred from one place to another. There
should be no buildings on mountains between microwave stations.


Advantages:
1. It has the medium capacity
slightly higher than “Bound Media".
2. Medium cost.
3. It can cover longer distance that cannot be possible by bound media.  


Disadvantages:
1. Noise interference is more.
2. Since it uses less susceptible
signal so it has got greater influence from rain & fog.
3. It is not secure & reliable. 


b) Satellite Communication:


Communication satellite is a space station. It receives microwave signals from earth station. It amplifies the signal and retransmits them back to earth. Communication satellite is established in space about 22,300 miles above the earth. The data transfer speed of communication satellite is very high. The transmission from earth station to satellite is called uplink. The transmission from satellite to earth station is called downlink. An important advantage at satellite is that a large volume of data can be
communicated at once. The disadvantage is that bad weather can severely affect the quality of satellite transmission.

Advantages:
1. Low cost per user (for pay TV)
2. High Capacity
3. Very large coverage area.  


Disadvantages:
1. High Installing & managing cost.
2. Receive dishes & decoders required.
3. Delays involved in the reception of the signal.

Wireless Media

Wireless Media:

Wireless telecommunications, is the transfer of information between two or more points that are physically not connected. Distances can be short, as a few meters as in television remote control; or long
ranging from thousands to millions of kilometers for deep‐space radio communications. It encompasses
various types of fixed, mobile, and portable two‐way radios, cellular telephones, personal digital
assistants (PDAs), and wireless networking. Other examples of wireless technology include GPS units, garage door openers and or garage doors, wireless computer mice, keyboards and headsets, satellite television and cordless telephones.
         Network Connecting Device Network Connecting Device: (Modem, NIC, Switch / Hub, Router,
Gateway,
Repeater, Bluetooth, IR, WiFi):
Computer networking devices are units that mediate data in a computer network. Computer networking devices are also called network equipment, Intermediate Systems (IS) or InterWorking Unit (IWU). Units which are the last receiver or generate data are called hosts or data terminal equipment.


Modem
A modem (modulator‐demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from light emitting diodes to radio.
      The most familiar example is a voice band modem that turns the digital data of a personal computer into modulated electrical signals in the voice frequency range of a telephone channel. These signals can be transmitted over telephone lines and demodulated by another modem at the receiver side to recover the digital data.
Modems are generally classified by the amount of data they can send in a given unit of time, usually
expressed in bits per second (bit/s, or bps). Modems can alternatively be classified by their symbol rate,
measured in baud. The baud unit denotes symbols per second, or the number of times per second the
modem sends a new signal. For example, the ITU V.21 standard used audio frequency‐shift keying, that
is to say, tones of different frequencies, with two possible frequencies corresponding to two distinct symbols (or one bit per symbol), to carry 300 bits per second using 300 baud. By contrast, the original ITU V.22 standard, which was able to transmit and receive four distinct symbols (two bits per symbol), handled 1,200 bit/s by sending 600 symbols per second (600 baud) using phase shift keying.


Network interface controller(NIC)

A network interface controller (also known as a network interface card, network adapter, LAN adapter
and by similar terms) is a computer hardware component that connects a computer to a computernetwork.
Whereas network interface controllers were commonly implemented on expansion cards that plug intoa computer bus, the low cost and ubiquity of the Ethernet standard means that most newer computershave a network interface built into the motherboard.
The network controller implements the electronic circuitry required to communicate using a specific
physical layer and data link layer standard such as Ethernet, Wi‐Fi, or Token Ring. This provides a base
for a full network protocol stack, allowing communication among small groups of computers on the
same LAN and large‐scale network communications through routable protocols, such as IP.

Switch / Hub

A network switch or switching hub is a computer networking device that connects network segments.
The term commonly refers to a multi‐port network bridge that processes and routes data at the datalink layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (Layer3) and above are often referred to as Layer 3 switches or multilayer switches.
         The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid‐to‐large sized LANs contain a number of linked managed switches. Small office/home office (SOHO)applications typically use a single switch, or an all‐purpose converged device such as a gateway to accesssmall office/home broadband services such as DSL or cable internet. In most of these cases, the end‐user device contains a router and components that interface to the particular physical broadbandtechnology. User devices may also include a telephone interface for VoIP.An Ethernet switch operates at the data link layer of the OSI model to create a separate collision domainfor each switch port. With 4 computers (e.g., A, B, C, and D) on 4 switch ports, A and B can transfer databack and forth, while C and D also do so simultaneously, and the two conversations will not interfere
with one another. In the case of a hub, they would all share the bandwidth and run in half duplex,
resulting in collisions, which would then necessitate retransmissions. Using a switch is called microsegmentation. This allows computers to have dedicated bandwidth on a point‐to‐point
connections to the network and to therefore run in full duplex without collisions.


Router

A router is a device that forwards data packets between telecommunications networks, creating anoverlay internetwork. A router is connected to two or more data lines from different networks. Whendata comes in on one of the lines, the router reads the address information in the packet to determineits ultimate destination. Then, using information in its routing table or routing policy, it directs thepacket to the next network on its journey or drops the packet. A data packet is typically forwarded fromone router to another through networks that constitute the internetwork until it gets to its destination
node.The most familiar type of routers are home and small office routers that simply pass data, such as webpages and email, between the home computers and the owner's cable or DSL modem, which connectsto the Internet (ISP). However more sophisticated routers range from enterprise routers, which connectlarge business or ISP networks up to the powerful core routers that forward data at high speed along theoptical fiber lines of the Internet backbone.


Gateway

A network gateway is an internetworking system capable of joining together two networks that usedifferent base protocols. A network gateway can be implemented completely in software, completely in
hardware, or as a combination of both. Depending on the types of protocols they support, network
gateways can operate at any level of the OSI model.  Because a network gateway, by definition, appears at the edge of a network, related capabilities likefirewalls tend to be integrated with it. On home networks, a broadband router typically serves as thenetwork gateway although ordinary computers can also be configured to perform equivalent functions.  


Bluetooth:
Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices. Bluetooth is used to create personal area networks (PANs) with high levels of security. Bluetooth Was created by telecoms vendor Ericsson in 1994.


Infrared 

Infrared (IR) light is electromagnetic radiation with a wavelength longer than that of visible light, measured from the nominal edge of visible red light at 0.7 micrometers, and extending conventionally to 300 micrometres. These wavelengths correspond to a frequency range of approximately 1 to 430 THz,and include most of the thermal radiation emitted by objects near room temperature.   Microscopically,
IR light is typically emitted or absorbed by molecules when they change their rotational‐vibrational
movements.Sunlight at zenith provides an irradiance of just over 1 kilowatt per square meter at sea level. Of thisenergy, 527 watts is infrared radiation, 445 watts is visible light, and 32 watts is ultraviolet radiation.  


WiFi

Wi‐Fi is a wireless standard for connecting electronic devices. The fullform of wifi is "wireless feidelity". A Wi‐Fi enabled device such as a personalcomputer, video game console, smartphone, and digital audio player can connect to the Internet whenwithin range of a wireless network connected to the Internet. A single access point (or hotspot) has arange of about 20 meters indoors. Wi‐Fi has a greater range outdoors and multiple overlapping accesspoints can cover large areas.

        "Wi‐Fi" is a trademark of the Wi‐Fi Alliance and the term was originally created as a simpler name forthe "IEEE 802.11" standard. Wi‐Fi is used by over 700 million people, there are over 4 million hotspots
(places with Wi‐Fi Internet connectivity) around the world, and about 800 million new Wi‐Fi devices
every year.[citation needed] Wi‐Fi products that complete the Wi‐Fi Alliance interoperability
certification testing successfully can use the Wi‐Fi CERTIFIED designation and trademark.