Posts

articales 6,7,8,9

HIGH DEFINITION When the first high-definition television (HDTV) sets hit the market in 1998, movie buffs, sports fans and tech aficionados got pretty excited, and for good reason. Ads for the sets hinted at a television paradise with superior resolution and digital surround sound. High-definition (HD) video refers to any video system of higher resolution than standard-definition. The most commonly used resolutions in HD are 720p (1280×720) and 1080p (1920×1080). It sounds like a trivial thing when you say hey its just high resolution, but high def is more than just the resolution, because all these videos either have a progressive scan or interlaced scan. Progressive or non interlaced scanning is any method for displaying, storing or transmitting moving images in which all the lines of each frame are drawn in sequence. This is in contrast to the interlacing used in traditional television systems where only the odd lines, then the even lines of each frame are drawn alternatively....

articles 10,11,12

Image
CAN YOU ANSWER? 1) What organization devised the printed circuit board? a) The US National Board of Standards b) Texas Instruments c)NVIDIA d)Xerox 2)What character can't be part of a file name on a Mac? a)The hash(#) b)The Back slash(\) c)The caret(^) d)The colon(:) 3)Which of the following is a computer language a) Stonehenge b)Taj c)Eiffel d) Sydney Opera house 4)In UNIX systems, The OS views every entity (Including a disk) as ------- a)A directory b)A file c)A logical Address d)A Virtual location 5)What is Firefox version 3 code named a)Gran paradismo b)Bon Echo c)Deer Park d) Phoenix 6) What does PSTN stand for? a)Parallel Switched Telecommunication Node b)Public Switched Telephone Networking c)Public Service Telecommunication Networking d)Packet Switched Transmission Service 7) Which of the following is not a type of non volatile memory? a)PRAM(Phase-Change Random Access Memory) b)MRAM(Mangnetoresistive Rand...

articles 13,14

Image
Cryptography The expansion of the connectivity of computers makes ways of protecting data and messages from tampering or reading important. Even the US courts have ruled that there exists no legal expectation of privacy for email. It is thus up to the user to ensure that communications which are expected to remain private actually do so. One of the techniques for ensuring privacy of files and communications is Cryptography. Instead sending the data as it is, we encrypt the data according to some algorithm and send it to the destination. If the receiver is authorized then only he will be able to decrypt it back following by some techniques. This is how we can optimize the network security to some extent. RSA Algorithm The RSA algorithm was first published in the paper A Method for Obtaining Digital Signatures and Public-Key Cryptosystems in 1977 by Ron Rivest, Adi Shamir and Len Adleman. It is named after the initials of their surnames. The paper was published in the September 19...

article-15-17

Image
EVOLUTION OF MAN CONTRIBUTED BY - Denny Philip (IInd BCA) - JDBC-API CLIENT SEVER MODEL Introduction: The Java Database Connectivity Application Programming Interface (JDBC) is asset of specifications that defines how an application opens a connection, communicates with database. It defines how an application opens a connection with a database, executes SQL statements and retrieves the result. JAVA SOFT developed JDBC-API. Many of the JDBC-API concepts are taken from other sources particularly Microsoft’s ODBC, ODNC & JDBC can ba called siblings. The major difference being ODBC is written in C. The pointers are made use extensively. But java does not have pointers. The JDBC-API is much smaller and easier to implement as compared to ODBC. JDBC was designed to be compact & focused only on the execution of SQL statements and there by retrieving the result, but ODBC has multiple mechanism for performing a single task and has additional data handling capabilities. ...