Wednesday, March 6, 2019
Short Notes About Some Point
SIM A subscriber identity module (SIM) on a removable SIM card securely stores the service-subscriber key (IMSI) routined to identify a subscriber on ready telephony devices ( such(prenominal) as fluent ph unmatcheds and reck unrivalledrs). A SIM card contains its unique serial flake, internationally unique total of the wide awake drug exploiter (IMSI), security authentication and ciphering selective information, temporary information re deepd to the local anaesthetic network (also temporary local id that has been issued to the user), a list of the services the user has price of admission to and two pass ledgers (PIN for usual use and PUK for unlocking).SIM cards ar open in two standard sizes. The showtime is the size of a mention card (85. 60 mm ? 53. 98 mm x 0. 76 mm). GSM GSM is stands for Global arrangement for Mobile communication. It is a digital mobile telephony system that is widely utilise in Asia and other parts of the world. GSM uses a variation of time division multiple access (TDMA) and is the close to widely used of the three digital radiocommunication telephony technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses selective information, then sends it galvanic pile a channel with two other streams of user entropy, each in its declargon time slot.It ope come outs at either the 900 megacycle per second or 1800 MHz frequency band. Mobile services based on GSM engineering science were first launched in Finland in 1991. Today, more than 690 mobile networks provide GSM services across 213 countries and GSM represents 82. 4% of all global mobile connections. According to GSM manhood, there atomic number 18 at present more than 2 billion GSM mobile phone users worldwide. Since numerous a(prenominal) GSM network operators withdraw roaming agreements with foreign operators, users nominate often continue to use their mobile phones when they travel to other countries.GSM, together with other technologies, is part of the developing of receiving set mobile telecommunications that includes High-Speed Circuit-Switched Data (HCSD), General Packet radio form (GPRS), Enhanced Data GSM Environment (EDGE), and Universal Mobile Telecommunications usefulness (UMTS). GPRS GPRS (General packet radio service) is a packet oriented mobile data service available to users of the 2G cellular communication systems global system for mobile communications (GSM), as well as in the 3G systems. In 2G systems, GPRS provides data rates of 56-114 kbit/s.GPRS data transfer is typically charged per MB of affair transferred, while data communication via traditional circuit switching is charge per minute of connection time, independent of whether the user actually is victimization the depicted object or is in an idle state. GPRS is a best-effort packet switched service, as opposed to circuit switching, where a certain quality of service (QoS) is guaranteed during the connection for non-mobile users. 2G cellular s ystems combined with GPRS are often fall upond as 2. 5G, that is, a technology between the second (2G) and third (3G) generations of mobile telephony.It provides moderate speed data transfer, GSM is the only kind of network where GPRS is in use. GPRS is integrated into GSM Release 97 and brisker releases. It was originationally standardized by European Telecommunications Standards Institute (ETSI), but now by the 3rd Generation Partnership Project (3GPP). GPRS was developed as a GSM response to the earlier CDPD and i-mode packet switched cellular technologies. W-Lan A wireless local area network (WLAN) links devices via a wireless scattering method (typically spread-spectrum or OFDM) and usually provides a connection through an access point to the wider internet.This gives users the mobility to move around within a local re airage area and still be connected to the network. Wireless LANs have go away popular in the home due to ease of installation and the transport magnitude popularity of laptop calculating machines. Wi-Fi Wi-Fi (short for wireless fidelity) is a boundary for certain types of wireless local area network (WLAN) that use specifications in the 802. 11 family. The enclosure Wi-Fi was created by an ecesis called the Wi-Fi Alliance, which oversees tests that certify product interoperability. A product that passes the coalition tests is given the label Wi-Fi certified (a registered trademark).Originally, Wi-Fi certification was applicable only to products using the 802. 11b standard. Today, Wi-Fi can apply to products that use any 802. 11 standard. The 802. 11 specifications are part of an evolving set of wireless network standards known as the 802. 11 family. The particular specification under which a Wi-Fi network operates is called the flavor of the network. each entity that has a wireless LAN should use security safeguards such as the Wired Equivalent Privacy (WEP) encryption standard, the more recent Wi-Fi saved Access (WPA), Intern et communications protocol Security (IPsec), or a practical(prenominal) insular network (VPN).ALU An (ALU) Arithmetic Logic Unit is a digital circuit that performs arithmetic and crystalline operations. The ALU is a fundamental building layover of the central bear upon unit (CPU) of a computer, and even the simplest microprocessors contain one for purposes such as maintaining timers. The processors found inside new-made CPUs and artistic production processing units (GPUs) accommodate very powerful and very complex ALUs a individual(a) portion whitethorn contain a number of ALUs. Mathematician John von von Neumann proposed the ALU concept in 1945, when he wrote a report on the psychiatric hospitals for a advanced computer called the EDVAC.REFRESH RATE The refresh rate (most normally the vertical refresh rate, vertical conk out rate for CRTs) is the number of times in a second that bring out hardware draws the data. This is unequivocal from the measure of frame rate in that the refresh rate includes the repeat drawing of identical frames, On CRT displays, increasing the refresh rate decreases flickering, thereby reducing eye strain. However, if a refresh rate is undertake that is beyond what is recommended for the display, damage to the display can occur.For computer programs or telemetry, the term is also applied to how frequently a datum is updated with a new external value from some other origination. RESULATION The display contract of a digital television or display device is the number of distinct pixels in each dimension that can be displayed. It can be an suspicious term especially as the displayed resolution is controlled by all contrastive factors in cathode ray tube (CRT) and flat panel or bulge displays using fixed record-element (pixel) arrays.One use of the term display resolution applies to fixed-pixel-array displays such as plasma display panels (PDPs), liquid crystal displays (LCDs), digital Light Processing (DLP) projec tors, or similar technologies, and is simply the corporal number of columns and rows of pixels creating the display (e. g. , 1920? 1200). A consequence of having a fixed grid display is that, for multi-format video inputs, all displays privation a scaling engine (a digital video processor that includes a memory array) to match the incoming picture format to the display.PIXEL A pixel (or picture element) is a whiz point in a raster image. The pixel is the smallest divvy upable screen element, it is the smallest unit of picture which can be controlled. Each pixel has its own address. The address of a pixel corresponds to its coordinates. Pixels are normally arranged in a 2-dimensional grid, and are often represented using dots or squares. Each pixel is a sample of an original image, where more samples typically provide more-accurate representations of the original. The bulk of each pixel is variable.In intensity image systems, a color in is typically represented by three or qu atern component intensities such as red, green, and blue, or black. In some con school texts (such as descriptions of tv camera sensors), the term pixel is used to refer to a whiz scalar element of a multi-component representation (more precisely called a photo turn up in the camera sensor context, although the neologism sensel is also sometimes used to describe the elements of a digital cameras sensor),2 while in others the term whitethorn refer to the entire set of such component intensities for a spatial position.In color systems that use chrome sub sampling, the multi-component concept of a pixel can become difficult to apply, since the intensity measures for the different color components correspond to different spatial areas in such a representation. The word pixel is based on a contraction of pix (pictures) and el (for element) similar formations with el for element include the spoken communication voxel and texel. SCAN-PORT A port scanner is a software application knowin g to look into a network host for open ports.This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. To portscan a host is to scan for listening ports on a single target host. To port swing over is to scan multiple hosts for a specific listening port. The latter is typically used in searching for a specific service, for example, an SQL-based computer insect may port sweep looking for hosts listening on transmission control protocol port 1433.HTTP Hypertext off Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encryption and secure (website security testing) acknowledgment of the master of ceremonies. HTTPS connections are often used for payment transactions on the macrocosm Wide Web and for sensitive transactions in corporate information systems. HTTP is a request-response standard typical of client-s erver computing. In HTTP, web browsers or spiders typically act as clients, while an application running on the computer hosting the web site acts as a server.The client, which submits HTTP requests, is also referred to as the user agent. The responding server, which stores or creates resources such as HTML files and images, may be called the origin server. In between the user agent and origin server may be several intermediaries, such as proxies, gateways, and tunnels. SEARCH ENGINE A program that searches documents for specified keywords and returns a list of the documents where the keywords were found. Although earch engine is really a general class of programs, the term is often used to specifically describe systems like Google, Alta Vista and Excite that enable users to search for documents on the World Wide Web and USENET newsgroups. Typically, a search engine works by send out a spider to fetch as many documents as possible. Another program, called an indexer, then reads the se documents and creates an index based on the words contained in each document. Each search engine uses a trademarked algorithm to create its indices such that, ideally, only meaningful results are returned for each query.RTAP Short for Real Time Streaming Protocol, a standard for domineering streaming data over the World Wide Web. Like H. 323, RTSP uses RTP (Real-Time cargo ships Protocol) to format packets of multimedia content. But whereas H. 323 is designed for videoconferencing of moderately-sized groups, RTSP is designed to efficiently direct audio- optic data to large groups. RTSP grew out of work done by capital of South Carolina University, Netscape and Real Networks. RSVP R. S. V. P. stands for a French phrase, repondez, sil vous plait, which means please reply. The person sending the invitation would like you to tell him or her whether you accept or decline the invitation. That is, depart you be coming to the event or not? Etiquette rules followed in most Western cultures require that if you receive a formal, written invitation, you should reply promptly, possibly that same day. For hosts who are planning a dinner party, a married couple or a reception, this is important from a practical point of view, because they need to know how many people to count on and how much solid food and drink to buy.More important, though, is the simple courtesy of responding to someone who was nice sufficient to invite you, even if it is to say that you regret that you will not be able to attend. APPLICATION SERVER Short for empyrean appellation scheme (or Service or Server), an Internet service that translates field of view name into IP addresses. Because domain label are alphabetic, theyre easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address.For example, the domain name www. example. com might translate to 198. 1 05. 232. 4. The DNS system is, in fact, its own network. If one DNS server doesnt know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. MAIL-SERVER A berth server is a computer that serves as an electronic post office for email. direct exchanged across networks is passed between mail servers that run specially designed software.This software is built around agreed-upon, standardized protocols for handling mail messages, the graphics they might contain, and attachment files. Internet Service Providers (ISPs) each have a mail server for handling their clients mail messages, sometimes referred to as private mail servers. Some websites also offer public email services, utilizing their own mail servers. DNS The Domain Name System (DNS) is a hierarchical appointee system for computers, services, or any resource connected to the Internet or a private network.It associates various information with domain names delegate to each of the participants. nigh importantly, it translates domain names meaningful to humans into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide. An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. For example, www. example. com translates to 192. . 32. 10. The Domain Name System makes it possible to assign domain names to groups of Internet users in a meaningful way, independent of each users physical location. Because of this, World Wide Web (WWW) hyperlinks and Internet contact information can remain consistent and constant even if the current Internet routing arrangements change or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as 208. 77. 188. 166 (IPv4) or 2001db81f70999de876486e8 (IPv6).The Domain Nam e System distributes the responsibility of assigning domain names and subprogram those names to IP addresses by designating authoritative name servers for each domain. imperious name servers are assign to be responsible for their particular domains, and in turn can assign other authoritative name servers for their sub-domains. This tool has made the DNS distributed and fault tolerant and has helped avoid the need for a single central register to be continually consulted and updated. In general, the Domain Name System also tores other types of information, such as the list of mail servers that accept email for a given Internet domain. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the Internet. Other identifiers such as RFID tags, UPC codes, International functions in email addresses and host names, and a anatomy of other identifiers could all potentially utilize DNS. The Domain N ame System also defines the technical underpinnings of the functionality of this database service.For this purpose it defines the DNS protocol, a detailed specification of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite (TCP/IP). Symbian OS Symbian OS is an in operation(p) system (OS) designed for mobile devices and smart phones, with associated libraries, user interface, frameworks and honorable mention implementations of common tools, originally developed by Symbian Ltd. It was a descendant of Psions EPOC and runs exclusively on ARM processors, although an unreleased x86 port existed.In 2008, the former Symbian Software Limited was acquired by Nokia and a new independent non-profit organisation called the Symbian Foundation was established. Symbian OS and its associated user interfaces S60, UIQ and MOAP(S) were contributed by their owners to the foundation with the objective of creating the Symbian curriculum as a royalty-free , open source software. The platform has been designated as the successor to Symbian OS, following the official launch of the Symbian Foundation in April 2009. The Symbian platform was officially made available as open source code in February 2010.Devices based on Symbian OS account for 46. 9% of smartphone sales, making it the worlds most popular mobile operating system. DE-MORGAN The law is named by and by Augustus De Morgan (18061871)3 who introduced a formal version of the laws to classical propositional logic. De Morgans formulation was influenced by algebraization of logic undertaken by George Boole, which later cemented De Morgans claim to the find. In formal logic, De Morgans laws are rules relating the logical operators and and or in terms of each other via negation, namely non (P OR Q) = (NOT P) AND (NOT Q) NOT (P AND Q) = (NOT P) OR (NOT Q)EBCDIC Extended Binary Coded Decimal baste Code (EBCDIC) is an 8-bit feature encode (code page) used on IBM mainframe operating s ystems such as z/OS, OS/390, VM and VSE, as well as IBM midrange computer operating systems such as OS/400 and i5/OS (see also Binary Coded Decimal). It is also employed on various non-IBM platforms such as Fujitsu-Siemens BS2000/OSD, HP MPE/iX, and Unisys MCP. EBCDIC descended from the code used with punched cards and the corresponding six-spot bit binary-coded decimal code used with most of IBMs computer peripherals of the late 1950s and early 1960s.ASCII Acronym for the American Standard Code for Information Interchange. pronounce ask-ee, ASCII is a code for representing English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another. UNICODE Unicode is a computing industry standard for the consistent representation and role of text expressed in most of the worlds writing systems.Developed in conjunction with the Universal Character Set standard and published in book form as The Unicode Standard, the latest version of Unicode consists of a repertory of more than 107,000 characters covering 90 scripts, a set of code charts for visual reference, an encoding methodology and set of standard character encodings, an enumeration of character properties such as upper and lower case, a set of reference data computer files, and a number of related items, such as character properties, rules for normalization, decomposition, collation, rendering, and bidirectional display order (for the correct display of text containing both right-to-left scripts, such as Arabic or Hebrew, and left-to-right scripts). The Unicode Consortium, the nonprofit organization that coordinates Unicodes development, has the ambitious goal of eventually replacing existing character encoding schemes with Unicode and its standard Unicode Transformation Format (UTF) schemes, as many of the existing schemes are l imited in size and chain and are incompatible with bilingual environments.Unicodes success at unifying character sets has led to its widespread and rife use in the internationalization and localization of computer software. The standard has been utilize in many recent technologies, including XML, the Java programming language, the Microsoft . NET Framework, and modern operating systems. Unicode can be implemented by different character encodings. The most commonly used encodings are UTF-8 (which uses one byte for any ASCII characters, which have the same code values in both UTF-8 and ASCII encoding, and up to four bytes for other characters), the now-obsolete UCS-2 (which uses two bytes for each character but cannot encode all(prenominal) character in the current Unicode standard), and UTF-16 (which extends UCS-2 to handle code points beyond the scope of UCS-2).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment