Wednesday, July 17, 2019

Short Notes About Some Point

SIM A indorser identity module (SIM) on a removable SIM card take into custodyly stores the serve up- referee spot (IMSI) ha deedd to identify a subscriber on alert telephony devices ( much(prenominal)(prenominal) as peregrine forebodes and calculators). A SIM card contains its whimsical serial good turn, internationally unique trope of the sprightly recitationr (IMSI), certificate corroboration and ciphering in fix upion, temporary randomness think to the topical anaesthetic ne iirk (to a fault temporary local id that has been issued to the routiner), a list of the run the user has feeler to and two pass lyric poem (PIN for usual use and PUK for unlocking).SIM sepa charge per unit atomic number 18 available in two meter sizes. The first is the size of a credit card (85. 60 mm ? 53. 98 mm x 0. 76 mm). GSM GSM is stands for Global agreement for roleplayive chat. It is a digital fluent telephony arranging that is widely employ in Asia and betimes(a) a rt objects of the world. GSM uses a variation of prison margininal division multiple access (TDMA) and is the some(prenominal) widely utilise of the one-third digital receiving range telephony technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses selective information, and then sends it floor a channel with two early(a) streams of user info, each in its sustain time slot.It ope order at either the 900 megahertz or 1800 MHz frequency band. Mobile armed services ground on GSM locomotive room were first launched in Finland in 1991. Today, to a greater extent than 690 mobile networks render GSM services crosswise 213 seemries and GSM represents 82. 4% of all global mobile companys. According to GSM conception, there ar promptly more than 2 billion GSM mobile phone users worldwide. Since many an other(prenominal) GSM network operators pretend roaming agreements with foreign operators, users arse very much get across to use their mobile phones whe n they travel to sepa stride countries.GSM, together with an separate(prenominal) technologies, is part of the growing of wireless mobile telecommunications that includes High-Speed Circuit-Switched entropy (HCSD), General Packet Radio scheme (GPRS), Enhanced Data GSM Environment (EDGE), and world(a) Mobile Telecommunications Service (UMTS). GPRS GPRS (General packet radiocommunication service) is a packet oriented mobile selective information service available to users of the 2G cellular communication dodges global system for mobile communications (GSM), as well as in the 3G systems. In 2G systems, GPRS provides info rates of 56-114 kbit/s.GPRS data transfer is typically aerated per MB of traffic transferred, while data communication via traditional lap permutation is billed per minute of connection time, self-employed individual of whether the user actually is using the message or is in an idle state. GPRS is a best-effort packet switched service, as opposed to cir cuit switching, where a certain quality of service (QoS) is guaranteed during the connection for non-mobile users. 2G cellular systems combined with GPRS ar oftentimes calld as 2. 5G, that is, a technology between the foster (2G) and triad (3G) generations of mobile telephony.It provides moderate speed data transfer, GSM is the only kind of network where GPRS is in use. GPRS is integrated into GSM Release 97 and newer releases. It was rootally amountized by European Telecommunications Standards be (ETSI), but now by the tertiary Generation Partnership Project (3GPP). GPRS was substantial as a GSM response to the forward CDPD and i-mode packet switched cellular technologies. W-Lan A wireless local vault of heaven network (WLAN) colligate devices via a wireless distribution system (typically spread-spectrum or OFDM) and usually provides a connection through an access point to the wider internet.This gives users the mobility to live around within a local c everywhereag e area and still be connected to the network. Wireless LANs control fit normal in the home receivable to ease of installation and the increasing popularity of laptop calculating machines. Wi-Fi Wi-Fi (short for wireless fidelity) is a destination for certain types of wireless local area network (WLAN) that use specifications in the 802. 11 family. The term Wi-Fi was created by an geological formation called the Wi-Fi Alliance, which oversees tests that tell product interoperability. A product that passes the alliance tests is presumption the label Wi-Fi certified (a testifyed trademark).Originally, Wi-Fi authentication was applicable only to products using the 802. 11b standard. Today, Wi-Fi finish apply to products that use any 802. 11 standard. The 802. 11 specifications are part of an evolving manipulate of wireless network standards known as the 802. 11 family. The special(a) specification under(a) which a Wi-Fi network operates is called the flavor of the network . both entity that has a wireless LAN should use security safeguards much(prenominal)(prenominal) as the pumped(p) Equivalent Privacy (WEP) encryption standard, the more recent Wi-Fi Protected Access (WPA), net profit protocol Security (IPsec), or a virtual offstage network (VPN).ALU An (ALU) arithmetic Logic Unit is a digital circuit that performs arithmetic and logical operations. The ALU is a fundamental building block of the rally processing unit (CPU) of a figurer, and nonetheless the simplest microprocessors contain one for excogitations such as maintaining timers. The processors found inside modern CPUs and artistry processing units (GPUs) accommodate very unchewable and very complex ALUs a oneness voice may contain a number of ALUs. Mathematician John von Neumann proposed the ALU archetype in 1945, when he wrote a give give away on the foundations for a new computer called the EDVAC.REFRESH RATE The freshen rate (most commonly the vertical remember rate, v ertical descry rate for CRTs) is the number of times in a second that queer hardware draws the data. This is distinct from the footstep of frame rate in that the refresh rate includes the repeated drawing of equal frames, On CRT discovers, increasing the refresh rate decreases flickering, thereby reducing center of attention strain. However, if a refresh rate is undertake that is beyond what is recommended for the demonstrate, damage to the display nookie occur.For computer programs or telemetry, the term is also applied to how frequently a datum is updated with a new external abide by from another source. RESULATION The display settlement of a digital television or display device is the number of distinct pels in each dimension that can be displayed. It can be an ambiguous term especially as the displayed resolution is controlled by all contrastive factors in cathode radiate tube (CRT) and flat panel or projection displays using fixed panorama-element ( pix chestel ) arrays. champion use of the term display resolution applies to fixed-pixel-array displays such as plasma display panels (PDPs), liquid crystal displays (LCDs), Digital igniter Processing (DLP) projectors, or similar technologies, and is precisely the physical number of columns and rows of pixels creating the display (e. g. , 1920? 1200). A consequence of having a fixed power grid display is that, for multi-format video inputs, all displays sine qua non a scaling engine (a digital video processor that includes a memory board array) to match the incoming picture format to the display.PIXEL A pixel (or picture element) is a genius point in a raster image. The pixel is the smallest citationable masking piece fire element, it is the smallest unit of picture which can be controlled. Each pixel has its own address. The address of a pixel hold backs to its coordinates. Pixels are ordinarily arranged in a 2-dimensional grid, and are often represented using dots or squares. Each p ixel is a essay of an original image, where more samples typically provide more-accurate molds of the original. The intensity of each pixel is variable.In saturation image systems, a color is typically represented by three or four component intensities such as red, green, and blue, or black. In well-nigh contexts (such as descriptions of camera sensors), the term pixel is employ to refer to a unity scalar element of a multi-component histrionics (more precisely called a photo situate in the camera sensor context, although the mintage sensel is also sometimes used to divulge the elements of a digital cameras sensor),2 while in others the term may refer to the stainless set of such component intensities for a spatial position.In color systems that use chrome sub sampling, the multi-component concept of a pixel can become gruelling to apply, since the intensity measures for the different color components correspond to different spatial areas in such a representation. The wor d pixel is based on a contraction of pix (pictures) and el (for element) similar formations with el for element include the words voxel and texel. SCAN-PORT A port grazener is a packet application intentional to probe a network host for open ports.This is often used by administrators to verify security policies of their networks and by attackers to identify running game services on a host with the horizon to compromise it. To portscan a host is to scan for auditory sense ports on a single target host. To port navigate is to scan multiple hosts for a specific listening port. The latter is typically used in searching for a specific service, for example, an SQL-based computer worm may port sweep looking for hosts listening on transmission control protocol port 1433.HTTP Hypertext Transfer Protocol skilful (HTTPS) is a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encryption and secure (web site security testing) identification of the serve r. HTTPS connections are often used for payment transactions on the World extensive Web and for slight transactions in corporate information systems. HTTP is a request-response standard typical of client-server calculation. In HTTP, web browsers or spiders typically act as clients, while an application running on the computer hosting the web site acts as a server.The client, which submits HTTP requests, is also referred to as the user operator. The responding server, which stores or creates resources such as HTML files and images, may be called the origin server. In between the user agent and origin server may be several intermediaries, such as proxies, gateways, and tunnels. chase ENGINE A program that searches documents for condition keywords and returns a list of the documents where the keywords were found. Although earch engine is rattling a general class of programs, the term is often used to specifically describe systems like Google, Alta Vista and Excite that enable u sers to search for documents on the World Wide Web and USENET newsgroups. Typically, a search engine works by sending out a spider to fetch as many documents as possible. Another program, called an indexer, then reads these documents and creates an index based on the words contained in each document. Each search engine uses a proprietary algorithmic rule to create its indices such that, ideally, only significant results are returned for each query.RTAP Short for existing Time Streaming Protocol, a standard for controlling streaming data over the World Wide Web. Like H. 323, RTSP uses RTP (Real-Time disco biscuit Protocol) to format packets of multimedia content. But whereas H. 323 is intentional for videoconferencing of moderately-sized groups, RTSP is designed to efficiently broadcast audio-visual data to large groups. RTSP grew out of work through by Columbia University, Netscape and Real Networks. RSVP R. S. V. P. stands for a French phrase, repondez, sil vous plait, which means please reply. The person sending the invitation would like you to tell him or her whether you accept or decline the invitation. That is, leave behind you be coming to the dismantlet or not? Etiquette rules followed in most horse opera cultures require that if you receive a white-tie, pen invitation, you should reply promptly, perhaps that same day. For hosts who are planning a dinner party, a wedding or a reception, this is of the essence(p) from a practical point of view, because they command to know how many people to count on and how much food and confound to buy.More important, though, is the simple courtesy of responding to someone who was nice enough to invite you, even if it is to say that you regret that you will not be able to attend. APPLICATION waiter Short for field of force detect body (or Service or Server), an mesh service that translates humans call into IP addresses. Because stadium label are alphabetic, theyre easier to remember. The profi ts however, is in truth based on IP addresses. every time you use a ground name, therefore, a DNS service must translate the name into the corresponding IP address.For example, the theater of operations name www. example. com might translate to 198. 105. 232. 4. The DNS system is, in fact, its own network. If one DNS server doesnt know how to translate a particular domain name, it asks another one, and so on, until the excoriate IP address is returned. MAIL-SERVER A light server is a computer that serves as an electronic post office for e postal service. berth exchanged across networks is passed between send servers that run specially designed software program.This software is built around agreed-upon, standardized protocols for treatment mail messages, the graphics they might contain, and alliance files. Internet Service Providers (ISPs) each find a mail server for treatment their clients mail messages, sometimes referred to as private mail servers. Some websites also exsert public email services, utilizing their own mail servers. DNS The playing area Name dodging (DNS) is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network.It associates respective(a) information with domain call appoint to each of the participants. Most importantly, it translates domain names meaningful to humans into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide. An often-used analogy to explain the surface area Name System is that it serves as the phone entertain for the Internet by translating human-friendly computer hostnames into IP addresses. For example, www. example. com translates to 192. . 32. 10. The Domain Name System makes it possible to assign domain names to groups of Internet users in a meaningful way, independent of each users physical location. Because of this, World Wide Web (WWW) hyperlinks and In ternet tint information can remain tenacious and constant even if the current Internet routing arrangements change or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as 208. 77. 188. 166 (IPv4) or 2001db81f70999de876486e8 (IPv6).The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. Authoritative name servers are assign to be responsible for their particular domains, and in turn can assign other authoritative name servers for their sub-domains. This mechanism has do the DNS distributed and fault tolerant and has helped avoid the engage for a single central register to be continually consulted and updated. In general, the Domain Name System also tores other types of information, such as the list of mail servers that accept email for a given Internet domain. By providing a worldwide, distributed keywo rd-based redirection service, the Domain Name System is an essential component of the functionality of the Internet. Other identifiers such as RFID tags, UPC codifications, multinational compositors cases in email addresses and host names, and a variety of other identifiers could all potentially utilize DNS. The Domain Name System also defines the technical underpinnings of the functionality of this database service.For this purpose it defines the DNS protocol, a detailed specification of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite (TCP/IP). Symbian OS Symbian OS is an direct system (OS) designed for mobile devices and smart phones, with associated libraries, user interface, frameworks and type implementations of common tools, originally developed by Symbian Ltd. It was a descendant of Psions EPOC and runs exclusively on ARM processors, although an unreleased x86 port existed.In 2008, the former Symbian Software Limited was acquired by Nokia and a new independent non-profit composition called the Symbian Foundation was established. Symbian OS and its associated user interfaces S60, UIQ and MOAP(S) were contributed by their owners to the foundation with the objective of creating the Symbian programme as a royalty-free, open source software. The course of study has been designated as the successor to Symbian OS, following the official launch of the Symbian Foundation in April 2009. The Symbian platform was officially made available as open source economy in February 2010.Devices based on Symbian OS invoice for 46. 9% of smartphone sales, making it the worlds most popular mobile operating system. DE-MORGAN The law is named after(prenominal) Augustus De Morgan (18061871)3 who introduced a formal transformation of the laws to guiltless propositional logic. De Morgans formulation was influenced by algebraization of logic undertaken by George Boole, which later cemented De Morgans claim to the find. In formal logic, De Morgans laws are rules relating the logical operators and and or in terms of each other via negation, viz. NOT (P OR Q) = (NOT P) AND (NOT Q) NOT (P AND Q) = (NOT P) OR (NOT Q)EBCDIC Extended Binary Coded Decimal convert Code (EBCDIC) is an 8-bit character encoding (code page) used on IBM mainframe operating systems such as z/OS, OS/390, VM and VSE, as well as IBM midrange computer operating systems such as OS/ cd and i5/OS (see also Binary Coded Decimal). It is also employed on various non-IBM platforms such as Fujitsu-Siemens BS2000/OSD, HP MPE/iX, and Unisys MCP. EBCDIC descended from the code used with punched cards and the corresponding six bit binary-coded decimal code used with most of IBMs computer peripherals of the late 1950s and early 1960s.ASCII Acronym for the American Standard Code for knowledge Interchange. Pronounced ask-ee, ASCII is a code for representing side of meat characters as numbers, with each letter charge a number from 0 to 127. Fo r example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another. UNICODE Unicode is a computing industry standard for the consistent representation and manipulation of text expressed in most of the worlds writing systems.Developed in conjunction with the Universal Character adapt standard and published in book form as The Unicode Standard, the latest version of Unicode consists of a repertoire of more than 107,000 characters covering 90 scripts, a set of code charts for visual reference, an encoding methodology and set of standard character encodings, an enumeration of character properties such as upper and glare case, a set of reference data computer files, and a number of related items, such as character properties, rules for normalization, decomposition, collation, rendering, and biface display order (for the correct display of text containing both right-to-left scripts, su ch as Arabic or Hebrew, and left-to-right scripts). The Unicode Consortium, the nonprofit organization that coordinates Unicodes development, has the ambitious goal of eventually surrogate existing character encoding schemes with Unicode and its standard Unicode Transformation Format (UTF) schemes, as many of the existing schemes are limited in size and scope and are contrasting with multilingual environments.Unicodes success at unifying(a) character sets has led to its widespread and dominant use in the internationalization and location of computer software. The standard has been implemented in many recent technologies, including XML, the Java programming language, the Microsoft . NET Framework, and modern operating systems. Unicode can be implemented by different character encodings. The most commonly used encodings are UTF-8 (which uses one byte for any ASCII characters, which have the same code values in both UTF-8 and ASCII encoding, and up to four bytes for other charact ers), the now-obsolete UCS-2 (which uses two bytes for each character but cannot encode every character in the current Unicode standard), and UTF-16 (which extends UCS-2 to handle code points beyond the scope of UCS-2).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.