<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-52014671972461935</id><updated>2026-03-23T16:44:04.155-07:00</updated><category term="Computer Basic"/><category term="computer animation"/><category term="central processing unit"/><category term="instruction sets"/><category term="ALU"/><category term="Arithmetic Unit"/><category term="CPU"/><category term="Laptop"/><category term="Registers"/><category term="Security"/><category term="Toshiba Laptop"/><category term="animation requirements"/><category term="audio"/><category term="computer architecture"/><category term="digital audio"/><category term="hardare requirements for animation"/><category term="motions"/><category term="multimedia"/><category term="processors"/><category term="software requirements for animation"/><category term="what is animation"/><title type='text'>Basic Computer Internet knowledge, Multimedia, Animation, FTP,Internet Reviews</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Navv Technology</name><uri>http://www.blogger.com/profile/08166471883059921932</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>29</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-669729822186969525</id><published>2015-01-27T08:30:00.001-08:00</published><updated>2015-01-27T08:30:39.234-08:00</updated><title type='text'>Security and Privacy in Computer Networks</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Due to the wide spread use of PCs and Developments in networks connecting PCs to company&#39;s Mainframe computers, there has been an increase in the chances of feeding undesirable data deliberately outsiders.&amp;nbsp; A person with a PC at a remote place can use a phone line and illegally collect information without leaving any clues. Individual users can copy confidential data from a company&#39;s computer or other details from a remote station connected via a communication network.&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9pOeoXefPmXrE4ZoBcHUJMr-B4HpqK6k7AwzWLUCvNDCc6I4fB4638UaG8uEHrquUEbhre1Wo9BuZk_Gw8JtWQ2h7Szc2nyX7u-qR65du9KAyTFb8gy2fbMayHCbDswR_CrQoUOsVBkg/s1600/FINAL_OutSmartCriminalFinalDD11.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Computer Security&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9pOeoXefPmXrE4ZoBcHUJMr-B4HpqK6k7AwzWLUCvNDCc6I4fB4638UaG8uEHrquUEbhre1Wo9BuZk_Gw8JtWQ2h7Szc2nyX7u-qR65du9KAyTFb8gy2fbMayHCbDswR_CrQoUOsVBkg/s1600/FINAL_OutSmartCriminalFinalDD11.jpg&quot; height=&quot;261&quot; title=&quot;Computer Security&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Note:-&amp;nbsp; &lt;/strong&gt;&lt;em&gt;The collection of tools&amp;nbsp; designed to protect data and thwart hackers is known as computer security&lt;/em&gt;. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Security means preventing the network communication system fall in the hands of unauthorized people. The sender of data may wish to be assured that only the intended party actually receives designated data. The receiver must authenticate first that it is the one who is authorized to receive data and thereafter the sender exchanges data.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_41ghPmfiOfsbgnds0syTpojRLFivUdaprl5YvhwoIMFGVA5uyJDa6mVaYaJFn-u4dfPvifevyJShUzlAwGaG-nxEeQeLMTOJtwKD6VYcLCmVHBnCowUfpzsJpWJZexwIJZBEWKsSVq0/s1600/network-security.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Network Security&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_41ghPmfiOfsbgnds0syTpojRLFivUdaprl5YvhwoIMFGVA5uyJDa6mVaYaJFn-u4dfPvifevyJShUzlAwGaG-nxEeQeLMTOJtwKD6VYcLCmVHBnCowUfpzsJpWJZexwIJZBEWKsSVq0/s1600/network-security.png&quot; height=&quot;152&quot; title=&quot;Network Security&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Hence, we need to take such steps so as to protect data during transmissions and guarantee that these transmissions are by authorized persons only. The network security methods adopted must address the following issues. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMhqkRQQPTMkdIa0pvM0QqXC2LUBuAtE6f61uPzl26KelGFpDX-qzkLOrgENn9GN2j2sKR94wg-nuAkLvaPG-5x9X_zoY8ehzoLeO4WNLSicNADRX31-BEtn2ACDclp4zxgHABHlXLl5E/s1600/prot.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Network Security Methods&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMhqkRQQPTMkdIa0pvM0QqXC2LUBuAtE6f61uPzl26KelGFpDX-qzkLOrgENn9GN2j2sKR94wg-nuAkLvaPG-5x9X_zoY8ehzoLeO4WNLSicNADRX31-BEtn2ACDclp4zxgHABHlXLl5E/s1600/prot.jpg&quot; height=&quot;164&quot; title=&quot;Network Security Methods&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Information in a computer system should only be accessed by authorized persons.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The shareable resources must be available only for use by authorized members.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Unauthorized persons should not be able to insert spurious messages or records into a file being transmitted in a network.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;It should not be possible for an unauthorized party to perform wiretapping in order to capture data or illicitly copy files and programs.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/669729822186969525/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2015/01/security-and-privacy-in-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/669729822186969525'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/669729822186969525'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2015/01/security-and-privacy-in-computer.html' title='Security and Privacy in Computer Networks'/><author><name>Navv Technology</name><uri>http://www.blogger.com/profile/08166471883059921932</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9pOeoXefPmXrE4ZoBcHUJMr-B4HpqK6k7AwzWLUCvNDCc6I4fB4638UaG8uEHrquUEbhre1Wo9BuZk_Gw8JtWQ2h7Szc2nyX7u-qR65du9KAyTFb8gy2fbMayHCbDswR_CrQoUOsVBkg/s72-c/FINAL_OutSmartCriminalFinalDD11.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-8188697813491081160</id><published>2012-10-10T19:17:00.000-07:00</published><updated>2012-10-10T19:17:09.886-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Basic"/><title type='text'>What is an Algorithm?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
We saw above that planning a program involves defining its logic (the correct sequence of instructions needed to solve the problem at hand).The term algorithm is often used to refer to the logic of a program. It is step-by step description of how to arrive at the solution of the given problem. It may be formally defined as a sequence of instruction, designed in a manner that, if the instruction is executed in the specified sequence, the desired results will be obtained. In order to qualify as an algorithm, a sequence of instructions must possess the following characteristics:&lt;br /&gt;
&lt;br /&gt;
1.&amp;nbsp;&amp;nbsp;&amp;nbsp; Each and every instruction should be precise and unambiguous.&lt;br /&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp; Each instruction should be such that it can be performed in a finite time&lt;br /&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp; One or more instructions should not be repeated infinitely. This ensures that the algorithm will ultimately terminate.&lt;br /&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp; After performing the instruction, that is, after the algorithm terminate, the desired results must be obtained.&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Sample Algorithms&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBeaHP5jIhfXBTy2UxDbBaoU5E8uvfoZ86CJ4URUNZuAvCpt5YlLWkU9uqde72npXYU3uotLfWl8noE59EoeUlPGEwIIxqfsDsTlVfBbsFRQJ2KXEYCEMRnGJx3xmMUkma1qeTAQdcdLM/s1600/Algorithm.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;What is computer algorithm&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBeaHP5jIhfXBTy2UxDbBaoU5E8uvfoZ86CJ4URUNZuAvCpt5YlLWkU9uqde72npXYU3uotLfWl8noE59EoeUlPGEwIIxqfsDsTlVfBbsFRQJ2KXEYCEMRnGJx3xmMUkma1qeTAQdcdLM/s320/Algorithm.gif&quot; title=&quot;Sample Algorithm&quot; width=&quot;207&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
To gain insight in to algorithms, let us consider some simple examples&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
Examples:-&lt;/h4&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;50 students in a class appeared in their final examination.Their mark sheets have been given to yo.The division column of the mark sheet contains the division(FIRST,SECOND,THIRD or FAIL) obtained by the student.Write an algorithm to calculate and print the total number of students who passed in FIRST&amp;nbsp; division.&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;Algorithm:- &lt;/b&gt;&lt;br /&gt;Step:- 1&amp;nbsp; Initialize Total_First_Division and Total_Marksheets_Checked to zero.&lt;br /&gt;Setp:- 2 Take the mark sheet of the next student.&lt;br /&gt;Step:- 3 Check the division column of the mark sheet to see if it is FIRST.If no,go to Step 5.&lt;br /&gt;Step:- 4 Add 1 to Total_First_Division&lt;br /&gt;Step:- 5 Add 1 to Total_Marksheets_Checked.&lt;br /&gt;Step:- 6 Is Total_Marksheets_Checked= 50? If no, go to Step2.&lt;br /&gt;Step:- 7 Print Total_First_Division.&lt;br /&gt;Step:- 8 Stop&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/8188697813491081160/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/10/what-is-algorithm.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8188697813491081160'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8188697813491081160'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/10/what-is-algorithm.html' title='What is an Algorithm?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBeaHP5jIhfXBTy2UxDbBaoU5E8uvfoZ86CJ4URUNZuAvCpt5YlLWkU9uqde72npXYU3uotLfWl8noE59EoeUlPGEwIIxqfsDsTlVfBbsFRQJ2KXEYCEMRnGJx3xmMUkma1qeTAQdcdLM/s72-c/Algorithm.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-3359989946255362390</id><published>2012-09-13T18:41:00.003-07:00</published><updated>2012-09-13T19:07:29.269-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>10 Security Design Principle for your Computer</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
We have seen that security is guarding use’s data and programs against interface by entities external to a system like unauthorized person. Thus security designs provide need special emphasis.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSQVMXl1Avt6au1yCPv2LcibfphnEhIo2ot39J_XbecDOoiAtFwKHePIDUqAk6N9n0U_3ASUUg5Duqegql62KZMtJuHr6eU4RWrsO2h63WwFUnqv1-mGWWOZ60gWc5UeLVm-TwKoyLsiE/s1600/securitydesingprinciple.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;security for computers&quot; border=&quot;0&quot; height=&quot;303&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSQVMXl1Avt6au1yCPv2LcibfphnEhIo2ot39J_XbecDOoiAtFwKHePIDUqAk6N9n0U_3ASUUg5Duqegql62KZMtJuHr6eU4RWrsO2h63WwFUnqv1-mGWWOZ60gWc5UeLVm-TwKoyLsiE/s320/securitydesingprinciple.JPG&quot; title=&quot;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
In general, security measures include control and monitoring of physical access to the computer premises as well as the internal, computer system security. External or physical security includes the standard techniques of fencing, surveillance, authentication, and attendance monitoring. Additional access restriction may be imposed in special areas, such as the computer center and storage areas for backup volumes Physical security may also include measures for disaster recovery. Which often amount of replication of critical data and equipment at geographically dispersed locations to minimize exposure to the consequences of disasters such as fire or flood .Seltzer and Schroeder (1975) have identified the following general design principles for protection mechanisms.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyUsjnxG3FjHy3uVRzZzsjrlofd44MDPTNPPMTBpd1p4NpbiiLCWJPYNpxFwinGmSL2CZcE2DedbKe9EDp8fwV4Ztc9dQEimCdAOgYcNk33x0lRb0GQVdywWbg3V1xYJxuVPOwkI5GpT8/s1600/computer-security-management.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;speed up a pc&quot; border=&quot;0&quot; height=&quot;202&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyUsjnxG3FjHy3uVRzZzsjrlofd44MDPTNPPMTBpd1p4NpbiiLCWJPYNpxFwinGmSL2CZcE2DedbKe9EDp8fwV4Ztc9dQEimCdAOgYcNk33x0lRb0GQVdywWbg3V1xYJxuVPOwkI5GpT8/s400/computer-security-management.jpg&quot; title=&quot;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
1.
Least privilege&lt;/h2&gt;
&amp;nbsp;Every subject should use the least set of privileges necessary to complete its task. This principle limits the damage from Trojan horse attacks. It effectively advocates support for small protection domains and switching of domains when the access needs change.&lt;br /&gt;
&lt;h2&gt;
2.

Separation of privilege&lt;/h2&gt;
When possible, access to objects should depend on satisfying more than one condition.&lt;br /&gt;
&lt;h2&gt;
3.Least common mechanism&lt;/h2&gt;
This approach advocates minimizing the amount of mechanism common to and depended upon by multiple users, Design implication, include the incorporation of techniques for separating users, such as logical separation via virtual machines and physical separation on different machines in distributed systems&lt;br /&gt;
&lt;h2&gt;
4.Economy of mechanism&lt;/h2&gt;
Keeping the design as simple as possible facilitates verification and correct implementations.&lt;br /&gt;
&lt;h2&gt;
5.Complete mediation&lt;/h2&gt;
Every access request for every object should be checked for authorization, the checking mechanism should be efficient because it has a profound influence on system performance.&lt;br /&gt;
&lt;h2&gt;
6.Fall-safe default&lt;/h2&gt;
Access rights should be acquired by explicit permission only, and the default should be back of access.&lt;br /&gt;
&lt;h2&gt;
7.Open design&lt;/h2&gt;
The design of the security mechanism should not be secret, and it should not depend on the ignorance of attackers, this implies the use o cryptographic system where the algorithms are known but the keys are secret.&lt;br /&gt;
&lt;h2&gt;
8.User acceptability&lt;/h2&gt;
The mechanism should provide case of use so that it is applied correctly and not circumvented by users.&lt;br /&gt;
&lt;h2&gt;
9.User Friendlily&lt;/h2&gt;
Computer System security mechanism include authentication, access control, flow control auditing and cryptography.&lt;br /&gt;
&lt;h2&gt;
10. Other&lt;/h2&gt;
To which the user is supposed to apply a secret transformation,such as squaring and incrementing the value.Failure to do so may be used to detect unauthorized users. &lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/3359989946255362390/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/09/10-security-design-principle-for-your.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/3359989946255362390'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/3359989946255362390'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/09/10-security-design-principle-for-your.html' title='10 Security Design Principle for your Computer'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSQVMXl1Avt6au1yCPv2LcibfphnEhIo2ot39J_XbecDOoiAtFwKHePIDUqAk6N9n0U_3ASUUg5Duqegql62KZMtJuHr6eU4RWrsO2h63WwFUnqv1-mGWWOZ60gWc5UeLVm-TwKoyLsiE/s72-c/securitydesingprinciple.JPG" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-4620648398309872094</id><published>2012-09-08T03:27:00.000-07:00</published><updated>2012-09-08T20:30:58.157-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="central processing unit"/><category scheme="http://www.blogger.com/atom/ns#" term="processors"/><title type='text'>What is Computer Processor</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
Processors are now being built with even faster ratings. With all other parameters being equal (although they never are) a CPU operating at 500 MHz can process data five times as fast as one operating at 100 MHz&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIxQpBTETqPEwO3l4bDQxkn4EfjYdik63Ovo4Amwifjkf0v2bUHisWwHxohRW-WBUkRkvxP2-JuYxbSqoNmHjmBjiCAF2BuvI-C891cuTmUDILrEW4TLBWIMOc4P1ACBYw5B5vqLTtd1A/s1600/processor.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;What Is Processors&quot; border=&quot;0&quot; height=&quot;229&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIxQpBTETqPEwO3l4bDQxkn4EfjYdik63Ovo4Amwifjkf0v2bUHisWwHxohRW-WBUkRkvxP2-JuYxbSqoNmHjmBjiCAF2BuvI-C891cuTmUDILrEW4TLBWIMOc4P1ACBYw5B5vqLTtd1A/s320/processor.jpg&quot; title=&quot;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;
Types of Processors&lt;/h2&gt;
&lt;/div&gt;
&lt;h3&gt;
CISC Processors&lt;/h3&gt;
One of the earlier goals of CPU designers was to provide more and more instructions in the instruction set of a CPU, to ensure that the CPU directly supports more features, making it easier to translate high level language programs to machine language, and to ensure that the machine language programs run more effectively. Of course every additional instruction in the instruction set of a CPU requires the necessary hardware circuitry to handle that instruction, adding more complexity to the CPU’s hardware circuitry. Another goal of CPU designers was to optimize the usage of expensive memory. To achieve this, the designers tried to pack more instruction in memory, by introduction the concept of variable-length instructions such as half word, one and half word, etc.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQCs5Tp-lrGcrQZI8nA6soReKp_2wcWWjlwtT02dt2ezZft-UomA4AWfTms3pja8uyXBdC6bk3z4MafGmJPJE-SV2q6h7mW_0iA5oYTLY3zjBuQwJ4VfWc1rlWmn1Yql7lalrNaeOe7f8/s1600/CISC+Processors.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Types of processors&quot; border=&quot;0&quot; height=&quot;207&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQCs5Tp-lrGcrQZI8nA6soReKp_2wcWWjlwtT02dt2ezZft-UomA4AWfTms3pja8uyXBdC6bk3z4MafGmJPJE-SV2q6h7mW_0iA5oYTLY3zjBuQwJ4VfWc1rlWmn1Yql7lalrNaeOe7f8/s320/CISC+Processors.gif&quot; title=&quot;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
For example and operand in an immediate instruction needs fewer bits, and can be designed as half word instruction. Additionally, CPU,s were designed to support a variety of addressing modes .CPUs with large instruction set, variable&amp;nbsp; length instructions and a variety of addressing modes are said to employ CISC(Complex instruction set computer) architectures, Since&amp;nbsp; CISC processors posses so many processing features, they make the job of machine language programmers easier. However they are complex and expensive to produce. Most personal computers of today use CISC processors.&lt;br /&gt;
&lt;h3&gt;
RISC Processors&lt;/h3&gt;
In early 1980;s Some CPU designers discovered that several of the instruction supported by a CISC-based CPU are rarely used. Hence they came out with an idea that the complexity of CPU design can be greatly reduced, by implementing only a bare minimum basic set of instructions, plus some of the more frequently used instructions in the hardware circuitry of the CPU. Other complex instructions need not to be supported in the instructions set of the CPU, because they can always be implemented in software, by using the basis set of instructions.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSbSUAtiV1eTjNgPEA9nmz40iEX75fRsgNCCFkGSQXjnyEBrc54conORDgLsTi9wfi4pprUNTZFOZupHqOPHOAwrQmMsPM1vIlJp31VEACyQ9vuT0j9bOEdr4ykv4pHgn8KRy0F0NuzK0/s1600/RISC+Processors.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Internet Computer Processors&quot; border=&quot;0&quot; height=&quot;274&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSbSUAtiV1eTjNgPEA9nmz40iEX75fRsgNCCFkGSQXjnyEBrc54conORDgLsTi9wfi4pprUNTZFOZupHqOPHOAwrQmMsPM1vIlJp31VEACyQ9vuT0j9bOEdr4ykv4pHgn8KRy0F0NuzK0/s320/RISC+Processors.jpg&quot; title=&quot;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;While working on simpler CUP design. These designers also came up with the idea of making .All the instructions of uniform length, so that the decoding and execution of all instructions become simple fast. Furthermore, to speed up computation, and to reduce the complexity of handling a number of addressing modes, they decided to design all the instructions in such a way that they retrieve operands stored in registers in CPU, rather than from memory. These design ideas resulted in producing faster and less expensive processors. CPUs with a small instruction set, fixed-length instructions, and reduced reference to memory to retrieve operands, are said to employ RISC(Reduced Instruction Set Computers)architure, Since RISC processors have a small instruction set, they place extra demand on programmers, who must consider how to implement complex computations by combining simple instructions. However, due to simpler design, RISC processors are faster for most application, less complex and less expensive to produce than CISC processors.&lt;br /&gt;
&lt;h3&gt;
EPIC Processors&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHlMaPVLR7B8rMYaYAgAf2wjDTdEu-hyymOjElBjilL4TcaqqBRmudzVAr_elCnICZkuIl5_A_9vGQUHUT1mAfpyMX1M0-5ilebM4UV4sV0Zep0VEW1e1RwB0xqMbAGBthUPjSnIfAGNE/s1600/EPIC-Motherboard-Based-on-Intel-Atom-E620T-Processor.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;EPIC Processor&quot; border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHlMaPVLR7B8rMYaYAgAf2wjDTdEu-hyymOjElBjilL4TcaqqBRmudzVAr_elCnICZkuIl5_A_9vGQUHUT1mAfpyMX1M0-5ilebM4UV4sV0Zep0VEW1e1RwB0xqMbAGBthUPjSnIfAGNE/s320/EPIC-Motherboard-Based-on-Intel-Atom-E620T-Processor.jpg&quot; title=&quot;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The Explicitly Parallel Instruction Computing (EPIC) technology breaks through the sequential nature of conventional processor architectures, by allowing the software to communicate explicitly to the processor, when operations can be done in parallel. For this, it uses tighter coupling between the complier and the processor, and enables the compiler to extract maximum parallelism in the original code, and explicitly describe it to the processor. Processors based on EPIC architecture are simpler and more powerful than traditional CISC or RISC processors. These processors are mainly targeted to next-generation, 64-bit high-end server and workstation market (not for personal computer market).
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/4620648398309872094/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/09/what-is-computer-processor.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/4620648398309872094'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/4620648398309872094'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/09/what-is-computer-processor.html' title='What is Computer Processor'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIxQpBTETqPEwO3l4bDQxkn4EfjYdik63Ovo4Amwifjkf0v2bUHisWwHxohRW-WBUkRkvxP2-JuYxbSqoNmHjmBjiCAF2BuvI-C891cuTmUDILrEW4TLBWIMOc4P1ACBYw5B5vqLTtd1A/s72-c/processor.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-8630224428912159622</id><published>2012-08-30T19:42:00.000-07:00</published><updated>2012-08-30T19:42:18.694-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer architecture"/><category scheme="http://www.blogger.com/atom/ns#" term="instruction sets"/><category scheme="http://www.blogger.com/atom/ns#" term="Registers"/><title type='text'>What is Registers in Computer Architecture</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1&gt;
Registers&lt;/h1&gt;
&lt;br /&gt;
As the instructions are interpreted and executed by the CPU, there is a movement of information between the various units of the computer system. In order to handle this process satisfactorily, and to speed up the rate of information transfer, the computer uses a number of special memory units, called registers. These registers are used to hold information on temporary basis, and are part of the CPU (not main memory).&lt;br /&gt;
The length of a register equals the number of bits it can store. Hence, a register that can store 8 bits is normally referred to as 8-bit register. Most CPU sold today, have 32-bit or 64-bit registers. The size of the registers is sometimes called the world size. The bigger the world size, the faster the computer can process a set of data. With all other parameters being same, a CPU with 32-bit registers, can process data twice as fast as one with 16-bit registers.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxr9Xe7t2PwYDafkSF0wXyV_bMPVRv-xgJtGs8STYZboIpNDdANHUxx43PNBDBHvFP_0JqotlOlQiJ0g7tgH-Nq-nubxDyRea7aza2jcQVQFL5Y0PtcomU_9FQr2wEyQT0PO2LqrlMGpY/s1600/regisers+in+computer.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Registers in computer&quot; border=&quot;0&quot; height=&quot;288&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxr9Xe7t2PwYDafkSF0wXyV_bMPVRv-xgJtGs8STYZboIpNDdANHUxx43PNBDBHvFP_0JqotlOlQiJ0g7tgH-Nq-nubxDyRea7aza2jcQVQFL5Y0PtcomU_9FQr2wEyQT0PO2LqrlMGpY/s320/regisers+in+computer.jpg&quot; title=&quot;what is Resisters&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Although, the number of registers varies from computer to computer, there are some registers, which are common to all computers. The functions of these registers are described below.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpyXl6_-oxs2QrCrf8zQ7Ve28OKOzef0QLlodLxXfk54gjzOR6gmHYZxs-Ny9j_l3w3v_MwiciG3STnGaB3OUgSCtyWzbva6jZJghM4YD0VI8IIjm0_FqjOr1MuoQzFyppz9in10fXghI/s1600/regisers+block+diagram.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Registers &quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpyXl6_-oxs2QrCrf8zQ7Ve28OKOzef0QLlodLxXfk54gjzOR6gmHYZxs-Ny9j_l3w3v_MwiciG3STnGaB3OUgSCtyWzbva6jZJghM4YD0VI8IIjm0_FqjOr1MuoQzFyppz9in10fXghI/s320/regisers+block+diagram.jpg&quot; title=&quot;Computer Registers&quot; width=&quot;270&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
Memory Address Register (MAR)&lt;/h2&gt;
- It holds the address of the active memory location. It is loaded from the program control register, when an instruction is read from memory.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Memory Buffer Register (MBR)&lt;/h2&gt;
- It holds the contents of the memory world read from, or written in, memory. An instruction world placed in this register is transferred to the instruction register. A data word placed in this register is accessible for operation with the accumulator register, or for transfer to the I/O register.A word to be stored in memory location must first be transferred to the MBR, from where it is written in memory.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Program Control Register (PC)&lt;/h2&gt;
- It holds the address of the next instruction to be executed Normally, the instructions of a program are stored in consecutive memory location, and read and executed in sequence, unless a branch instruction is encountered. A branch instruction is an operation, which calls for a transfer to a non-consecutive instruction. The address part of a brands instruction is transferred to the PC register, to become the address of the next instruction.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Accumulator Register (A)&lt;/h2&gt;
- It holds the data to be operated upon, the intermediate results and the results of processing. It is used during the execution of most instructions. The results of arithmetic operations are returned to the accumulator register, for transfer to main memory, through the memory buffer register. In many computers, there are more than one accumulator registers.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_T9PJnvw9NFogtI9vja9ryJbbhkmoXE0gHYThe6SK0kXs1jb1unN9Il2LW9LDcRHPzqkzWN7O4Ipj0LxxFK4vX5UOOnUAO4RGm9TqrzgKhoqB4dEjb44rxHhbfeLhchEbwJ9Wv59Rizg/s1600/Regisers.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Computer Architecture in Computer and Registers&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_T9PJnvw9NFogtI9vja9ryJbbhkmoXE0gHYThe6SK0kXs1jb1unN9Il2LW9LDcRHPzqkzWN7O4Ipj0LxxFK4vX5UOOnUAO4RGm9TqrzgKhoqB4dEjb44rxHhbfeLhchEbwJ9Wv59Rizg/s1600/Regisers.jpg&quot; title=&quot;Instruction and Registers in Computer&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
Instruction Register (I)&lt;/h2&gt;
- It holds the current instruction, which is being executed. As soon as the instruction is stored in this register, the operation part and the address part of the instruction are separated. The address part of the instruction is sent to the MAR. While its operation part is sent to the control unit, where it is decoded and interpreted, and ultimately command signals are generated to carry out the task specified by the instruction.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Input/output Register (I/O)&lt;/h2&gt;
-It is used to communicate with the input/output devices. All input information, such as instructions and data, are transferred to this register by an input device. Similarly, all output information, to be transferred to an output device, is found in this registers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoTableGrid&quot; style=&quot;border-collapse: collapse; border: none; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-padding-alt: 0in 5.4pt 0in 5.4pt; mso-yfti-tbllook: 1184;&quot;&gt;
 &lt;tbody&gt;
&lt;tr style=&quot;height: 18.85pt; mso-yfti-firstrow: yes; mso-yfti-irow: 0;&quot;&gt;
  &lt;td style=&quot;border: solid black 1.0pt; height: 18.85pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.3pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;SL.NO&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 18.85pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 106.6pt;&quot; valign=&quot;top&quot; width=&quot;142&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Name of Register&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid black 1.0pt; height: 18.85pt; mso-border-alt: solid black .5pt; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-themecolor: text1; mso-border-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 265.5pt;&quot; valign=&quot;top&quot; width=&quot;354&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Function&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;mso-yfti-irow: 1;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.3pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;1&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 106.6pt;&quot; valign=&quot;top&quot; width=&quot;142&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Memory Address(MAR)&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 265.5pt;&quot; valign=&quot;top&quot; width=&quot;354&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Holds the address of the
  active memory location&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;mso-yfti-irow: 2;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.3pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;2&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 106.6pt;&quot; valign=&quot;top&quot; width=&quot;142&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Memory Buffer(MBR)&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 265.5pt;&quot; valign=&quot;top&quot; width=&quot;354&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Holds information on its way
  to and from memory&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 31.0pt; mso-yfti-irow: 3;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 31.0pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.3pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;3&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 31.0pt; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 106.6pt;&quot; valign=&quot;top&quot; width=&quot;142&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Program Control(PC)&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 31.0pt; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 265.5pt;&quot; valign=&quot;top&quot; width=&quot;354&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Holds the address of the next
  instruction to be executed&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 26.5pt; mso-yfti-irow: 4;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 26.5pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.3pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;4&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 26.5pt; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 106.6pt;&quot; valign=&quot;top&quot; width=&quot;142&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Accumulator(A)&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 26.5pt; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 265.5pt;&quot; valign=&quot;top&quot; width=&quot;354&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Accumulators results and data
  to be3 operated upon&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 22.0pt; mso-yfti-irow: 5;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 22.0pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.3pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;5&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 22.0pt; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 106.6pt;&quot; valign=&quot;top&quot; width=&quot;142&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Instruction(I)&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 22.0pt; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 265.5pt;&quot; valign=&quot;top&quot; width=&quot;354&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Holds an instruction, while it
  is being executed.&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 22.0pt; mso-yfti-irow: 6; mso-yfti-lastrow: yes;&quot;&gt;
  &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 22.0pt; mso-border-alt: solid black .5pt; mso-border-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 38.3pt;&quot; valign=&quot;top&quot; width=&quot;51&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 22.0pt; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 106.6pt;&quot; valign=&quot;top&quot; width=&quot;142&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Input/output(I/O)&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 22.0pt; mso-border-alt: solid black .5pt; mso-border-bottom-themecolor: text1; mso-border-left-alt: solid black .5pt; mso-border-left-themecolor: text1; mso-border-right-themecolor: text1; mso-border-themecolor: text1; mso-border-top-alt: solid black .5pt; mso-border-top-themecolor: text1; padding: 0in 5.4pt 0in 5.4pt; width: 265.5pt;&quot; valign=&quot;top&quot; width=&quot;354&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Communicates with the I/O
  devices&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/8630224428912159622/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/08/what-is-registers-in-computer.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8630224428912159622'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8630224428912159622'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/08/what-is-registers-in-computer.html' title='What is Registers in Computer Architecture'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxr9Xe7t2PwYDafkSF0wXyV_bMPVRv-xgJtGs8STYZboIpNDdANHUxx43PNBDBHvFP_0JqotlOlQiJ0g7tgH-Nq-nubxDyRea7aza2jcQVQFL5Y0PtcomU_9FQr2wEyQT0PO2LqrlMGpY/s72-c/regisers+in+computer.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-2573991191771312691</id><published>2012-08-30T19:21:00.002-07:00</published><updated>2012-09-13T05:32:38.804-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="central processing unit"/><category scheme="http://www.blogger.com/atom/ns#" term="instruction sets"/><title type='text'>What is instruction sets in computer architecture</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Every CPU has built-in-ability to execute a set of machine instructions, called instructions set. Most CPUs have 200 or more instructions (such as add, substract, and compare) in instruction set. The machine language designed for a processor (CPU), is based on the list of instructions supported by the CPU in its instructions set. Since each processor (CPU).is based on the list instructions supported by the CPU in its instructions set, Since each processor has a unique instruction set, machine language programs written for one computer will generally not run on another computer, with a different CPU.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0ZhXYcaxDX6lLc5HmhRY34X-TwTiPgYEgFI-zenJecF5soIvjUZxByEAS1bUEHZ1jmeCohvG0VLowlCKd_qIcI8deAi3CTWsf1dlyv6NPJNWRdO-ZQ3RptWUBfMwVvEb8HN-kic3m_Ec/s1600/Instruction-Set.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;What is Instruction Sets in Computer&quot; border=&quot;0&quot; height=&quot;197&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0ZhXYcaxDX6lLc5HmhRY34X-TwTiPgYEgFI-zenJecF5soIvjUZxByEAS1bUEHZ1jmeCohvG0VLowlCKd_qIcI8deAi3CTWsf1dlyv6NPJNWRdO-ZQ3RptWUBfMwVvEb8HN-kic3m_Ec/s400/Instruction-Set.jpg&quot; title=&quot;Instruction Sets in Computer&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
CPUs made by different manufacturers have different instructions sets. In fact, different CPU models of the same manufacturer also often have different instructions sets. However, manufacturers tend to group their CPUs into “families”, which have similar instructions sets. When a new CPU is developed, it it ensured that its instructions set includes all the instructions in the instruction set of its predecessor Crumples some new ones. This manufacturing strategy is known as upward compatibility, and the new CPU is said to be upward compatible with its predecessor. This feature allows software written for a computer with a particular CPU, to work on computers with newer processors of the same family. In turn, it allows the users of these computer systems to easily upgrade their system, without worrying about converting all their existing software.NSK2VZ4KNRW6&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/2573991191771312691/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/08/what-is-instruction-sets-in-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/2573991191771312691'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/2573991191771312691'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/08/what-is-instruction-sets-in-computer.html' title='What is instruction sets in computer architecture'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0ZhXYcaxDX6lLc5HmhRY34X-TwTiPgYEgFI-zenJecF5soIvjUZxByEAS1bUEHZ1jmeCohvG0VLowlCKd_qIcI8deAi3CTWsf1dlyv6NPJNWRdO-ZQ3RptWUBfMwVvEb8HN-kic3m_Ec/s72-c/Instruction-Set.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-2976185573926567959</id><published>2012-08-29T19:48:00.000-07:00</published><updated>2012-08-30T03:31:24.729-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ALU"/><category scheme="http://www.blogger.com/atom/ns#" term="Arithmetic Unit"/><category scheme="http://www.blogger.com/atom/ns#" term="central processing unit"/><category scheme="http://www.blogger.com/atom/ns#" term="CPU"/><title type='text'>What is central processing unit (CPU) how it is  work</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
The CPU is the brain of a computer system. All major calculations and comparisons performed by a computer are carried out inside its CPU.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipUicx_JZN5FNoLZCkhLBVsbgkksECBcjnjluL1pAHleAtS_3VowKfMhOzGPucBrAGl29tg9oqd90OOLuAbdjpmufNqkAHm8x16AwOEMR4pIkBKt45LR656uZ_ovN-99UVablK_I7HNDw/s1600/CPU.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;303&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipUicx_JZN5FNoLZCkhLBVsbgkksECBcjnjluL1pAHleAtS_3VowKfMhOzGPucBrAGl29tg9oqd90OOLuAbdjpmufNqkAHm8x16AwOEMR4pIkBKt45LR656uZ_ovN-99UVablK_I7HNDw/s320/CPU.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;The CPU is also responsible for activating and controlling the operation of other units of the computer system. Hence, no other single component of a computer determines its overall performance ,as much as the CPU, In order to be able to quickly evaluate any computer capabilities it is important to know how CPU are internally structured how different CPUs differ from each other ,and how CPU speed is evaluated. These and other related concepts about CPU are described below.&lt;br /&gt;
&lt;h1&gt;
The Control Unit.&lt;/h1&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfjeGU1HOezMZ5DoY6U8-LTl1D4mvwz-Ptx4r65oWBst6t6h97LZ5QyY_LLfvmtdMZhW4ej-8WVYX3EH8Ih7Ey9KTnkikYV7QW8zVCXi9wTvVrZKOwDl3xPXyXOT7ZVt0X5tGwy1CROY4/s1600/Contrl+Unit.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;169&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfjeGU1HOezMZ5DoY6U8-LTl1D4mvwz-Ptx4r65oWBst6t6h97LZ5QyY_LLfvmtdMZhW4ej-8WVYX3EH8Ih7Ey9KTnkikYV7QW8zVCXi9wTvVrZKOwDl3xPXyXOT7ZVt0X5tGwy1CROY4/s320/Contrl+Unit.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
We saw that the two basic components of a CPU are the control unit and the arithmetic logic unit. The control unit of the CPU selects and interprets program instructions, and then sees that they are executed. It has some special purpose registers (whose functions are described in a latter subsection), and a decoder to perform these activities. The special purpose registers, namely the Instructions register and the program control register, respectively hold the current instruction and the next instruction to be executed, and in this way help the control unit in instruction selection. On the other hand. The decoder has the necessary circuitry to decode and interpret the meaning of every instruction supported by the CPU. Each instruction is accompanied by microcode—very basic directions. Which tell the CPU how to execute the instruction?&lt;br /&gt;
Although, the control unit does not perform any actual processing of the data, it acts as a central nervous system for other components of the computer. It manages and coordinates the entire computer system, including the input and output units. It obtains instructions from the program stored in the main memory, interprets the instructions, and issues signal, which cause other units of the system to execute them.&lt;br /&gt;
&lt;br /&gt;
&lt;h1&gt;
The Arithmetic Logic Unit (ALU)&lt;/h1&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLKlHtUFRQ5rwIa4y-ZWwylA07fCfxvIytn16sbFNdQZzS_IryfBgRQ_axVgI1V0qLalcWcmWLuqa7KbGlTq-9L3KsfvYq8G-Wbgd_3IK4d7V7GlmHD1KLIZxxXHddqTrWSOPRds3bu_I/s1600/alu.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLKlHtUFRQ5rwIa4y-ZWwylA07fCfxvIytn16sbFNdQZzS_IryfBgRQ_axVgI1V0qLalcWcmWLuqa7KbGlTq-9L3KsfvYq8G-Wbgd_3IK4d7V7GlmHD1KLIZxxXHddqTrWSOPRds3bu_I/s1600/alu.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
The ALU of the CPU is the place, where the actual execution of the instructions takes place, during the data procession operation. That is, when the control unit encounters an instruction, which involves an arithmetic operation (such as, add, subtract, multiply, divide), or a logic operation (such as less than, equal to, greater that), it passes control to the ALU. The ALU has some special purpose registers and the necessary circuitry, to carry out all the arithmetic and logic operations, which are included in the instructions supported by the CPU. For example, the arithmetic and logic operations, which are included in the instructions supported by the CPU.For example, the control unit might load two numbers into the registers in the ALU.Then, it might the ALU to add the two numbers (an arithmetic operations), or to check if the two numbers are equal (a logical operation).&lt;br /&gt;
&lt;br /&gt;
In case of a microcomputer, the entire CPU (both the control unit and the ALU) is contained on a single tiny silicon chip, called a microprocessor.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/2976185573926567959/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/08/what-is-entral-procession-unit-cpu-how.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/2976185573926567959'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/2976185573926567959'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/08/what-is-entral-procession-unit-cpu-how.html' title='What is central processing unit (CPU) how it is  work'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipUicx_JZN5FNoLZCkhLBVsbgkksECBcjnjluL1pAHleAtS_3VowKfMhOzGPucBrAGl29tg9oqd90OOLuAbdjpmufNqkAHm8x16AwOEMR4pIkBKt45LR656uZ_ovN-99UVablK_I7HNDw/s72-c/CPU.gif" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-8375319604042930923</id><published>2012-05-02T22:28:00.000-07:00</published><updated>2012-08-27T04:03:23.407-07:00</updated><title type='text'>Computer Security System for your Small Business</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1&gt;
 Computer Security&lt;/h1&gt;
This is basically a branch of computer technology also referred to as information security as applied to computer systems and network infrastructures. The main objective behind computer security entails protecting information and property from natural disaster, corruption, or theft while at the same time allowing information and property to be accessible and productive to its legitimate users.

&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2dPuF7xmB8fvmG8ZOrxwfSPVDNNOMB1MMw6yHP55Ud8RKbOtbCOvbU7TpAYv3cbV8TbnbIJbpy487An6jv2oTTabuoQZ6hh8qHHA2HsN31BWSv9gqJv2mXoCuGlW-fIFjiGFFAzNyAEA/s1600/ComputerSecurity1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2dPuF7xmB8fvmG8ZOrxwfSPVDNNOMB1MMw6yHP55Ud8RKbOtbCOvbU7TpAYv3cbV8TbnbIJbpy487An6jv2oTTabuoQZ6hh8qHHA2HsN31BWSv9gqJv2mXoCuGlW-fIFjiGFFAzNyAEA/s320/ComputerSecurity1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Most computer systems are targets for intruders because these very intruders want to access what is stored in these systems. Some of the possible target information in a computer system includes information such as bank account numbers, credit/debit cards, and social security numbers among other vital details. Whenever such kind of information is unlawfully obtained by an intruder, they can be used to make transactions illegally.&lt;br /&gt;
&lt;br /&gt;
Intruders not only target money related information, they are also after computer resources such as fast internet connection, fast processing speed and huge hard disk space. These intruders have devised ways whereby they can use these particular resources to attack other systems on the network. It can be said that the more intruders use computer systems to facilitate their attacks, the more difficult it becomes for law enforcement agencies to figure out where the attack is originating from.&lt;br /&gt;
&lt;br /&gt;
Intruders are very much inclined to attack home and small business computer systems because in most cases these systems are rarely secured and very easy to hack into.&lt;br /&gt;
&lt;br /&gt;
Often an intruder accesses computer systems remotely by sending e-mail messages containing virus attachments that when a user unknowingly reads the email, they automatically activate the virus program hence creating a loophole which can be exploited by intruders to remotely access the computer system. In some other cases, intruders may take advantage of software vulnerabilities in order to gain access. Immediately these intruders gain access to the system and they often install spyware programs that enable them to continue using the computer system even if the original loopholes have been patched.
&lt;br /&gt;
&lt;h2&gt;


Securing the computer system&lt;/h2&gt;
There are quite a number of tasks that system users need to undertake in order to ensure that their computer system is fully secured. These include:
&lt;br /&gt;
&lt;h2&gt;


Installing and using Antivirus programs&lt;/h2&gt;
Antivirus applications come with the unique ability to search for the contents of each file and these softwares are programmed to look for some specific patterns that match a certain profile known as the virus signature. When the antivirus detects any file that matches this particular virus signature, the antivirus application will automatically provide several options on how to respond and this may include deleting the entire file, or just removing the offending patterns.
&lt;br /&gt;
&lt;h2&gt;


Ensure the system is patched&lt;/h2&gt;
Most software vendors provide software patches which can be used to seal security loopholes in software applications. As a system user you have to periodically consult your software vendor to see if there are any available patches.
&lt;br /&gt;
&lt;h2&gt;


Ensure utmost care when reading e-mail attachments&lt;/h2&gt;
Most unsolicited e-mails are usually sent to unsuspecting recipients and these mails may contain return addresses, provocative subjects, or something which encourages the recipient to open the e-mail immediately. Such a technique is known as social engineering. Social engineering is compounded by the fact that most e-mail recipients are curious and trusting to open and read their mails.
&lt;br /&gt;
&lt;h2&gt;


Installing firewalling programs&lt;/h2&gt;
The firewall functions more or less like a guard on the computer network. This program comes with a unique ability to filter any unwanted traffic from the network and only allow for required traffic that is perceived to be legitimate.

Other computer security techniques entail backing up important files and folders, using strong authentication mechanisms, ensuring maximum care when downloading and installing applications and integrating file encryption programs and access controls.NSK2VZ4KNRW6&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/8375319604042930923/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/05/computer-security-system-for-your-small.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8375319604042930923'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8375319604042930923'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/05/computer-security-system-for-your-small.html' title='Computer Security System for your Small Business'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2dPuF7xmB8fvmG8ZOrxwfSPVDNNOMB1MMw6yHP55Ud8RKbOtbCOvbU7TpAYv3cbV8TbnbIJbpy487An6jv2oTTabuoQZ6hh8qHHA2HsN31BWSv9gqJv2mXoCuGlW-fIFjiGFFAzNyAEA/s72-c/ComputerSecurity1.jpg" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-8555397772701133469</id><published>2012-02-19T23:43:00.000-08:00</published><updated>2012-02-19T23:43:55.405-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Basic"/><title type='text'>Top 10 Tips-How To Protect your Computer</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;With Increased uses of the internet, there is a remarkable increase in online threats. It’s extremely crucial that you keep your computer safe from these threats. We are presenting 10 tips to keep your computer safe.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRJfGD6rjjuZpn1HToXWOYD_bt6Xxv70u8HHjwyPSfRIquqnfwBhig40Dog7MIk22yZS9lWnhFkQCqKV0cME00_8GvPvEcgEeKonImnlhukkyK7_CKuG-ZtZw1U954_t-cjXdn4YE1z0s/s1600/computer-Protection.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;244&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRJfGD6rjjuZpn1HToXWOYD_bt6Xxv70u8HHjwyPSfRIquqnfwBhig40Dog7MIk22yZS9lWnhFkQCqKV0cME00_8GvPvEcgEeKonImnlhukkyK7_CKuG-ZtZw1U954_t-cjXdn4YE1z0s/s320/computer-Protection.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;strong&gt;1.&lt;/strong&gt; First and the foremost precautionary measure for keeping your computer safe is to invest in an antivirus program. Antivirus program will protect you from viruses and will help in avoiding any data loss or data corruption because of Virus infections. There is a new product line offered by all the Anitivirus vendors, called internet security. Internet security products protect you from antivirus, malwares and adwares. &lt;br /&gt;
&lt;strong&gt;2.&lt;/strong&gt; Do not open suspicious email attachments. Many spam emails contain infected attachments. Make use of junk email filter and always block sender’s who send you infected emails.  &lt;br /&gt;
&lt;strong&gt;3.&lt;/strong&gt; Always install purchased software’s. Pirated software possesses threat and source files may be infected. Do not use keygens and cracks to activate pirated software’s. &lt;br /&gt;
&lt;strong&gt;4.&lt;/strong&gt; Always scan email attachments, portable drives and CD/DVD media before copying data on your computer. &lt;br /&gt;
&lt;strong&gt;5.&lt;/strong&gt; Do not download any suspicious files from websites, files with extensions like .scr, .vbs are executable files and are very common source of virus infection. &lt;br /&gt;
&lt;strong&gt;6.&lt;/strong&gt; Always backup your data. This will help you to restore it in case your computer gets infected, and your data get corrupt. There are many online backup solutions available these days, which are cheap and easy to use. &lt;br /&gt;
&lt;strong&gt;7.&lt;/strong&gt; Be aware of phishing emails. Such emails come from forged email addresses and often ask you to update your bank information or some other critical information like your email password. Information gathered using phishing emails can be exploited by the sender.   &lt;br /&gt;
&lt;strong&gt;8.&lt;/strong&gt; Use safe browsing practices. Install a pop-up blocker to disable advertisements, which lead to potentially dangerous sites. Keep your browser up to date to keep it secure, as many browsers these days release frequent updates to address the security issues. Keep your operating system updated with latest service pack and patches. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt02izBl8wlyZWffwKKWvrST_ZlWo31wMM7FxpbGDGiMNhcPoWVOViGE3_aRGT0YBM0w60-gmbd6o1w5cX1ujapjr24ynCl9dQul8w_eA8u88NY-g2MIiMvLsRHN2mVP_xPa7rnszSwY0/s1600/internet-secutiry.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;296&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt02izBl8wlyZWffwKKWvrST_ZlWo31wMM7FxpbGDGiMNhcPoWVOViGE3_aRGT0YBM0w60-gmbd6o1w5cX1ujapjr24ynCl9dQul8w_eA8u88NY-g2MIiMvLsRHN2mVP_xPa7rnszSwY0/s320/internet-secutiry.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;strong&gt;9.&lt;/strong&gt; Do not share your personal information like phone numbers, bank details and passwords over messenger as many messengers do not encrypt the messages. The messages travel in plain text and can be hacked. Share sensitive data via email using encrypted email. There are some free encrypted email sending options available these days. Sendinc.com is one which is free and easy to use for sending encrypted emails. &lt;br /&gt;
&lt;strong&gt;10&lt;/strong&gt;. Use a firewall on your computer and keep an eye on the traffic coming in, and going out of your computer. Block suspicious traffic. You can use hardware or software based firewalls. Windows come with an inbuilt firewall.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/8555397772701133469/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/02/top-10-tips-how-to-protect-your.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8555397772701133469'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8555397772701133469'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/02/top-10-tips-how-to-protect-your.html' title='Top 10 Tips-How To Protect your Computer'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRJfGD6rjjuZpn1HToXWOYD_bt6Xxv70u8HHjwyPSfRIquqnfwBhig40Dog7MIk22yZS9lWnhFkQCqKV0cME00_8GvPvEcgEeKonImnlhukkyK7_CKuG-ZtZw1U954_t-cjXdn4YE1z0s/s72-c/computer-Protection.jpg" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-3338811222796789904</id><published>2012-02-19T23:36:00.000-08:00</published><updated>2012-02-19T23:36:32.460-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Basic"/><title type='text'>Tips on how to Speed up your Computer</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;Being a computer user, you always keep on finding ways to speed up your computers. Slow computer always results in spending more time in getting simple jobs&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;verbform&quot;&gt;done&lt;/span&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;and results in low productivity. In many cases, the slowness is not related to computer hardware, it’s the junk and lack of organizing your stuff with the time that lead to slowness. We are presenting you 15 tips to speed up your computer.&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg88A554aGDmlHfitGGWAxrm2npDeOI_R7aaUkg8LMf4z4SfO4gvK9O7d0EQss6ufSJjgi37v29YsXu6wCtCgE5sqafgo1Q51J3UdDvEtbiw_XVtJ_tAnnwvO9FLGuMgFfFtSFyGkQh3LY/s1600/speed-pc.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg88A554aGDmlHfitGGWAxrm2npDeOI_R7aaUkg8LMf4z4SfO4gvK9O7d0EQss6ufSJjgi37v29YsXu6wCtCgE5sqafgo1Q51J3UdDvEtbiw_XVtJ_tAnnwvO9FLGuMgFfFtSFyGkQh3LY/s320/speed-pc.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt; &lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;1. Antivirus program&lt;/strong&gt;: Always pay for an Antivirus program. If you cannot afford to go for a paid program, some of the top Antivirus Vendors like Avast and AVG provides a free Antivirus product, which is free for home usage. Viruses cause slowness and sometimes complete corruption of data on your computer. You risk everything if you do not have an antivirus program installed.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;2. Unwanted Programs:&lt;/strong&gt; Are you in a habit of downloading new programs and testing them? Every software you download and install for testing is taking up space, and in many cases it also modify the registry to run files at startup which eats your RAM. Make a habit&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;verbform&quot;&gt;to uninstall&lt;/span&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;the programs you do not need.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;3. Defragmentation:&lt;/strong&gt; When you install a program or copy and save files on your computer the data is written to the closest available space and it results in fragmentation on your hard disk. Defragmentation process organizes the files on your hard drive and places the files together for faster access. You should defrag your computer frequently. There are many free utilities available to automate the process.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;punctuation&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;4. Disk Cleanup:&lt;/strong&gt; If you are not a geek, Disk cleanup utility which comes free, with every version of windows can help you to cleanup junk files from your computer.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background: white;&quot;&gt;You can find it under Startup Programs-&amp;gt; Accessories-&amp;gt; System tools.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;5. Updates:&lt;/strong&gt; Keep your system updates with latest patches. Keep your drivers updated. This will help you to run your computer at its optimum level.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;othergrammar&quot;&gt;OS patches keep you safe from online threats and Virus infections.&lt;/span&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;You can enable Automatic updates to update your system weekly.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;6. Backup old data to External Drives:&lt;/strong&gt; As External storage is cheap and very affordable these days, it’s always good to keep your old data on external storage and keep your computer free from unwanted or old data.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;7. Upgrade Memory:&lt;/strong&gt; Memory upgrade can give you significant boost. With Memory prices coming down, it’s always good to have more RAM in your system. More RAM helps in faster execution of programs.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;8. Disable Startup Programs:&lt;/strong&gt; To speed up the computer boot process, it’s always good to disable unwanted startup programs. You can do it by launching MSConfig utility.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;9. Disable Indexing or Tweak the Indexing settings:&lt;/strong&gt; Indexing files on your computer may result in slow performance.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;confusingmodifiers&quot;&gt;You should either disable Indexing or tweak settings so that indexing runs only when your computer is idle.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;10. Multitasking:&lt;/strong&gt; Depending on your computer hardware, you can run multiple programs up to a certain limit. Avoid using multiple instances of programs like Photoshop, illustrator, video editors and virus scanners at the same time.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;11. Regular scanning:&lt;/strong&gt; Schedule scanning your computer for any malware and adware programs. Malware and adware slow down your computer and sometimes result in frequent crashing of the application and computer.&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8BAe_pe1cDpwP3NKqTnolDT-f49YkN-kmrS3OeiHEuq_fFesduF3b9QfRtR65y7lKEV7iqT3UUTl14i_2w-pwjOwqCrJrgfuykOvQxugHT5k2UZtJmTH8FGdv29B6EiMvqAUrApl3U0M/s1600/Computer-Registry-Cleaner-Software.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8BAe_pe1cDpwP3NKqTnolDT-f49YkN-kmrS3OeiHEuq_fFesduF3b9QfRtR65y7lKEV7iqT3UUTl14i_2w-pwjOwqCrJrgfuykOvQxugHT5k2UZtJmTH8FGdv29B6EiMvqAUrApl3U0M/s1600/Computer-Registry-Cleaner-Software.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;12.&lt;/strong&gt; You can use the sleep or hibernate mode to speed up the boot process.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;13.&lt;/strong&gt; Do not install unwanted Add-ons and themes&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;14.&lt;/strong&gt; Do not browse potentially danger websites.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;punctuation&quot;&gt;Sites, which distribute pirated software’s and cracks are potentially dangerous sites and may infect your pc by exploiting vulnerabilities.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;confusingmodifiers&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&lt;strong&gt;15.&lt;/strong&gt; You can always use some tune up software’s like Advanced system care or Tune up utilities, these software’s scan your system and suggest you many tweaks, which you can apply with a single click to speed up your computer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;&quot; name=&quot;_GoBack&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/3338811222796789904/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/02/tips-on-how-to-speed-up-your-computer.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/3338811222796789904'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/3338811222796789904'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/02/tips-on-how-to-speed-up-your-computer.html' title='Tips on how to Speed up your Computer'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg88A554aGDmlHfitGGWAxrm2npDeOI_R7aaUkg8LMf4z4SfO4gvK9O7d0EQss6ufSJjgi37v29YsXu6wCtCgE5sqafgo1Q51J3UdDvEtbiw_XVtJ_tAnnwvO9FLGuMgFfFtSFyGkQh3LY/s72-c/speed-pc.jpg" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-5445814742055476538</id><published>2012-01-20T04:34:00.000-08:00</published><updated>2012-09-02T20:17:07.555-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Basic"/><title type='text'>What is OS (Operating system)?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;An operating system (often referred to as OS) is an integrated set of programs that controls the resources (the CPU, memory, I/O devices, etc) of a computer system and provides its users with an interface or virtual machine that is more convenient to use than bare machine. According to this definition, the two primary objectives of an operating system are:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin: 0in 0in 10pt 0.5in; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;1.&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b&gt;Makin a computer system convenient to use-&lt;/b&gt; An operating system is a layer of software on top of the bare hardware of a computer system, which manages all parts of the system, and presents to the user with an interface or virtual machine, which is easier to program and use. That is, the operating system hides the details of the hardware resources from the programmer and provides the programmer with a convenient interface for using the computer system. It acts as an intermediary between the hardware and its users, providing a high-level interface to low-level hardware resources, and making it easier for the programmer and other users to access and use those resources.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt 0.25in;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;The logical architecture of a computer system is shown in figure………..&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt 0.25in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS05Dm1-g-D_ew2IRAJoE4uGl4zgJ1fklk2UtDMiRWgYQAWj0WVEOLS4oqF7ZnMA-TD534680vVo-OvPkcvpD10iJ6Yem1ItvwqKD0-RutnlAKpoNc04mQWKh1-jUexkVXIn4g0W9YvTc/s1600/computer-logical-pic.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS05Dm1-g-D_ew2IRAJoE4uGl4zgJ1fklk2UtDMiRWgYQAWj0WVEOLS4oqF7ZnMA-TD534680vVo-OvPkcvpD10iJ6Yem1ItvwqKD0-RutnlAKpoNc04mQWKh1-jUexkVXIn4g0W9YvTc/s1600/computer-logical-pic.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt 0.25in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt 0.25in;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;As shown in the figure, the hardware resources are surrounded by the operating system layer, which in turn is surrounded by a layer of other system software (such as compilers, editors, utilities, etc.)and a set of application programs(such as commercial data processing applications, scientific and engineering applications, entertainment and educational applications,etc).Finally, the end users view the computer system in term of the user interfaces provided by the application programs.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin: 0in 0in 10pt 0.5in; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;2.&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Managing the resources of a computer system. &lt;/b&gt;The second important objective of an operating system is to manage the various resources of the computer system. This involves performing such tasks as keeping track of who is using which resource, granting resource requests, accounting for resource usage, and mediating conflicting requests from different program and users. The efficient and fair sharing of resources among users and/or program is a key goal of most operating systems.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjACMRQ2gf9qfAK1b3K_qZFqTgJZbUFzLfqYfL2qgw81UpgEpGfS1NR8UWIDI_t3aQmZY5xwUf_Y2pSUllN7rqfwOi6HRk8KDGmwTdWYWdrqR8MOieNFaJx_KtETG2pA89oIXsVwDCaHS4/s1600/operatingsystem.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjACMRQ2gf9qfAK1b3K_qZFqTgJZbUFzLfqYfL2qgw81UpgEpGfS1NR8UWIDI_t3aQmZY5xwUf_Y2pSUllN7rqfwOi6HRk8KDGmwTdWYWdrqR8MOieNFaJx_KtETG2pA89oIXsVwDCaHS4/s1600/operatingsystem.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin: 0in 0in 10pt 0.5in; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Main Functions of an Operating System&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;The main functions performed by most operating systems of today are as follows:&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l1 level1 lfo2; text-indent: -0.25in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;1.&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Process Management- &lt;/b&gt;The process management module of an operating system takes care of the creation and deletion of process, scheduling of various system resources to the different processes requesting them, and providing mechanisms for synchronization and communication among process.&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l1 level1 lfo2; text-indent: -0.25in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;2.&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Memory Management- &lt;/b&gt;The memory management module of an operating system takes care of the allocation and deallocation of memory space to the various programs in need of these resources.&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l1 level1 lfo2; text-indent: -0.25in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;3.&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;File Management-&lt;/b&gt;The file management module of an operating system takes care of file-related activities such as organization, storing, retrieval, naming, sharing, and protection of files.&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l1 level1 lfo2; text-indent: -0.25in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;4.&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Security – &lt;/b&gt;The security module of an operating system protects the resources and information of a computer system against destruction and unauthorized access.&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l1 level1 lfo2; text-indent: -0.25in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;5.&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Command Interpretation – &lt;/b&gt;The command interpretation module of an operating system takes care of interpreting user commands, and directing the system resources to handle the requests. With this mode of interaction with the system, the user is usually not too concerned with the hardware details of the system.&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;margin: 0in 0in 10pt 0.5in;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;In addition to the above listed major functions, an operating system also performs few other functions such as keeping an account of which users (or process) use how much and what kinds of computer resources, maintainance of log system usage by all users, and maintenance of internal time clock.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8bAtNfiOELqBthDSyhPaaYviqiH126W2Q38ZPLPb9Zqpxd0Mh00WYqnHPC9Lju-oUF_08eMp8KKX-T56a40UZJooXq4fxh7f3n6waRzBhOuvH5tqg8fmwxrehOBQN6QlwZibsTUCCE7M/s1600/Operating-System%2528OS%2529.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;178&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8bAtNfiOELqBthDSyhPaaYviqiH126W2Q38ZPLPb9Zqpxd0Mh00WYqnHPC9Lju-oUF_08eMp8KKX-T56a40UZJooXq4fxh7f3n6waRzBhOuvH5tqg8fmwxrehOBQN6QlwZibsTUCCE7M/s320/Operating-System%2528OS%2529.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;margin: 0in 0in 10pt 0.5in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Measuring System Performance&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;The&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt; &lt;/b&gt;efficiency of an operating system and the overall performance of a computer system are usually measured in terms of the following:-&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;margin: 0in 0in 0pt 1in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-align: left; text-indent: -0.75in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;1.&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Throughput – &lt;/b&gt;Throughput is the amount of work that the system is able to do per unit time. It is measured as the number of process that is completed by the system per unit time. For example, if &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;n&lt;/i&gt; processes are completed in an interval of &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;u&gt;t &lt;/u&gt;&lt;/i&gt;seconds, the throughput is taken as &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;n/t&lt;/i&gt; process per second during that interval.Throughtput is normally measured in process/hour. Note that the value of throughput does not depend only on the capability of a system, but also on the nature of jobs being processed by the system. For long process, throughtput may be one process/hour: and for short processes, throughtput may be 100 process/hour.&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 1in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-align: left; text-indent: -0.75in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;2.&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Turnaround time – &lt;/b&gt;From the point of view of an individual user, an important criterion is how long it takes the system to complete a job submitted by him/her. Turnaround time is the interval from the time submission of a job to the system for processing to the time of completion of the job.Although, higher throughput is desirable from the point of view of overall system performance. Individual users are more interested in better turnaround time for their jobs.&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 1in; mso-add-space: auto; mso-list: l2 level1 lfo3; text-align: left; text-indent: -0.75in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;3.&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Response time -&lt;/b&gt; Turnaround time is usually not a suitable measure for interactive systems, because in an interactive system process can produce some output early during its execution and can continue executing while previous results are being output to the user.Hence, another measure used in case of interactive systems is response time, which is the interval from the time of submission of a job to the system for processing to the time the first response for the job is produced by the system.&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 1in; mso-add-space: auto; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;In any computer system, it is desirable to maximize throughput and minimize turnaround time and response time.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 1in; mso-add-space: auto; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;Related Post:- &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 1in; mso-add-space: auto; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/what-is-internet.html&quot;&gt;What is Computer&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 1in; mso-add-space: auto; text-align: left;&quot;&gt;
&lt;a href=&quot;http://internetdblog.blogspot.com/2011/05/evolution-of-computers.html&quot;&gt;Evolution of Computers&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 1in; mso-add-space: auto; text-align: left;&quot;&gt;
&lt;a href=&quot;http://internetdblog.blogspot.com/2011/11/firewall-how-does-it-work.html&quot;&gt;FireWall&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 1in; mso-add-space: auto; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 1in; mso-add-space: auto;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/5445814742055476538/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/01/what-i-operating-system.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/5445814742055476538'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/5445814742055476538'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/01/what-i-operating-system.html' title='What is OS (Operating system)?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS05Dm1-g-D_ew2IRAJoE4uGl4zgJ1fklk2UtDMiRWgYQAWj0WVEOLS4oqF7ZnMA-TD534680vVo-OvPkcvpD10iJ6Yem1ItvwqKD0-RutnlAKpoNc04mQWKh1-jUexkVXIn4g0W9YvTc/s72-c/computer-logical-pic.gif" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-3500170214378724450</id><published>2012-01-08T22:56:00.000-08:00</published><updated>2012-01-08T22:56:43.568-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer animation"/><title type='text'>Computer Animation Tutorial,2D,3D</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;  &lt;span style=&quot;font-family: Calibri;&quot;&gt;Some typical applications of computer-generated animation are entertain-ment (motion pictures and cartoons), advertising, scientific and engineering studies and training and education. Although we tend to think of animation as implying object motions, the term Computer Animation generally refers to any time sequence of visual changes in a scene. In addition to changing object position with translations or rotations a computer-generated animation could dis-play time variations in object size, color, transparency, or surface texture.Adver-tising animations often transition one object shape into another.:- For Example, transforming a can of motor oil into an automobile engine, Computer animations can also be generated by changing camera parameters, such as position, orientation and focal length. And we can produce computer animations by changing lighting effects or other parameters and procedures associated with illumination and rendering.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSq88a2Ml7UMgMMZClSz9iIJcWzf-RnesS3NKhvJZJWGR50_JyKdN9K_HIdHb3Yuc7uMR0U7KDgq7UUPQTM13jxU-5PHlmeyLaL0TWx_Q2sfYKlXf0y_x36tfWGA5AMplj-NKYdAT3r6Q/s1600/computer-animation.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSq88a2Ml7UMgMMZClSz9iIJcWzf-RnesS3NKhvJZJWGR50_JyKdN9K_HIdHb3Yuc7uMR0U7KDgq7UUPQTM13jxU-5PHlmeyLaL0TWx_Q2sfYKlXf0y_x36tfWGA5AMplj-NKYdAT3r6Q/s320/computer-animation.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;Many applications of computer animation require realistic display. An ac-curate representation of the shape of thunderstorm or other natural phenomena described with a numerical model is important for evaluation the reliability of the model Also, simulators for training aircraft pilots and heavy equipment operators must produce reasonably accurate representations of the environment. Entertainment and advertising applications, on the other hand, are sometimes more interested in visual effects. Thus, sciences may be displayed with exaggerated shapes and unrealistic motions and transformations. There are many entertain-ment and advertising applications that do require accurate representations for computer generated scences.And in some scientific and engineering studies, real-ism is not a goal. For example, physical quantities are often displayed with pseudo-colors or abstract shapes that change over time to help the researcher un-distant the nature of the physical process.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Design of Animation Sequences&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;In general, an animation sequence is designed with the following steps:-&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Storyboard layout&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Object definitions&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Key-frame specifications&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;margin: 0in 0in 10pt 0.5in; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Generation of in-between frames&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;This standard approach for animated cartoons is applied to other animation applications as well, although there are many special applications that do not follow this sequence. Real time computer animations produced by flight simulators, for instance, display motion sequences in response to settings on the aircraft controls. And visualization applications are generated by the solutions of the numerical models. For &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;frame-by frame animation, &lt;/i&gt;each frame of the scene is separately generated and stored.Later, the frames can be recorded on film or they can be consecutively displayed in “real time playback” mode.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggwxXsTCRXfcvSxE_Bvthbe90zLPupHrra2BrOM95UKFjkFXyhnC_Nkl9YRT-TzTc9fBlVgJ5bVwp46Ze8CKj2HA2VRJ_3zXCiUttg3dQCmhCrYONNkIg2z29Dcq851hIH5QKFwyegwU0/s1600/6572431-0-large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggwxXsTCRXfcvSxE_Bvthbe90zLPupHrra2BrOM95UKFjkFXyhnC_Nkl9YRT-TzTc9fBlVgJ5bVwp46Ze8CKj2HA2VRJ_3zXCiUttg3dQCmhCrYONNkIg2z29Dcq851hIH5QKFwyegwU0/s320/6572431-0-large.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;The &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;storyboard&lt;/i&gt; is an outline of the action. It defines the motion sequence as a set of basic events that are to take place. Depending on the type of animation to be produced, the storyboard could consist of a set of rough sketches or it could be a list of the basic ideas for the motion.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;An &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;object definition &lt;/i&gt;is given for each participant in the action. Objects can be defined in terms of basic shapes, such as polygons or splines.In addition; the associated movements for each object are specified along with the shape.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;A key frame is a detailed drawing of the scene at a certain time in the animation sequence. Within each key frame, each object is positioned according to the time for that frame. Some key frames are chosen at extreme positions in the action; others are spaced so that the time interval between key frames is not too great. More key frames are specified for intricate motions than for simple, slowly varying motions.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;In between are the intermediate frames between the key frames. The number of in betweens needed is determined by the media to be used to display the animatin.Film requires 24 frames per second, and graphics terminals, are re-freshed at the rate of 30 to 60 frames per second. Typically time intervals for the motions are set up so that there are from three to five in betweens for each pair of key frames. Depending on the speed specified for the motion, some key frames can be duplicated. For a 1-minute film sequence with no duplication, we would need 1440 frames. With five in between film sequence with no duplication, we would need 1440 frames. With five in between for each pair of key frames, we would need 288 key frames. If the motion is not too complicated, we could space the key grams a little farther apart.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;There are several other tasks that may be required, depending on the application. They include motion verficatin, editing, and production and synchronization of soundtrack. Many of the functions needed to produce general animations are now computer generated.&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt; Please check Example of Computer generated frames for animation sequences……&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1YWufts42y5vm1IQ3LCkN5Xt4k0bHn194dywmkNCF8fuh_Z92FwrvWVkF-3g4ALAZsBq8aMAV5LRiFW-T9R66iaoOXbTLMYpEynWsVoatnsQUKGSCGHtDqFZ39FGpsLl45X5JsckkwTo/s1600/Animation-2d.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;310&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1YWufts42y5vm1IQ3LCkN5Xt4k0bHn194dywmkNCF8fuh_Z92FwrvWVkF-3g4ALAZsBq8aMAV5LRiFW-T9R66iaoOXbTLMYpEynWsVoatnsQUKGSCGHtDqFZ39FGpsLl45X5JsckkwTo/s320/Animation-2d.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;General Computer Animation Functions&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Some steps in the development of an animation sequence are well suited to computer solution. These include object manipulations and rendering, camera motions and the generation of in between, Animation packages, such as Wav-front for example, provide special functions for designing the animation and processing individual objects.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;One function available in animation packages is provided to store and manage the object database. Object shapes and associated parameters are stored and updated in the database. Other object functions include those for motion genera-tion and those for object rendering. Motions can be generated according to specified constraints using two-dimensional or three-dimensional transformations, Standard functions can then be applied to identify visible surfaces and apply the rendering algorithms.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Another typical function simulates camera movements. Standard motions are zooming, panning, tilting.Finally, given the specification for the key frames; the in-betweens can be automatically generated.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Related Post:-&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/what-is-animation.html&quot;&gt;What is Animation&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/hardware-requirements-for-animation.html&quot;&gt;&lt;span style=&quot;color: #5588aa;&quot;&gt;Hardware  Requirements for animation&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/software-requirements-for-animation.html&quot;&gt;&lt;span style=&quot;color: #5588aa;&quot;&gt;Software  Requirements for animation&lt;/span&gt;&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/3500170214378724450/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2012/01/computer-animation-tutorial2d3d.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/3500170214378724450'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/3500170214378724450'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2012/01/computer-animation-tutorial2d3d.html' title='Computer Animation Tutorial,2D,3D'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSq88a2Ml7UMgMMZClSz9iIJcWzf-RnesS3NKhvJZJWGR50_JyKdN9K_HIdHb3Yuc7uMR0U7KDgq7UUPQTM13jxU-5PHlmeyLaL0TWx_Q2sfYKlXf0y_x36tfWGA5AMplj-NKYdAT3r6Q/s72-c/computer-animation.jpg" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-3274727286317033912</id><published>2011-11-01T23:53:00.000-07:00</published><updated>2011-11-01T23:53:52.034-07:00</updated><title type='text'>Advantages of Firewall</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;Computers are constantly under the threat of being attacked by viruses, spyware and hackers. All organizations have critical and confidential information which can be accessed by hackers for misuse; a potential risk for any business. For this reason, it’s very important to incorporate security features when setting up a large or small business IT network in or around the Toronto area.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOrss9hnwZQz9RJYRBedQTvPRxctr-JcNRlUXJHv96pvKcoy4BO5fe9ZM92tR-OLp3UMuqFM7crIDNY0avEWYgGtGmHxg7LfnyIfU2rW5x_hulqOLuoobMIN8vmEncSKXYacOqCAtWU0w/s1600/Advantages-of-firewall.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;270&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOrss9hnwZQz9RJYRBedQTvPRxctr-JcNRlUXJHv96pvKcoy4BO5fe9ZM92tR-OLp3UMuqFM7crIDNY0avEWYgGtGmHxg7LfnyIfU2rW5x_hulqOLuoobMIN8vmEncSKXYacOqCAtWU0w/s320/Advantages-of-firewall.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;&lt;a href=&quot;http://internetdblog.blogspot.com/2011/11/firewall-how-does-it-work.html&quot;&gt;Using firewalls&lt;/a&gt; is one of the best ways to maintain network security and it’s an essential part of a company’s network protection system. Security software regulates the traffic between your network and the other networks that you access; it prevents unauthorized access to your network while allowing authorized access to continue as normal. With a firewall in place, an unauthorized attempt to access the can be blocked and encrypted, or allowed at the user’s discretion. An inner-network activity log is always maintained.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;span style=&quot;font-family: Times New Roman; font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: 16.5pt; margin: 0in 0in 0pt;&quot;&gt;&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;You may have the best antivirus software installed on your computer, but only when it’s combined with a firewall is it most effective. Compatible firewall protection may be purchased directly from one of the antivirus companies, or from places offering managed IT services in Toronto or other parts of Ontario. It is very important to have a firewall if you have a computer network. It is advised that any business install it on each and every computer of its network. This way, if one computer within a network gets infected by a virus, it does not infect the other computers within the same network.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;span style=&quot;font-family: Times New Roman; font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: 16.5pt; margin: 0in 0in 0pt;&quot;&gt;&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;If you’re not sure which antivirus software is best for your computer, you can seek the help of any company that provides computer support in Brampton, Markham, Vaughan or other areas in the GTA.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt; &lt;br style=&quot;mso-special-character: line-break;&quot; /&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;&quot;&gt;There are primarily two types of firewalls: software and hardware. Firewall software runs in the background of a computer. It captures each and every network request and decides whether it is authorized or unauthorized. A software firewall is not very expensive and it can be installed very easily once you identify the right version according to the operating system that you use.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;Firewall hardware is normally a small box that is fitted between your computer and your modem. It offers better protection and you can use it on more than one computer; it doesn’t matter what type of operating system your computers operate on.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/3274727286317033912/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2011/11/advantages-of-firewall.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/3274727286317033912'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/3274727286317033912'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2011/11/advantages-of-firewall.html' title='Advantages of Firewall'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOrss9hnwZQz9RJYRBedQTvPRxctr-JcNRlUXJHv96pvKcoy4BO5fe9ZM92tR-OLp3UMuqFM7crIDNY0avEWYgGtGmHxg7LfnyIfU2rW5x_hulqOLuoobMIN8vmEncSKXYacOqCAtWU0w/s72-c/Advantages-of-firewall.gif" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-139123694537864377</id><published>2011-11-01T23:44:00.000-07:00</published><updated>2011-11-01T23:45:04.226-07:00</updated><title type='text'>Firewall-How does it work</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%; mso-ansi-language: EN-US;&quot;&gt;The Internet is vital for everyday business communication, accessing important data and information exchange, but with the use of this tool comes the threat of&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt; people who may attempt to access your network with harmful intentions. Hence, it has become imperative to control the access to the information in your databases. You can do so with the help of a solid firewall; any professional IT consultant in Toronto or outside of the city would agree.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFgSwOdoFgehFv7Phn82E6WPrsn1UKCqd1J4MVe35l-unhD5OxX1TDe1V5UnCjJWG2qEPmKoNUG7j9WLBU4tXztoeJN9mrcbTXNPVvhZtxUzRkzK_C2eOPTIlYQ9hafSPjRetDuK9gQts/s1600/what-is-firewall.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;230&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFgSwOdoFgehFv7Phn82E6WPrsn1UKCqd1J4MVe35l-unhD5OxX1TDe1V5UnCjJWG2qEPmKoNUG7j9WLBU4tXztoeJN9mrcbTXNPVvhZtxUzRkzK_C2eOPTIlYQ9hafSPjRetDuK9gQts/s320/what-is-firewall.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%; mso-ansi-language: EN-US;&quot;&gt;&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;What is a firewall?&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Think of a&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt; firewall as a traffic policeman who controls and restricts the traffic between your computer the Internet. It’s a must when setting up large or small business IT networks in Toronto and the Greater Toronto Area. With a firewall installed, all information within the internal network of an organization is protected from the numerous computers connected to the web.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;How does it work?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Each computer in has a unique IP address that enables it to connect to other computers, which allows other users to transfer files to and from other computers in the network. While the Internet has many safety features that control the access from different computers -- and most people do adhere to privacy protocols -- the risk of unauthorized access to your computer remains generally high.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Firewalls save a record of IP addresses and help you to control external access to your computer. When a computer tries to access your computer you receive an alert; then it’s up to you to authorize access. You can program your firewall to authorize access to desired computers or networks, and restrict the access of unwanted computers or networks. This is extremely useful in reducing the threat of viruses, spyware and malware; it even protects your computers from potential hackers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Using a firewall protects the data and information that is sent along your office network, so it is a must for any business and individual to install one for any computer in use. Any unauthorized access to your computer can leave your personal or professional information exposed to hackers who may use your confidential information for selfish or destructive motives.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;A good firewall can go a long way in protecting your network from any unauthorized access. If you’re in the area, you can seek advice from companies that provide IT support in Toronto, Mississauga, Oakville or other parts of the GTA to help with firewall installation and any other security needs your network may gave.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;mso-ansi-language: EN-US;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/139123694537864377/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2011/11/firewall-how-does-it-work.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/139123694537864377'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/139123694537864377'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2011/11/firewall-how-does-it-work.html' title='Firewall-How does it work'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFgSwOdoFgehFv7Phn82E6WPrsn1UKCqd1J4MVe35l-unhD5OxX1TDe1V5UnCjJWG2qEPmKoNUG7j9WLBU4tXztoeJN9mrcbTXNPVvhZtxUzRkzK_C2eOPTIlYQ9hafSPjRetDuK9gQts/s72-c/what-is-firewall.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-7556985879499267230</id><published>2011-09-20T22:33:00.000-07:00</published><updated>2011-09-21T05:03:53.672-07:00</updated><title type='text'>Information Technology(IT) Consulting, Firms</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;Technological advancements have made it very necessary for every firm to have a proper control and maintenance of their IT related activities. If a company does not have its own IT department, it may avail the services of IT consulting firms. These firms provide solutions to IT related requirements such Email and Spam Control, Network Security, Data Back-up, IT Budgeting and Planning.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSCROUsF-q-CdZATvnnMGXY_LcSYpyo9RfxhVBVSi9Lu3h0X4FsB4vKBxxlmmXjWRQtsC4BRpdgXEdqA2sfOc_DmawDUNI_p0GUSaKGp5HlbIMcrH-1Sj3QtZM_MkbCYfMC_2PrFiMEQY/s1600/it_consulting.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; hca=&quot;true&quot; height=&quot;314&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSCROUsF-q-CdZATvnnMGXY_LcSYpyo9RfxhVBVSi9Lu3h0X4FsB4vKBxxlmmXjWRQtsC4BRpdgXEdqA2sfOc_DmawDUNI_p0GUSaKGp5HlbIMcrH-1Sj3QtZM_MkbCYfMC_2PrFiMEQY/s320/it_consulting.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;IT Consulting - Types of Consulting Firms&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;IT consulting firms can be broadly divided into three types:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Professional Services Firms&lt;/b&gt;: These firms are very large in size. They can easily provide IT solutions for a large company. These firms are most trusted all across the world. They have a reputation of providing the best solutions. Their services are somewhat costly.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Staffing Firms&lt;/b&gt;: These firms are in effect for the period when they are handling your business. They employ people for a short duration. They phase out once they are through with the contract with a company.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Independent consultants&lt;/b&gt;: They are firms which have knowledge about any technological developments. They are competent enough to handle your business needs. They contribute a lot in the growth of their clients. Independent consultants are considered to be the best choice of all.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Main Concerns handled&lt;/b&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;apple-style-span&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt;&quot;&gt;&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;IT Consultants mainly handle three concerns:&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Data Integrity&lt;/b&gt;: A company’s data is one of the most critical asset of any organization. It includes critical information such as customer details, orders placed by customers, payment records etc. Thus, it becomes very important for every organization to protect its data. The services of IT consultants are often hired to ensure data integrity. They help in maintaining back-up of all the important data.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Security&lt;/b&gt;: A company has to protect its network from various threats such as hacking, viruses, Malware, etc. IT Consultants provide superior protection from all these threats by providing Firewalls and Anti-virus programs. It is imperative to let these consultants handle all your security needs. They have expertise in this field and can handle your security requirements in the best possible manner.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;System Performance&lt;/b&gt;: It is very important for a company’s IT system to perform in the most efficient manner. A company’s business can prosper and grow only if it has proper support. IT consultants provide you the best advice. They help you invest in systems which give you best performance and increased protection. They play a vital role in the success of a company.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/7556985879499267230/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2011/09/information-technologyit-consulting.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/7556985879499267230'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/7556985879499267230'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2011/09/information-technologyit-consulting.html' title='Information Technology(IT) Consulting, Firms'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSCROUsF-q-CdZATvnnMGXY_LcSYpyo9RfxhVBVSi9Lu3h0X4FsB4vKBxxlmmXjWRQtsC4BRpdgXEdqA2sfOc_DmawDUNI_p0GUSaKGp5HlbIMcrH-1Sj3QtZM_MkbCYfMC_2PrFiMEQY/s72-c/it_consulting.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-8966603710935622831</id><published>2011-09-20T22:31:00.001-07:00</published><updated>2011-09-20T22:31:48.858-07:00</updated><title type='text'>Why IT Consultant is important for Us</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;apple-style-span&quot;&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;&quot;&gt;The reliance of mankind on technology has increased with time. We are dependent on computers for most of our work. Information technology plays a very important role in day to day operations of every business. There are certain IT services which are essential for every business. Firms seek the help of IT consultants to cater to their needs.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background: white; color: #191c1e; font-family: &amp;quot;Trebuchet MS&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 10pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;The most common services offered by IT consultants are:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Email and Spam Control&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;Email has become the most extensively used tool for personal as well as professional communication. Businesses greatly rely on email, to carry business communication with their business associates and clients. Spam is the biggest problem faced by us while using emails. Each day, hundreds of spam emails are filtered out by spam filters. If these filters stopped functioning any day, it would greatly disrupt our electronic communication activities. You may not be able to reply to important business emails, which may even lead to lost business opportunities. Companies avail the services of IT consultants, to control the Spam filtration tools effectively.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Network Security&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;Our networks are often vulnerable to the attack of virus or&amp;nbsp;malware. This attack could be from internal or external sources. Thus, network security becomes is an inevitable requirement for every business. Some companies handle network security through on site measures while others outsource it to IT consultants. Outsourcing is a better measure as the IT consultants are experts in this domain. Each day, new threats and viruses, are generated. These consultants are equipped with the latest development in network protection. They offer a high degree of protection from all kinds of security threats.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Budgeting and Planning&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;There are many IT related investments that a company has to make from time to time. They depend on the company’s requirement. A company may not have a separate IT department. Hence, it becomes very difficult to get an idea of the budget required for such needs. In the absence of a proper budget, the company may end up spending either too much or too less. This may result in a chaotic situation. A company may seek the help of consulting services for budgeting and planning.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Data Back-Up and Disaster Recovery&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;apple-style-span&quot;&gt;It is very important to maintain a back-up of the company’s data. It is always advisable to maintain it off site through IT consultants. Onsite maintenance is not an intelligent move, as your data may be destroyed in case of fire, theft or a natural calamity.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/8966603710935622831/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2011/09/why-it-consultant-is-important-for-us.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8966603710935622831'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8966603710935622831'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2011/09/why-it-consultant-is-important-for-us.html' title='Why IT Consultant is important for Us'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-605878686327690905</id><published>2011-05-29T22:54:00.000-07:00</published><updated>2011-05-29T22:54:57.386-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Basic"/><title type='text'>The Evolution of computers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Necessity is the mother of invention. The saying holds true for computers also, because computers were invented because of man’s search for fast and accurate calculating devices.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;The first mechanical adding machine was invented by Blaise Pascal in 1642.Later, in the year 1671; Baron Gottfried Wilhelm von Leibniz of Germany invented the first calculator for multiplication. Keyboard machines originated in the United States around 1880 and are extensively used even today. Around this period only, Herman Hollerith came up with the concept of punched cards, which were extensively used as input medium in computers even in late 1970s, Business machines and calculators made their appearance in Europe and America towards the end of the nineteenth century.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfIXsbgJTGf9DhWAcBeCwTu346G7486CwGKrJvDARwTwrvQzDuMvL9krcVEJzbEpqGQNfCaefWuL4tnD9-NGY3O1rX1heQrvLMUhXEFXaCPlmio0pEwBr8a8ymzIx5INsfnRSWN8lpv44/s1600/Evolution-Of-Computers.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;177&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfIXsbgJTGf9DhWAcBeCwTu346G7486CwGKrJvDARwTwrvQzDuMvL9krcVEJzbEpqGQNfCaefWuL4tnD9-NGY3O1rX1heQrvLMUhXEFXaCPlmio0pEwBr8a8ymzIx5INsfnRSWN8lpv44/s400/Evolution-Of-Computers.jpg&quot; t8=&quot;true&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 10pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Charles Babbage, a nineteenth century Professor at Cambridge University, is considered the faster of modern digital computers. During his period, mathematical and statistical tables were prepared by a group of clerks. Even the utmost care and precautions could not eliminate human errors. Babbage had to spend several hours checking these tables. Soon he became dissatisfied and exasperated with this type of monotonous job. The result was that he started thinking to build a machine, which could compute tables guaranteed to be error-free. In this process, Babbage designed a “Difference Engine “in the year 1822, which could produce reliable tables. In 1842, Babbage came out with his new idea of Analytical Engine, Which was intended to be completely automatic. It was to be capable of performing the basic arithmetic functions for any mathematical problem, and it was to do so at an average speed of 60 additions per minute. Unfortunately, he was unable to produce a working model of this machine, because the precision engineering required to manufacture the machine was not available during that period. However, his efforts established a number of principles, which have been shown to be fundamental to the design of any digital computer. In order to have better idea of the evolution of computers, let us now briefly discuss about some of the well-known early computers. These are as follows:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;1.&lt;/span&gt;&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;The Mark 1st Computer (1937-44. &lt;/b&gt;Also known as Automatic Sequence Controlled calculator, this was the first fully automatic calculating machine designed by Howard A. Aiken of Harvard University, in collaboration with IBM (International Business Machines).Corporation .Its design was based on the techniques already developed for punched card machinery. It was an electro-mechanical device, since both mechanical and electronic components were used in its design.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Although this machine proved to be extremely reliable, It was very complex in design and huge in seize. It used over 3000 electrically actuated switches to control its operations, and was approximately 50 feet long and 9 feet high. It was capable of performing five basic arithmetic operations: addition, subtraction, multiplication, division and table reference. A number as big 23 decimal digits could be used in this machine. It took approximately 0.3 second to add two numbers and 4.5 seconds for multiplication of two members. Hence, the machine was very slow as compared to today’s computers.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;2.&lt;/span&gt;&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;The Atanasoff-Berry Computer (1939-42).&lt;/b&gt; This electronic machine was developed by Dr.John Atanasoff to solve certain mathematical equations. It was called the Atanasoff-Berry Computers, Or ABC,after its inventor’s name and his assistant, Clifford Berry. It used 45 vacuum tubes for internal logic and capacitors for storage.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;3.&lt;/span&gt;&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;The ENIC (1943-46).&lt;/b&gt; The Electronic Numerical Integrator and Calculator (ENIAC) was the first all electronic computer. It was constructed at the Moore School of Engineering of the University of Pennsylvania, U.S.A by a design team led by Professor J.Presper Eckert and John Mauchly.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;ENIC was developed because of military need, and was used for many years to solve ballistic problems, It took up the wall space in a 20*40 square feet room and used 18,000 vacuum tubes, The addition of two numbers was achieved in 200 microseconds, and multiplication in 2000 microseconds.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;4.&lt;/span&gt;&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;The EDVAC (1946-56).&lt;/b&gt; A major drawback of ENIAC was that its program was wired on boards, which made it difficult to change the programs. This problem was later overcome by the “stored program” concept introduced by Dr.John Von Neumann. The basic idea behind this concept is that a sequence of instructions, as well as data, can be stored in the memory of the computers, for automatically directing the flow of operations. This feature considerably influenced the development of modern digital computers because of the ease with which different programs can be loaded and executed on the same computer. Due to this feature, we often refer to modern digital computers as stored program digital computers. The Electronic Discrete Variable Automatic Computer (EDVAC) was designed on stored both instructions and data in the binary form (a system that uses only two digits -0 &amp;amp; 1 to represent all characters), instead of the decimal numbers or human readable words.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;5.&lt;/span&gt;&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;The EDSAC (1947-49).&lt;/b&gt; Almost simultaneously with EDVAC of U.S.A, the Bruisers developed the Electronic Deley Storage Automatic Calculator (EDSAC). The machine executed its first program in May 1949.In this machine, addition operation was accomplished in 1500 microseconds, and multiplication operation in 400 microseconds. The machine was developed by a group of scientists, head by Professor Maurice Wilikes, at the Cambridge University Mathematical Laboratory.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;6.&lt;/span&gt;&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;The UNIVAC 1&lt;sup&gt;st&lt;/sup&gt; (1951).&lt;/b&gt; The Universal Automatic Computer (UNIVAC) was the first digital computer, which was not “one of kind”. Many UNIVAC machines were produced, the first of which was installed in the Census Bureau in 1951 and was used continuously for 10 years. The first business use of a computer, a UNIVAC 1&lt;sup&gt;st&lt;/sup&gt;, was by General Electric Corporation in 1954.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;In 1952, the International Business Machines (IBM) Corporation introduced the 701 commercial computers. In rapid succession, improved models of the UNIVAC 1&lt;sup&gt;st&lt;/sup&gt; and other 700-series machines were introduced. In 1053, IBM produced the IBM-650, and over 1000 of these computers.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.5in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;margin: 0in 0in 10pt 0.5in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;The commercially available digital computers, which could be used for business and scientific applications, had arrived.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/605878686327690905/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2011/05/evolution-of-computers.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/605878686327690905'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/605878686327690905'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2011/05/evolution-of-computers.html' title='The Evolution of computers'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfIXsbgJTGf9DhWAcBeCwTu346G7486CwGKrJvDARwTwrvQzDuMvL9krcVEJzbEpqGQNfCaefWuL4tnD9-NGY3O1rX1heQrvLMUhXEFXaCPlmio0pEwBr8a8ymzIx5INsfnRSWN8lpv44/s72-c/Evolution-Of-Computers.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-4363849881613932244</id><published>2011-03-17T01:15:00.000-07:00</published><updated>2011-03-17T01:22:16.877-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Laptop"/><category scheme="http://www.blogger.com/atom/ns#" term="Toshiba Laptop"/><title type='text'>Toshiba is a big brand and its parts are perfect choice</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Toshiba offers a wide variety of laptops. In the growing scenario of technology, everyday new ranges of laptops are available in the market. It was time when only the rich area of the society was able to purchase the laptops. Nowadays the time has changed; there are laptops available which are able to suit everyone’s requirements. Everyone can fulfill his desire of buying the laptop which can fit into his pocket. There are various stores available in the markets which provide the laptop repair and spares.&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf5LOjWfVdFO_EA2VJvVWQvcfYVdtS0U-il2ElDicXptUtogB1B0wgP8ZDOYjXDbeg4QZoakDQudY-U81snTWYHYKzuP-EOaUWHjfIVr-40fABHWTukGiJJ4oxgDGjVzgrHT9yWT381k0/s1600/Toshiba+Laptop+Qosmio+Series.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;211&quot; r6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf5LOjWfVdFO_EA2VJvVWQvcfYVdtS0U-il2ElDicXptUtogB1B0wgP8ZDOYjXDbeg4QZoakDQudY-U81snTWYHYKzuP-EOaUWHjfIVr-40fABHWTukGiJJ4oxgDGjVzgrHT9yWT381k0/s320/Toshiba+Laptop+Qosmio+Series.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;The laptops normally provide the reliable services to the customer but at times of failure the hardware needs to be changed immediately. Looking for hardware services is a tedious task. The hardware services are to be very reliable because if the parts are not able to fulfill the compatibility of the laptop, the laptop may even get damaged. In order to ensure the proper working of the laptop, the customer should ensure that he use the original and reliable laptop parts.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi87M0Gttl0j6fiCPznoyj2UlaWjV1tqOKRqIuPTeUKzlrEK7HPc020UJ7KJ940bNoGvwb_kRFGnjmn_Nk8KGl8TV0ekdTnAG6JayWqyuIOGt_Wspgmo3WnaU08w7dJEtbenymDVvtoe0c/s1600/toshiba-satellite-pro-l510.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;256&quot; r6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi87M0Gttl0j6fiCPznoyj2UlaWjV1tqOKRqIuPTeUKzlrEK7HPc020UJ7KJ940bNoGvwb_kRFGnjmn_Nk8KGl8TV0ekdTnAG6JayWqyuIOGt_Wspgmo3WnaU08w7dJEtbenymDVvtoe0c/s320/toshiba-satellite-pro-l510.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;There are numerous service centers available in the market which can provide the services for the laptop repair. The customer should ensure that the service center can provide the services throughout the day. The failure can happen anytime and it is very crucial to get the reforms done early. The laptop can only function well if only it is made compatible with the suitable laptop parts and services. The services should be up to the mark in order to ensure the continuous working of the laptop. &lt;br /&gt;
Sometimes the laptop requires regular checking as well to ensure the updating of the software. The updated software could only ensure the continuous and early functioning of the laptop. There are numerous websites available on the internet which can provide the laptops repair and spare services. Sometimes the attractive looking websites may not be able to fulfill the customer’s needs. These websites are sometimes a part of the trap which can make false promises to the user. The requirement and the company details should always be checked before finalizing any deal with the company. The customer should make a smart decision prior to make any decision&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/4363849881613932244/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2011/03/toshiba-is-big-brand-and-its-parts-are.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/4363849881613932244'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/4363849881613932244'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2011/03/toshiba-is-big-brand-and-its-parts-are.html' title='Toshiba is a big brand and its parts are perfect choice'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf5LOjWfVdFO_EA2VJvVWQvcfYVdtS0U-il2ElDicXptUtogB1B0wgP8ZDOYjXDbeg4QZoakDQudY-U81snTWYHYKzuP-EOaUWHjfIVr-40fABHWTukGiJJ4oxgDGjVzgrHT9yWT381k0/s72-c/Toshiba+Laptop+Qosmio+Series.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-7481356652551287226</id><published>2011-03-01T02:06:00.000-08:00</published><updated>2011-03-01T02:06:47.378-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="audio"/><category scheme="http://www.blogger.com/atom/ns#" term="digital audio"/><title type='text'>Computer Analog and Digital Audio</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;strong&gt;Audio- Sound&lt;/strong&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl3ZwGjHo9nEkEWK_HTc_0p5xviZgbPKM1Wj7wSYKMYHJnJGB6tXMOlp87ZE5WRfFtmr-8IFnjxAeFyz2Isem4ajukQQXrKemNP_AqHOVng_tietyGXSDPN1kaBAUvyXj1Id-QFDO27vc/s1600/nmodisetup.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;247&quot; l6=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl3ZwGjHo9nEkEWK_HTc_0p5xviZgbPKM1Wj7wSYKMYHJnJGB6tXMOlp87ZE5WRfFtmr-8IFnjxAeFyz2Isem4ajukQQXrKemNP_AqHOVng_tietyGXSDPN1kaBAUvyXj1Id-QFDO27vc/s320/nmodisetup.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Computer audio deals with synthesizing, recording, and playback of audio or sound with the aid of a computer. Audio is another very important &lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/multimedia-components-text-alphanumeric.html&quot;&gt;component of multimedia&lt;/a&gt;, because in many cases sound can substantially reinforce our understanding of information presented in other ways, and in some cases sound is the only way to provide the desired information.&lt;br /&gt;
&amp;nbsp;For example, in the &lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/multimedia-components-text-alphanumeric.html&quot;&gt;multimedia application&lt;/a&gt; meant for educating small children voice explanation can be added to the animation clip for describing what is being shown, and pointing out what to look for that makes a house’s gallop different from a horse’s walk. Similarly, &lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/what-is-animation.html&quot;&gt;an animation&lt;/a&gt; clip can show the horse neighing and neighing sound can be added to effectively convey the type of sound horses make. Note that, it is nearly impossible to provide an accurate description of a horse’ neigh, a lion’s roar, or a bird’s chirp using text, and graphics is of no help in these castles. Hence, sound is the only medium that can accurately provide such information. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Analog and Digital Audio&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
Information can be represented as analog signals or digital signals. Analog signals exhibit a continuous tone of smooth fluctuations, while digital signals are composed of discrete values represented by numbers. The transformation between analog and digital signals is achieved by A/D (Analog-to-Digital) conversion and D/A (Digital-to-Analog) conversion. A/D conversion transforms an analog input(such as voltage) into a series of numeric representation by digitization’s/A conversion is the reverse process, which transform a sequence of discrete numbers back into continuous analog signal.&lt;br /&gt;
Audio information travels in natural medium in the form of sound waves, which are analog in nature. For the computer to be able to understand audio information, sound waves must be converted from analog to digital form. Transducer is a device capable of changing signal from one form to another. For example, microphone is an example of a transducer, which converts sound waves into electrical signals. Conversely, loudspeaker is an example of a transducer, which converts electrical signal into sound waves.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/7481356652551287226/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2011/03/computer-analog-and-digital-audio.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/7481356652551287226'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/7481356652551287226'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2011/03/computer-analog-and-digital-audio.html' title='Computer Analog and Digital Audio'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl3ZwGjHo9nEkEWK_HTc_0p5xviZgbPKM1Wj7wSYKMYHJnJGB6tXMOlp87ZE5WRfFtmr-8IFnjxAeFyz2Isem4ajukQQXrKemNP_AqHOVng_tietyGXSDPN1kaBAUvyXj1Id-QFDO27vc/s72-c/nmodisetup.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-5316120547203596591</id><published>2010-12-29T23:25:00.000-08:00</published><updated>2010-12-29T23:32:40.898-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="animation requirements"/><category scheme="http://www.blogger.com/atom/ns#" term="computer animation"/><category scheme="http://www.blogger.com/atom/ns#" term="software requirements for animation"/><title type='text'>Software Requirements for Animation</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYW5NCQU6zo0EBRoS0OBXi8GEWb24gZGUPHmeC6Cty4veXxioK6kVnKI5_xiq4-eZEcQdfw0FOgCIXvjUe49GWGA68faxmz_58_Iqckg_epf2PSKkNIvCmZygvf476izj_E8I08kHNixs/s1600/software_requirements_animation.jpeg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5556374708443936930&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 240px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYW5NCQU6zo0EBRoS0OBXi8GEWb24gZGUPHmeC6Cty4veXxioK6kVnKI5_xiq4-eZEcQdfw0FOgCIXvjUe49GWGA68faxmz_58_Iqckg_epf2PSKkNIvCmZygvf476izj_E8I08kHNixs/s320/software_requirements_animation.jpeg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;The following software capabilities are highly desirable in a &lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/what-is-multimedia-computer-system.html&quot;&gt;multimedia computer system &lt;/a&gt;with animation facility:&lt;/p&gt;&lt;br /&gt;&lt;ol&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;&lt;strong&gt;Animation creation software&lt;/strong&gt;: - It allows the user to create &lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/what-is-animation.html&quot;&gt;animation&lt;/a&gt; sequences from scratch by using a mouse and various simple objects, such as lines, circles and polygons, with various supporting colors. For example, an animation sequence to illustrate bouncing of a ball can be created as follows-&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;Select a circle object and fill it with red color.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;Then start the recorder of the animation creation software.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;Then select the colored circle and drag it around the screen by using a mouse, recording several positions for it on the screen (each time you release the mouse button, you record the object’s position on the screen.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;Finally, stop the recorder and use save command to save the animation.&lt;/li&gt;&lt;br /&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;&lt;strong&gt;Screen capture software&lt;/strong&gt;: - It is used to capture the displays of a computer screen as graphic images, which can be used in animation.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;&lt;strong&gt;&lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/what-is-animation.html&quot;&gt;Animation&lt;/a&gt; clips&lt;/strong&gt;: - This is a library of animation clips from which one can select and directly import an animation clip and use it in a multimedia application, saving the time and effort, which might otherwise be required to create a similar animation clip. This is also useful. if one does not have an animation creation software. An animation clips library often provides the facility to add a new animation clip or delete an existing animation clip from the library.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;&lt;strong&gt;Animation file importing&lt;/strong&gt;: - The task of creating a multimedia application incorporating animation can often be greatly simplified, if the application software can import animation files in some standard formats. Common animation file formats include.FLI and FLC.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;&lt;strong&gt;Software support for high resolution&lt;/strong&gt;: - If the animation sequences of a multimedia application are made up of very high quality images, it is important to have not only the necessary hardware, but also software support for displaying high resolution images, which have many colors to maintain the high quality of animation display.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;&lt;strong&gt;Recording and playback capability&lt;/strong&gt;: - It allows the user to control the recording and display of an animation sequence. For example, it provides the user with options to ‘pause’ and ‘replay’ the animation sequence.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;&lt;strong&gt;Transition effects&lt;/strong&gt;: - Animation can be even more interesting, if it is enhanced with transition effects, such as fade-in and fade-out, layering, zooming and rotation of objects.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;For more &lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/hardware-requirements-for-animation.html&quot;&gt;Hardware Requirements&lt;/a&gt; click here&lt;/li&gt;&lt;br /&gt;&lt;/ol&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/5316120547203596591/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2010/12/software-requirements-for-animation.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/5316120547203596591'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/5316120547203596591'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2010/12/software-requirements-for-animation.html' title='Software Requirements for Animation'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYW5NCQU6zo0EBRoS0OBXi8GEWb24gZGUPHmeC6Cty4veXxioK6kVnKI5_xiq4-eZEcQdfw0FOgCIXvjUe49GWGA68faxmz_58_Iqckg_epf2PSKkNIvCmZygvf476izj_E8I08kHNixs/s72-c/software_requirements_animation.jpeg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-8673645159276987982</id><published>2010-12-29T23:14:00.000-08:00</published><updated>2010-12-29T23:38:32.180-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer animation"/><category scheme="http://www.blogger.com/atom/ns#" term="hardare requirements for animation"/><title type='text'>Hardware Requirements for Animation</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLGbp8rAxNTeTd1bFykm132Cr3LyzIka6nSLJOU3mPtCWEHel3VqckK8O9Pgw5GStJ4kit1Q7_Ij-ilgY5kpBdL9bx8pJSWl9pSlALV0CQ-hlERFCuoOIzD1Mg8I4WmCNeLxxkwiajnDU/s1600/Hardwarerequreiemetns.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5556372078218102178&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 205px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLGbp8rAxNTeTd1bFykm132Cr3LyzIka6nSLJOU3mPtCWEHel3VqckK8O9Pgw5GStJ4kit1Q7_Ij-ilgY5kpBdL9bx8pJSWl9pSlALV0CQ-hlERFCuoOIzD1Mg8I4WmCNeLxxkwiajnDU/s320/Hardwarerequreiemetns.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/what-is-animation.html&quot;&gt;Computer animation&lt;/a&gt; generally involves the following hardware devices&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;&lt;br /&gt;&lt;ol&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;Image generation tools and devices, such as scanners, digital cameras, and video capture board interfaced to some standard video source, like video camera or video cassette recorder (VCR), are used to generate images to be used in animation.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;Computer monitors with image display capability is the minimum requirement for outputting (displaying) animation .In addition, &lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/what-is-multimedia-computer-system.html&quot;&gt;multimedia computer systems &lt;/a&gt;capable for handling animation also require a graphics accelerator board, which not only controls the resolution and number of colors of display, but also speeds up the refresh rate. Refresh rate is the time taken to paint the computer screen with a new image frame, replacing the previous images frame. Increased speed, due to the use of graphics accelerator board, smoothes out the movement (avoids flickering of animation sequences) because subsequent frames, which make up the animation can be displayed quicker. &lt;/li&gt;&lt;/ol&gt;&lt;ol&gt;For &lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/software-requirements-for-animation.html&quot;&gt;Software Reuirements for animation&lt;/a&gt; click here&lt;br /&gt;&lt;/ol&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/8673645159276987982/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2010/12/hardware-requirements-for-animation.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8673645159276987982'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/8673645159276987982'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2010/12/hardware-requirements-for-animation.html' title='Hardware Requirements for Animation'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLGbp8rAxNTeTd1bFykm132Cr3LyzIka6nSLJOU3mPtCWEHel3VqckK8O9Pgw5GStJ4kit1Q7_Ij-ilgY5kpBdL9bx8pJSWl9pSlALV0CQ-hlERFCuoOIzD1Mg8I4WmCNeLxxkwiajnDU/s72-c/Hardwarerequreiemetns.gif" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-2363885881382302440</id><published>2010-12-29T23:03:00.000-08:00</published><updated>2010-12-29T23:35:44.880-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer animation"/><category scheme="http://www.blogger.com/atom/ns#" term="motions"/><category scheme="http://www.blogger.com/atom/ns#" term="multimedia"/><category scheme="http://www.blogger.com/atom/ns#" term="what is animation"/><title type='text'>What is animation</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIi-zI-P9-g0cwVZUfEBYIaajKxLMJ8Cx93XsINPPAWTAlIscUKeOKO-29KlBVUJj1OBKkpVUBvVSU06RrSqN3YWbJR-fTJZC-Lf1Urfm18fr1KxlEoObQOiFKLIIdRxOnU509rtO53sw/s1600/info_at_dic7.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5556369494407140706&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 331px; CURSOR: hand; HEIGHT: 197px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIi-zI-P9-g0cwVZUfEBYIaajKxLMJ8Cx93XsINPPAWTAlIscUKeOKO-29KlBVUJj1OBKkpVUBvVSU06RrSqN3YWbJR-fTJZC-Lf1Urfm18fr1KxlEoObQOiFKLIIdRxOnU509rtO53sw/s320/info_at_dic7.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Computer animation deals with the generation, sequencing, and display of a set of images (called frames) to create an effect of visual change or motion, similar to a movie film (video).&lt;br /&gt;Animation is an important &lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/multimedia-components-text-alphanumeric.html&quot;&gt;component of multimedia&lt;/a&gt;, because just as a picture is a powerful way to illustrate information, a small animation clip is even more powerful and useful for illustrating concepts, which involve movement. For Example, in the multimedia application meant for educating small children an animation clip will be very effective in illustrating the difference in movement of a horse during a gallop versus a walk. Without animation, it will be very difficult to explain such concepts by using only still images and text. Similarly, in a &lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/multimedia-components-text-alphanumeric.html&quot;&gt;multimedia application&lt;/a&gt; meant for teaching swimming, the proper way to swing hands for swimming can be more effectively illustrated with an animation as compared to images and textual description.&lt;br /&gt;Animation is often confused with video may be because both deal with the display of a sequence of images to generate an effect of motion. However, animation is commonly used in those instances where videography is not possible, or animation can better illustrate the concept than video. For example, collision between two stars, or movement of planets around sun, cannot be video graphed, and hence, can be best illustrated with the help of an animation clip. Similarly, flow of blood in our arteries and veins, and pumping of blood by our heart can be best illustrated with the help of animation clip. Animation is also very commonly used in advertisements, cartoon films, video games, and virtual reality applications. Virtual reality is relatively new computer technology, using which, the user can put on a pair of goggles and a glove and tour a three-dimensional world that exists only in the computer, but appears realistic to the user.&lt;br /&gt;Animation deals with displaying a sequence of images at a reasonable speed to create an impression of movement. For a jerk-free full motion animation,25 to 30 frames have to be displayed per second.&lt;br /&gt;&lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/hardware-requirements-for-animation.html&quot;&gt;Hardware Requirements for animation&lt;/a&gt;.&lt;br /&gt;&lt;a href=&quot;http://internetdblog.blogspot.com/2010/12/software-requirements-for-animation.html&quot;&gt;Software Requirements for animation&lt;/a&gt; .</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/2363885881382302440/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2010/12/what-is-animation.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/2363885881382302440'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/2363885881382302440'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2010/12/what-is-animation.html' title='What is animation'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIi-zI-P9-g0cwVZUfEBYIaajKxLMJ8Cx93XsINPPAWTAlIscUKeOKO-29KlBVUJj1OBKkpVUBvVSU06RrSqN3YWbJR-fTJZC-Lf1Urfm18fr1KxlEoObQOiFKLIIdRxOnU509rtO53sw/s72-c/info_at_dic7.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-5059333015384860698</id><published>2010-11-24T04:08:00.000-08:00</published><updated>2010-11-24T04:20:46.298-08:00</updated><title type='text'>Multimedia components</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqtzynPrrXByOqsyHaKSav3IIDUnBY9yHNKDas6Yr7ed117DX2DK2luM6TpuI48Vr39nD4oIiEOcokk9_P6_mPr0M-6FSzGEKGQ5IxD_THGTNuM9bKyPSqhl7JnEoPjb1VgenJ6QeY1qc/s1600/Feature-Steroid-Speed-Belt-V20-ML-3.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5543089270180706530&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 190px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqtzynPrrXByOqsyHaKSav3IIDUnBY9yHNKDas6Yr7ed117DX2DK2luM6TpuI48Vr39nD4oIiEOcokk9_P6_mPr0M-6FSzGEKGQ5IxD_THGTNuM9bKyPSqhl7JnEoPjb1VgenJ6QeY1qc/s320/Feature-Steroid-Speed-Belt-V20-ML-3.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p&gt;Multimedia components&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;TEXT&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Alphanumeric characters are used to present information in the text form. Computers are widely used for text processing.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;Hardware Requirements for Text&lt;/strong&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Text processing, with the use of&lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/what-is-multimedia-computer-system.html&quot;&gt; multimedia computers&lt;/a&gt;, generally involves the following hardware devices.1. Keyboards are most commonly used to input text data.2. OCRs (Optical Recognizers) are used for direct input of printed text to computers.3. Computer screens are used to display text information.4. Printers are most commonly used to output text in hard copy form.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;Software Requirements for Text&lt;/strong&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;The following text processing capabilities are highly desirable in a multimedia computer system for better presentation and use for textual information.&lt;br /&gt;Text editing. Text editors and word processing packages are used to generate, edit and properly layout a text document.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;Text style.&lt;/strong&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Presentation of text information can be made more effective by using text of various sizes, fonts and styles .For example ,newspapers use a good combination of all these styles to better highlights more important news than less important ones. Similarly ,in a book like the one you are now reading, a combination of various text styles are used to put more emphasis on certain words or phrases than the remaining text.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;Text searching.&lt;/strong&gt; &lt;/p&gt;&lt;br /&gt;&lt;p&gt;Usage of text information can be greatly enhanced by text searching features. This feature allows the users to enter a word or phrase, and the computer quickly finds and displays that part of the text where the world or phrase appears in the textual information, with the world or phrase highlighted.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;Hypertext.&lt;/strong&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Both presentation and use of textual information can be greatly enhanced by using hypertext feature. This feature provides great flexibility of structuring and accessing computer based text information. It generalizes the concepts of “footnote” and “cross reference” of traditional anchor (a word or phrase linked to another document) within documents. An anchor is often called a “hotword”. This means, if the user wants more information about a particular hotword, he/she can select that hotword and open window with additional text explaining that word or phrase.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;Text importing and exporting.&lt;/strong&gt; &lt;/p&gt;&lt;br /&gt;&lt;p&gt;The task of creating a textual document can often be greatly simplified, if the document preparation software has text-importing feature. This is because some of the text you want to incorporate in your document may already exist as a file created by a word processor or a database file. The file can be simply imported into the new documents at the desired location, instead of retyping the entire text again. If the imported file is large, it will result in enormous saving of time and effort required to prepare the new documents. Similarly, text exporting feature is very useful in allowing other package to use an existing documents. For what is multimedia &lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/what-is-multimedia.html&quot;&gt;click here&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/5059333015384860698/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2010/11/multimedia-components-text-alphanumeric.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/5059333015384860698'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/5059333015384860698'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2010/11/multimedia-components-text-alphanumeric.html' title='Multimedia components'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqtzynPrrXByOqsyHaKSav3IIDUnBY9yHNKDas6Yr7ed117DX2DK2luM6TpuI48Vr39nD4oIiEOcokk9_P6_mPr0M-6FSzGEKGQ5IxD_THGTNuM9bKyPSqhl7JnEoPjb1VgenJ6QeY1qc/s72-c/Feature-Steroid-Speed-Belt-V20-ML-3.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-5372413602320287128</id><published>2010-11-24T04:00:00.000-08:00</published><updated>2010-11-24T04:07:14.853-08:00</updated><title type='text'>What is a multimedia computer system?</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiDCrvZBYfQeQl38TGmixj5cLpuvLeg3AqieI0ndEDNl8a_CIV079ssdvoLhNsn4upvY9YL2yLUgvHPH6E4SPfzMvosbz-g9ljAAO4h5QqCxBwXUNpTDPucJmV3lbg9EhUEQvKiSFNb84/s1600/hp-notebook-computer.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5543086125236385202&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 226px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiDCrvZBYfQeQl38TGmixj5cLpuvLeg3AqieI0ndEDNl8a_CIV079ssdvoLhNsn4upvY9YL2yLUgvHPH6E4SPfzMvosbz-g9ljAAO4h5QqCxBwXUNpTDPucJmV3lbg9EhUEQvKiSFNb84/s320/hp-notebook-computer.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/what-is-multimedia.html&quot;&gt;What is a multimedia&lt;/a&gt; computer system?&lt;br /&gt;A multimedia computer system is a computer system, which has the capability to integrate two or more types of media (text, graphics, images, audio, and video) for the purpose of generation, storage, representation, manipulation and access of multimedia information. In generate, the data size for multimedia information is much larger than textual information, because representation of graphics, animation, audio or video media in digital form requires much larger number of bits than that required for representation of plain text. Due to this, multimedia computer system requires:&lt;br /&gt;Faster CPU (for quicker processing of larger amount of data).&lt;br /&gt;Larger storage devices(for storing large data files),&lt;br /&gt;Larger main memory(for running programs with large data size),&lt;br /&gt;Good graphics terminal s(for displaying graphics, animation and video),and&lt;br /&gt;Input/output devices required to play any audio associated with a multimedia application program.&lt;br /&gt;All &lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/what-is-multimedia.html&quot;&gt;multimedia computer&lt;/a&gt; systems need not have all the features listed above. For example, a computer system, which does not have the capability to handle audio and video media can still be called a multimedia computer system, because it can still handle multiple media (text and graphics).However a full-fledged multimedia computer system must be capable of handling all types of media discussed above, and hence, must have all the features listed above.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/5372413602320287128/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2010/11/what-is-multimedia-computer-system.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/5372413602320287128'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/5372413602320287128'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2010/11/what-is-multimedia-computer-system.html' title='What is a multimedia computer system?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiDCrvZBYfQeQl38TGmixj5cLpuvLeg3AqieI0ndEDNl8a_CIV079ssdvoLhNsn4upvY9YL2yLUgvHPH6E4SPfzMvosbz-g9ljAAO4h5QqCxBwXUNpTDPucJmV3lbg9EhUEQvKiSFNb84/s72-c/hp-notebook-computer.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-52014671972461935.post-7546138314845930396</id><published>2010-11-19T04:53:00.000-08:00</published><updated>2010-11-19T04:59:01.410-08:00</updated><title type='text'>What is MULTIMEDIA?</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwGT_dWu2uNGGsETA3CjtXgzISpqLmKJF_0RnpU70S43N3CTVy_LymabUUGvO542inQfFlCD7IBze9DKR4r0SrGBE8DuVY2duEuYJ3srKnmul1qXgP1V8wXbtMMXvMjEnG6x4FNvR9tO4/s1600/whatismultimedia.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5541243659337447522&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 295px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwGT_dWu2uNGGsETA3CjtXgzISpqLmKJF_0RnpU70S43N3CTVy_LymabUUGvO542inQfFlCD7IBze9DKR4r0SrGBE8DuVY2duEuYJ3srKnmul1qXgP1V8wXbtMMXvMjEnG6x4FNvR9tO4/s320/whatismultimedia.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;p&gt;&lt;strong&gt;What is MULTIMEDIA?&lt;/strong&gt;&lt;br /&gt;A medium is something, which can be used for presentation of information .There are two basic ways to present some information.&lt;br /&gt;1. &lt;strong&gt;Unimedium presentation.&lt;/strong&gt; In this case, a single medium is used to present information. For example, a stereo system is a unimedium device, because it presents information by using only sound medium. Similarly, a book having only text is also a unimediaum device, because it presents information by using only text medium.&lt;br /&gt;2. &lt;strong&gt;Multimedia presentation.&lt;/strong&gt; In this case, more than one medium is used to present information. For example a TV system is a &lt;em&gt;multimedia device&lt;/em&gt;, because it presents information by using sound and video media. Similarly, a book having both text and diagrams is also a multimedia device, because it presents information by using text, graphics and images.&lt;br /&gt;&lt;br /&gt;Obviously, multimedia presentation of any information greatly enhances the comprehension capability of the user of the information because it involves the use of more of our sense. For example students in a class can understand a lecture better, if the lecturer draws illustrative diagrams on the board while delivering his/her lectures instead of using only voice explanation.&lt;br /&gt;In case of computers system, the commonly used media for the purpose of storage, access and transmission of information are,&lt;br /&gt;&lt;br /&gt;1. Text(alphanumeric characters)&lt;br /&gt;2. Graphics(Line drawings and images)&lt;br /&gt;3. Animation(Moving images)&lt;br /&gt;4. Audio(sound)&lt;br /&gt;5. Video(Videographer real –life events)&lt;br /&gt;&lt;br /&gt;Hence in the &lt;em&gt;computer world&lt;/em&gt;, multimedia refers to the use of more than one of the above listed media for information presentation to the computer users-such as text and sound.There are many problems to find that &lt;a href=&quot;http://internetdblog.blogspot.com/2010/11/what-is-internet.html&quot;&gt;what is internet&lt;/a&gt; for more detail &lt;a href=&quot;http://internetdblog.blogspot.com/&quot;&gt;click here&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://internetdblog.blogspot.com/feeds/7546138314845930396/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://internetdblog.blogspot.com/2010/11/what-is-multimedia.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/7546138314845930396'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/52014671972461935/posts/default/7546138314845930396'/><link rel='alternate' type='text/html' href='http://internetdblog.blogspot.com/2010/11/what-is-multimedia.html' title='What is MULTIMEDIA?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwGT_dWu2uNGGsETA3CjtXgzISpqLmKJF_0RnpU70S43N3CTVy_LymabUUGvO542inQfFlCD7IBze9DKR4r0SrGBE8DuVY2duEuYJ3srKnmul1qXgP1V8wXbtMMXvMjEnG6x4FNvR9tO4/s72-c/whatismultimedia.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>