SHARING KNOWLEDGE EACH OTHERS!

Wednesday, December 31, 2008

scanner function(celsius convert to fahrenheit )


import java.util.Scanner;

public class TemperatureConverter2
{
//-----------------------------------------------------------------
// using scanner to give input
//-----------------------------------------------------------------
public static void main (String[] args)
{
double celsius;
Scanner scan = new Scanner (System.in);
System.out.println ("Enter celsius :");
celsius = scan.nextDouble();

double fahrenheit;
fahrenheit= (celsius * 9/5 + 32);

System.out.println ("fahrenheit is :" + fahrenheit);
}
}
GO TO CHAPTER 3


scanner function (celsius convert to fahrenheit )


public class TemperatureConverter1
{
//-----------------------------------------------------------------
// change the Fahrenheit equivalent of a specific Celsius
//-----------------------------------------------------------------
public static void main (String[] args)
{

double fahrenheitTemp;
int celsiusTemp = 24;
System.out.println ("Celsius Temperature: " + celsiusTemp);
System.out.println ("Fahrenheit Equivalent: " + (celsiusTemp*9/5+32));
}
}
GO TO CHAPTER 3


scanner function (celsius convert to fahrenheit )


public class TemperatureConverter
{
//-----------------------------------------------------------------
// change the Fahrenheit equivalent of a specific Celsius
//-----------------------------------------------------------------
public static void main (String[] args)
{
final int BASE = 32;
final double CONVERSION_FACTOR = 9.0 / 5.0;

double fahrenheitTemp;
int celsiusTemp = 24; // value to convert

fahrenheitTemp = celsiusTemp * CONVERSION_FACTOR + BASE;

System.out.println ("Celsius Temperature: " + celsiusTemp);
System.out.println ("Fahrenheit Equivalent: " + fahrenheitTemp);
}
}
GO TO CHAPTER 3


scanner function(simple input)


import java.util.Scanner;

public class input
{
//-----------------------------------------------------------------
// using scanner to give input
//-----------------------------------------------------------------
public static void main (String[] args)
{
String input;
Scanner scan = new Scanner (System.in);

System.out.println ("Give your input:");

input = scan.nextLine();

System.out.println ("Ur input is: \"" + input + "\" ");
}
}
GO TO CHAPTER 3


scanner function(average)


import java.util.Scanner;

public class calculationoftwoinput
{
//-----------------------------------------------------------------
// calculate two inputs.
//-----------------------------------------------------------------
public static void main (String[] args)
{
int mark1;
int mark2;
int total;
double average;

Scanner scan = new Scanner (System.in);

System.out.print ("Enter mark1: ");
mark1 = scan.nextInt();

System.out.print ("Enter mark2: ");
mark2 = scan.nextInt();

total = mark1 + mark2;
average = total/2;

System.out.println ("Total mark is : " + total);
System.out.println ("Average mark is: " + average);
}
}
GO TO CHAPTER 3


Using Scanner in java(convert metre into centimeter)


import java.util.Scanner;

public class calculation
{
//-----------------------------------------------------------------
// HOW CALCULATE INPUT
//-----------------------------------------------------------------
public static void main (String[] args)
{
int meter;
int centimeter;

Scanner scan = new Scanner (System.in);

System.out.print ("Enter meter : ");
meter = scan.nextInt();

centimeter = meter* 100;

System.out.println ("centimeter is : " + centimeter);
}
}
GO TO CHAPTER 3


Sunday, December 28, 2008

database1


Data Independence

Physical representation and location of data and the use of that data are separated
•The application doesn’t need to know how or where the database has stored the data, but just how to ask for it.
•Moving a database from one DBMS to another should not have a material effect on application program
•Recoding, adding fields, etc. in the database should not affect applications

Database Application

An application program (or set of related programs) that is used to perform a series of database activities:
•Create
•Read
•Update
•Delete
•On behalf of database users

Metadata

Data about data

In DBMS means all of the characteristics describing the attributes of an entity,
E.G.:
–name of attribute
–data type of attribute
–size of the attribute
–format or special characteristics


Saturday, December 27, 2008

Java - Separators


There are a few characters that are used as separators in java. The mostly commonly used separator in java is the semicolon. As you have seen, it is used to terminate statements.

() called Parentheses used to contain list of parameters in method definition and invocation. Also used for defining precedence expressions in control statements, and cast type.

Braces {} used to contain the values of automatically initialized arrays. Also it is used to define a block of code, for classes, methods, and local scopes.

Brackets [], it is used to declare array types. Also it is used when dereferencing array values.

Comma , it separates consecutive identifiers in a variable declaration. Also it is used to chain statements together inside a for statement.

Period “ .” it is used to separate package names from sub packages and classes. And it is also used to separate a variable or method from a reference variable.


GO TO CHAPTER 2



Java - What are identifiers?


Identifiers are used for class names, and variable names. An identifier may be many descriptive sequence of uppercase and lowercase letters, numbers, or the underscore and dollar- sign characters. They must not begin with the number. Java is a case – sensitive.

GO TO CHAPTER 02


Java - What are reserved words?


Reserved words or keywords are words that have a precise meaning to the compiler and cannot be used for other purposes in the program. For example, when the compiler sees the word class, it understands that the word after class is the name for the class.

Learn more keywords

const ,finally, int , public, this, continue, float, interface, return, throw, abstract, Boolean, break,

default ,for ,long ,short ,throws, do, goto, native, static, transient, double, byte, case, catch, char

if, new , strictfp, try, else, implements, package, super, void ,extends, import, class, private, switch, volatile, final, instanceof, protected, synchronized ,while

The keywords const and goto are reserved but they are not in used.


GO TO CHAPTER 02


Java - What are comments ?


In Java, comments are preceded by two slashes (//) in a line, or enclosed between /* and */ in one or multiple lines. When the compiler sees //, it ignores all text after // in the same line. When it sees /*, it scans for the next */ and ignores any text between /* and */. Let’s look why comments are important in a program. The compiler is not going to compile the statement after the line comment or between comments. So it will skip the statement then the rest will be compiled by the compiler. So you can give any description in comments.

GO TO CHAPTER 02


Thursday, December 25, 2008

CHAPTER TWO


public class sum{
//-----------------------------------------------------------------
// SIMPLE CALCULATION & STATEMENT
//-----------------------------------------------------------------
public static void main (String[] args){
// see the different of using(+ for giving tatement)
System.out.println ("90 and 30 JOINED: " + 90 + 30);
//sum of the ()
System.out.println ("300 and 150 SUMED: " + (300 + 150));
}
}

THIS IS A SIMPLE EXAMPLE HOW TO JOIN TWO NUMBER IS THE FIRST PRINT OUT, THE SECOND OUTPUT IS HOW SUMING THE TWO NUMBERS........
COPY THIS CORD AND PAST ON YOUR TEXT PAD AND SAVE IT AS SUM.JAVA, AND THE SAVE AS TYPE IS ALL FILE.


CHAPTER ONE-6


public class Tab {
public static void main(String[]args) {
System.out.println("1\t2\t3\t4\t5\t\n6\t7\t8\t9\t0");
}
}

THIS IS A SIMPLE EXAMPLE OF HOW TO USE TAB (\t) COPY THIS CORD AND PAST ON YOUR TEXT PAD AND SAVE IT AS Tab.JAVA, AND THE SAVE AS TYPE IS ALL FILE.
CHAPTER ONE MAIN


CHAPTER ONE-5


public class First_5 {
public static void main(String[]args) {
System.out.println("1\t2\t3\t4\t5");
System.out.println("6\t7\t8\t9\t0");
}
}
CHAPTER ONE MAIN


CHAPTER ONE-4


public class First_4 {
public static void main(String[]args) {
System.out.println("Tamilan live in every country\n"+
"But they don't have own country\n"+
"They are a refugee now");
}
}
CHAPTER ONE MAIN


CHAPTER ONE-3


public class First_3 {
public static void main(String[]args) {
System.out.println("Tamilan live in every country"+
"But they don't have own country"+
"They are a refugee now");
}
}
CHAPTER ONE MAIN


CHAPTER ONE-2


public class First_2 {
public static void main(String[]args) {
System.out.println("Tamilan live in every country");
System.out.println("But he dosen't own country");
System.out.println("He is a refugee now");
}
}

CHAPTER ONE MAIN


CHAPTER ONE-1


public class Print{
//-----------------------------------------------------------------
// function of print
//-----------------------------------------------------------------
public static void main (String[] args) {
System.out.print ("Srilanka is a blood river country");
System.out.print ("Majority is Singalish");
System.out.print ("They are killing tamil people");

//----------------------------------------------------------------
// function of println watch output to understand the different
//-----------------------------------------------------------------
//to give line space
System.out.println (" ");
System.out.println (" ");
System.out.println ("Srilanka is a blood river country");
System.out.println ("Majority is Singalish");
System.out.println ("They are killing tamil people");
}
}
THIS IS A PROGRAM SHOWS THE DIFFERENTS OF THE PRINT AND PRINTLN COPY THIS CORD AND PAST ON YOUR TEXT PAD AND SAVE IT AS Print.JAVA, AND THE SAVE AS TYPE IS ALL FILE.
CHAPTER ONE MAIN


CHAPTER ONE


public class Simplestatment
{
//-----------------------------------------------------------------
// HOW TO GIVE SENTANCE AS OUT PUT,
//-----------------------------------------------------------------
public static void main (String[] args) {
System.out.println ("This is my first step in java programming");
System.out.println ("i am a tamil srilankan refugee");
System.out.println ("i don't have any country to live");
}
}


THIS IS A SIMPLE EXAMPLE HOW TO GET A OUT PUT OF SIMPLE STATMENT COPY THIS CORD AND PAST ON YOUR TEXT PAD AND SAVE IT AS Simplestatment .JAVA, AND THE SAVE AS TYPE IS ALL FILE.

CHAPTER ONE MAIN


CPU


It is stand for central processing system; it is the brain of a computer. The CPU is built by gates. Mostly it refers as processor. It has a cycle to perform a full job. To properly perform its job, the processor has to complete a four steps cycle. The first step in this cycle is to fetch an instruction as of a software program's memory. After fetches the instruction, its second step is to decode the instruction.
During the execution step, the CPU completes the instruction. It accomplishes this by following the information gained during the decoding step. on one occasion the CPU has completed executing the instruction, the last step in this cycle is to write-back the results that occurred during the execution step. The CPU can write-back the results to its own internal register, or to the main memory of the computer.
when I update a CPU?
How do I monitor CPU temperature?
  • First Generation Monitoring Solutions:
  • Second Generation Monitoring Solutions:
  • Third Generation Monitoring Solutions:
What is Dual Core Technology?
How dual-core processors work?


when I update a CPU?


It is seemed much easy to update the CPU nevertheless you must know the CPU (processor) dose it much to the motherboard. The motherboard speed and the CPU must cooperate on passing signals. This are the main things before you consider to buy a CPU.

Back to CPU


How do I monitor CPU temperature?


Too much heat damages electronics. Monitoring the temperature of CPU and other computer components keep them running appropriately. To properly use most software of this type, you will need to ensure you have ACPI functionality enabled in your motherboard BIOS.

First Generation Monitoring Solutions:
Monitoring Temperature in System Bios
Numerous PC motherboards now contain hardware monitoring circuits those are capable to measure heat, voltages, and fan speeds. The majority of modern motherboards also allow you to configure alerts, alarms and actions to take based on specific temperature and fan settings.

Second Generation Monitoring Solutions:
The first generation of CPU (processor) temperature monitoring software packages purely gave the CPU temperature correct value. There is no alarms indication, events, or actions could be defined; it is very poor technology so the user must take of his or her system, to prevent the damages from the heat. If the user wasn't watching, the system could easily overheat and cause system damage.
The second generation sensor circuits have the ability to regulate and control environmental conditions automatically, so that second generation solutions are enough to keep the system stable when heat is an issue, and quiet when it isn't.

Third Generation Monitoring Solutions:
This is the newest technology software, it is directly interact with the mother board sensor and fan control system to control the heat according to the system environment condition. The mother board companies started to cover their customers and they like to give high performances from their mother board. So they are giving free software’s with their mother board.

Back to CPU


What is Dual Core Technology?


The Dual core technology became with the idea of skipping on other and manages to do the both process at simulations time and the two processors are working in parallel. A dual core processor has two processors; they are combined as one processor non as Dual core Processors. It is efficient and very fast data execution. The dual core processor occupies less space on the mother board and it uses the less electricity. The core processors each has cache this two cache improved the multitasking ability of the system (computer).

Back to CPU


How dual-core processors work


Dual-core processors work pretty much as you'd expect them to. At their most basic, both Intel and AMD have taken two mostly (or in the case of Intel, fully) functional processor cores and joined them together in a single processor die. Each core functions and processes data independently, and the two are co-coordinated by the operating system software.


Back to CPU


Friday, December 5, 2008

CPU


1) CPU
It is stand for central processing system; it is the brain of a computer. The CPU is built by gates. Mostly it refers as processor. It has a cycle to perform a full job. To properly perform its job, the processor has to complete a four steps cycle. The first step in this cycle is to fetch an instruction as of a software program's memory. After fetches the instruction, its second step is to decode the instruction.
During the execution step, the CPU completes the instruction. It accomplishes this by following the information gained during the decoding step. on one occasion the CPU has completed executing the instruction, the last step in this cycle is to write-back the results that occurred during the execution step. The CPU can write-back the results to its own internal register, or to the main memory of the computer.

2) when I update a CPU?
It is seemed much easy to update the CPU nevertheless you must know the CPU (processor) dose it much to the motherboard. The motherboard speed and the CPU must cooperate on passing signals. This are the main things before you consider to buy a CPU.

3) How do I monitor CPU temperature?
Too much heat damages electronics. Monitoring the temperature of CPU and other computer components keep them running appropriately. To properly use most soft ware of this type, you will need to ensure you have ACPI functionality enabled in your motherboard BIOS.

First Generation Monitoring Solutions:
Monitoring Temperature in System Bios
Numerous PC motherboards now contain hardware monitoring circuits those are capable to measure heat, voltages, and fan speeds. The majority of modern motherboards also allow you to configure alerts, alarms and actions to take based on specific temperature and fan settings.

Second Generation Monitoring Solutions:
The first generation of CPU (processor) temperature monitoring software packages purely gave the CPU temperature correct value. There is no alarms indication, events, or actions could be defined; it is very poor technology so the user must take of his or her system, to prevent the damages from the heat. If the user wasn't watching, the system could easily overheat and cause system damage.
The second generation sensor circuits have the ability to regulate and control environmental conditions automatically, so that second generation solutions are enough to keep the system stable when heat is an issue, and quiet when it isn't.

Third Generation Monitoring Solutions:
This is the newest technology software, it is directly interact with the mother board sensor and fan control system to control the heat according to the system environment condition. The mother board companies started to cover their customers and they like to give high performances from their mother board. So they are giving free software’s with their mother board.

4) What is Dual Core Technology?
The Dual core technology became with the idea of skipping on other and manages to do the both process at simulations time and the two processors are working in parallel. A dual core processor has two processors; they are combined as one processor non as Dual core Processors. It is efficient and very fast data execution. The dual core processor occupies less space on the mother board and it uses the less electricity. The core processors each has cache this two cache improved the multitasking ability of the system (computer).

5) How dual-core processors work
Dual-core processors work pretty much as you'd expect them to. At their most basic, both Intel and AMD have taken two mostly (or in the case of Intel, fully) functional processor cores and joined them together in a single processor die. Each core functions and processes data independently, and the two are co-coordinated by the operating system software.


CHAPTER TWO



Java



Monday, December 1, 2008

CHAPTER 3



Sunday, June 8, 2008

switch


A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Technically, network switches operate at layer two of the OSI model.


HUB


Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.


RING


The ring topology is a type of computer network arrangement where each network computer and devices are connected to each other forming a big circle. Each packet is sent around the ring until it reaches its final destination. Today, the ring topology is hardly ever used.


RING TOPOLOGY



RING TOPOLOGY


The ring topology is a type of computer network arrangement where each network computer and devices are connected to each other forming a big circle. Each packet is sent around the ring until it reaches its final destination. Today, the ring topology is hardly ever used.


Focused Differentiation


•Choice to be made between focused differentiation and broad differentiation if growth required
•Difficult when the focus strategy is only part of an organisation’s overall strategy
•Possible conflict with stakeholder expectations
•New ventures start off focused, but need to grow
•Market situation may change, reducing differences between segments


Failure Strategies


•Increase price without increasing product/service benefit
•Reduce benefits whilst maintaining price


Hybrid Strategy


•Achieve greater volumes
•Clarity about activities on which differentiation can be built (core competences)
•Reduce costs on other activities
•Entry strategy in market with established competitors


Differentiation Strategies


•Success depends on
–Identification of strategic customers and knowing what they value
–Knowing the competitors
•Narrow competitor base – focused differentiation
•Wide competitor base – address bases of differentiation valued by customers


Low Price Strategy


•Pitfalls of low price strategy
–Margin reduction (competitor reaction)
–Inability to reinvest leading to loss of perceived benefit of product
•Need a low cost base
–Low cost itself not a basis for advantage
–Low cost achieved in ways that competitors cannot match to give sustainable advantage


“No Frills” Strategy


•Commodity-like products or services
•Price-sensitive customers
•High buyer power and/ or low switching costs
•Small number of providers with similar market shares
•Avoiding the major competitors


SWOT


•Summarises analysis of
– Business environment
•Opportunities and threats
– Strategic capabilities
•Strengths and weaknesses
•Used for comparison with competitors
•Focuses on future choices and capability of organisation to support them


Problems of SWOT analysis


–Can generate long lists: need to focus on key issues
–Danger of over-generalisation: not a substitute for rigorous strategic analysis


Benchmarking Strategic Capability


–Historical – performance compared to previous years
–Industry/sector – comparative performance of other organisations
–Best in class – wider search for best practice
•Increased expectations due to improved performance in another sector
•Breaking the frame about performance standards to be achieved
•Spot opportunities to outperform incumbents in other markets – stretch core competences


Core competences


Activities and processes through which resources are deployed such as to achieve competitive advantages in ways which others cannot imitate or obtain


Strategic Gaps


•Opportunities in business environment not being fully exploited by the competition:
–substitute industries
–other strategic groups or strategic spaces
–the chain of buyers
–complementary products and services
–new market segments
–markets developing over time


Strategic Groups


Strategic groups are organisations within an industry with similar strategic characteristics, following similar strategies or competing on similar bases


The Five Forces Framework



FIVE FORCES ANALYSIS
The threat of entry ...
Dependent on barriers to entry such as:
•economies of scale
•capital requirements of entry
•access to supply or distribution channels
•customer or supplier loyalty
•experience
•expected retaliation
•legislation or government action
•differentiation

Threat of substitutes
Reduction in demand for products as customers switch to alternatives:
•Product for product substitution
–e.g. email for post
•substitution of need
–e.g. reliable and cheap appliances reduce need for maintenance services
•generic substitution
–competition for household income, e.g. cars versus holidays
–doing without

Buyer power
buyer power is likely to be high where there is:
•a concentration of buyers
•many small operators in the supplying industry
•alternative sources of supply
•low switching costs
•components/materials that are a high percentage of cost to the buyer leading to “shopping around”
•a threat of backward integration

Supplier power is likely to be high where there is:
•a concentration of suppliers
•customers that are fragmented and bargaining power low
•high switching costs
•powerful supplier brand
•possible integration forward by the supplier

Competitive Rivalry is likely to be high when:
•competitors are in balance
•there is slow market growth (product life cycle)
•there are high fixed costs in an industry
•there are high exit barriers
•markets are undifferentiated
Key Aspects of 5-Forces Analysis

•Use at level of strategic business units (SBU)
•Define the industry/market/sector
•Don’t just list the forces: derive implications for industry/organisation
•Note connections between competitive forces and key drivers in macroenvironment
•Establish interconnections between the five forces
•Competition may disrupt the forces rather than accommodate them


RING


The ring topology is a type of computer network arrangement where each network computer and device are connected to each other forming a big circle (or similar shape). Each packet is sent around the ring until it reaches its final destination. Today, the ring topology is not often used.


ADVANTAGES


Can create much larger network using Token Ring
Does not require network server to manage the connectivity between the computers
Very orderly network where every device has access to the token and the opportunity to transmit
Performs better than a star topology under heavy network load


DISADVANTAGES



Challenges of Strategic Management


•Prevent strategic drift
–Progressive failure to address strategic position
–Deterioration of performance
•Understand and address contemporary issues
–Internationalisation
–E-Commerce
–Changing purposes
–Knowledge and learning
•View strategy in more than one way
–Three strategy lenses – Design, Experience, Ideas







Strategy into Action


•Structuring the organisation
•Marshalling resources (people, information, finance, technology)
•Managing change


Saturday, June 7, 2008

Strategic Choices


•Bases of competitive advantage at business level
•Scope of activities at corporate level
–Portfolio
–Market spread, e.g. international
–Value added by corporate parent (parenting)
•Directions and methods of development
–Directions: Product/Market
–Methods: Internal/organic, M&A, strategic alliances


Strategic Position


•The Organisation’s Environment
–Political Economic Social Technological Legal Environmental
–Sources of Competition
–Opportunities and Threats
•Strategic Capability of the Organisation
–Resources and Competences
–Strengths and Weaknesses

•Expectations and Purposes
–Corporate Governance, Stakeholders, Ethics and Culture
–Sources of Power and Influence
–Communication of Purpose: Mission and Objectives


The Vocabulary of Strategy


•Mission – overriding purpose
•Vision/strategic intent – desired future state
•Goal – general statement of aim or purpose
•Objective – quantification or more precise statement of goal
•Strategic capability – resources, activities and processes
•Business model – how product, service and information flow
•Control – monitoring of action steps


LEVELS OF STRATEGY


•Corporate level
–Determine overall scope of the organisation
–Add value to the different business units
–Meet expectations of stakeholders
•Business level (SBU)
–How to compete successfully in particular markets
•Operational
–How different parts of organisation deliver strategy


Strategic Decisions are About


•The long-term direction of the organisation
•The scope of an organisation’s activities
•Gaining advantage over competitors
•Addressing changes in the business environment
•Building on resources and competences (capability)
•Values and expectations of stakeholders which affect operational decisions


Strategic Business Unit (SBU)


A strategic business unit (SBU) is a part of an organisation for which there is a distinct external market for goods or services that is different from another SBU


STAR TOPOLOGY


In a star topology all nodes connect to one central device. That device may be a file server, or a network hub. When the node wants to transmit to another node, the communication is managed by , and transmitted through, the central device, which contains the communication software.
Advantage
It is easy to determine the source of a network problem, such as a cable failure.
Disadvantage
The main disadvantage is the central device; if the central device is not working the entire network is down. Another disadvantage is adding computers can be costly.


Definition of Strategy


Strategy is the direction and scope of an organisation over the long term, which achieves advantage in a changing environment through its configuration of resources and competences with the aim of fulfilling stakeholder expectations.


Database Application


An application program (or set of related programs) that is used to perform a series of database activities:
•Create
•Read
•Update
•Delete
•On behalf of database users


PC DATABASE






PC DATABASE






PC Databases






Types of Database Systems


•PC Databases
•Centralized Database
•Client/Server Databases
•Distributed Databases
•Database Models


Database Components




Database Environment




Data Independence


Physical representation and location of data and the use of that data are separated
•The application doesn’t need to know how or where the database has stored the data, but just how to ask for it.
•Moving a database from one DBMS to another should not have a material effect on application program
•Recoding, adding fields, etc. in the database should not affect applications


Data Independence


Physical representation and location of data and the use of that data are separated
•The application doesn’t need to know how or where the database has stored the data, but just how to ask for it.
•Moving a database from one DBMS to another should not have a material effect on application program
•Recoding, adding fields, etc. in the database should not affect applications


DBMS Benefits


•Minimal Data Redundancy
•Consistency of Data
•Integration of Data
•Sharing of Data
•Ease of Application Development
•Uniform Security, Privacy, and Integrity Controls
•Data Accessibility and Responsiveness
•Data IndependenceReduced Program Maintenance


From File Systems to DBMS


Problems with File Processing systems
–Inconsistent Data
–Inflexibility
–Limited Data Sharing
–Poor enforcement of standards
–Excessive program maintenance


File Based Systems




Metadata


Data about data

In DBMS means all of the characteristics describing the attributes of an entity,
E.G.:
–name of attribute
–data type of attribute
–size of the attribute
–format or special characteristics


Repository


–AKA Data Dictionary
–The place where all metadata for a particular database is stored
–may also include information on relationships between files or tables in a particular database


Terms and Concepts


Database Management System -- DBMS
–Software system used to define, create, maintain and provide controlled access to the database and repository


Database


A Database is a collection of stored operational data used by the application systems of some particular enterprise. (C.J. Date)
–Paper “Databases”
•Still contain a large portion of the world’s knowledge
–File-Based Data Processing Systems
•Early batch processing of (primarily) business data
–Database Management Systems (DBMS)


Database


A collection of similar records with relationships between the records. (Rowley)
–bibliographic, statistical, business data, images, etc.


File


A collection of records or documents dealing with one organization, person, area or subject. (Rowley)
–Manual (paper) files
–Computer files


Friday, June 6, 2008

WANS


A network that crosses organizational boundaries, or in the case of a multisite organization, reaches outside the immediate environment of local offices and factory facilities, is called a wide area network (WAN). WANs can be public or private. The internet is an example of a public network. The Extranet and the Intranet are private networks.


NETWORK TOPOLOGY


Network Topology is the physical layout of nodes in a network, which often dictates the type of communications protocol used by the network. In reality, only small LANs use a single topology. Larger networks are usually a combination of two or more different topologies.


LOCAL AREA NETWORKA


A computer network within a building, or a campus of adjacent buildings, is called a local area network, or LAN. No specific distance classifies a network as local, but usually as long as it is confined to a radius of three to four miles, it is called a LAN. Local area networks can be hardwired of wireless or a combination of the two, are the most common way to let users share software and hardware resources and to enhance communication among workers.In LANs, one computer is used as a central repository of programs and files that all connected computers can use; this computer is called a server. Connected computers can store documents on their own disks or on the server, can share hardware such as printers, and can exchange e-mail. The server usually has centralized control of communications among the connected computers and between the computers and the server itself.


What is a system?


You have probably used the word ‘”system” many times. Simply put, a system is an array of components that work together to achieve a common goal, or multiple goals, by accepting input, and producing it, and producing output in an organized manner. Consider the following examples:
A sound system consists of many electronic and mechanical parts, such as a laser head, an amplifier, an equalizer, and so on. This system uses input in the form of electrical power and sound recorded on tape or CD, and processes the input to reproduce music and other sounds. The components work together to achieve this goal.


NETWORKS


In the context of data communications, a network is a communication of devices or nodes connected to each other through one of the communication channels just discussed. Networks in which a single host computer serves only dumb terminals are becoming obsolete as prices of microcomputers have plummeted.There are two basic types of networks: LANs (local area networks), which serve an office or several adjacent offices; and WANs (wide area networks), which are larger, national or global networks use the same type of layout, also called topology, and the same types of protocols for signal transmission and reception. In such cases, the only difference between LANs and WANs is the distance between the networked computers.


COOKIES


If you have ever suffered the Web, your computer probably contains cookies. A cookie is a sample file that a Web site place on a visitor’s hard disk so that the Web site can remember something about the surfer later. Typically, a cookie records the surfer’s ID of some other unique identifier. Cookies have an important function in Web-based e-commerce, especially between business and customers. They provide convenience to customers. If the cookie contains your name and password for accessing a certain resource at the site, you do not have reentered the information. Cookies often help ensure that a user dose not receive the same unsolicited information multiple times. For instant, cookies are commonly used to rotate banner ads.Some cookies are temporary; they are installed only for that session, and are removed when the user leaves the site. Others are persistent and stay on the hard disk unless the user deletes them. Many cookies are installed to serve only first parties, which are the businesses with which the user interacts directly. Others serve third parties, which are organizations that collect information about the user whenever the user visits a site that subscribes to the service of these organizations.

learn more http://www.w3schools.com/PHP/php_cookies.asp


Common Gateway Interface (CGI)


Special software used in internet servers that allows the capture of data from a form displayed on a page and the storage of the data in a database.


HOW THE INTERNET WORKS


A simplified explanation of how the Internet works is that every computer and device that accesses the Internet has a unique label or Internet “address.”Internet software and protocols (rules of communication) enable a device to locate another device. For an instant, if you are on the web, you are familiar process of entering a Web address or Uniform Resource Locator (URL) such as www.lankasri.com to access a web site. But what do these letters mean, and where do they come from?


FILE TRANSFER PROTOCOL (FTP)


File transfer protocol is the most popular way to transmit whole files from one computer to another. Every time you download a file from a Web site or attach files to e-mail, you are using a FTP application


MULTIMEDIA ON THE WEB


Multimedia is referred to sound, video, animation, and 3D interactive video. Sometimes you’ll be required to download the multimedia files, web pages, or sites. Most of the time multimedia files require that your browser use a plug-in programme. Plug-ins are little software programmes. They enhance your browser so you could listen to sound and video clips. They automatically decompress large files you download. If you don’t have a plug-in programme, you could download it off websites.


DATA COMMUNICATION


Data communication is transfer of data within a computer, between a computer and another device, or between two computers. This type of communication is accomplished through the computer bus. A bus is a system of wires, or strings of conductive material, etched on the surface of a computer board. It is a communication channel that allows the transmission of whole byte or more in one pass.


DATA


Data are the facts about people, other objects, and events. May be manipulated and processed to produce information.


Data Access Storage Device (DASD)


An external storage medium that allows direct storage medium that allows direct storage and retrieval of records from stored files. For instant magnetic disks and optical discs


Wednesday, June 4, 2008

Data


Data are the facts about people, other objects, and events. May be manipulated and processed to produce information.


What is TELNET


The TELNET protocol makes TELNET or remote login possible on the Internet. TELNET to host is all about establishing a connection accross the Internet from one host to another. Quite often, you will need to have an account on the remote host to login once you have made connection. Certain hosts offering white page directories, provide public services that don't require a personal account.


WHAT IS THE DOMAIN NAME SYSTEM


the Domain Nama System (DNS) organises the name space of the Internet. It administratively groups hosts into a hierarchy of authority that allows addressing and other information to be widely distributed and maintained.


How do i download files


you can download a file by simply clicking on the link. your browse (Netscape or Explorer) will then display the file in your browser window if it is an image or text, or ask you what action to take with the file if it is another type. If you choose the SAVE option, you will then have to choose where you want to save it (choosing the location). A status bar will be displayed once you select this option, telling you how far along the tranfer has gone. Once this task is done, the window will either disappear, or display a message to tell you that the download has been completed.


Tuesday, June 3, 2008

What can you do on the internet


The Internet is a bank of information can be used for a lot of things. for example, you can shop in another continent, sample music, send messages or documents across the world, check out the stock market, listen and download music, play games, chat, catch the latest news in any part of the world, manage your bank account. the Internet became popular after the invention of the file transfer protocol (FTP)


what is an Internet?


The Internet, commonly call as Net is an international network of computers linked up to exchange informations. the word internet emerged by a combination of the shortened forms of international and network.


what is an Iternet Service Provider (ISP)


An ISP is a company that helps the public to cotact to the internet. it can be distinguished from an information service such as Suntel wOw, CompuServe or America online by its emphasis on Internet tools such as USENET News, Gopher, WWW, etc.


Sunday, June 1, 2008

database


DATA

Data are the facts about people, other objects, and events. May be manipulated and processed to produce information.

DATA COMMUNICATION

Data communication is transfer of data within a computer, between a computer and another device, or between two computers. This type of communication is accomplished through the computer bus. A bus is a system of wires, or strings of conductive material, etched on the surface of a computer board. It is a communication channel that allows the transmission of whole byte or more in one pass.

Database

A collection of similar records with relationships between the records. (Rowley)
–bibliographic, statistical, business data, images, etc.

next page


Enter your email address:

 

SOFTWARES AND PLATFORMS Copyright © 2010 LKart Theme is Designed by Lasantha